This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Discussions
  • :
  • connect to Active Directory via ldaps
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page
AleksMarfunenko
AleksMarfunenko Beginner
Beginner
‎2016-08-25 10:49 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

connect to Active Directory via ldaps

Jump to solution

Hi,

i'm deploying two-factor authentication for RRAS VPN.

Now i would like to add Identity sources - Active Directory. But i can't:

 

meantime i can connect to AD via LDP utility:

 

Labels (1)
Labels
  • Labels:
  • Agents

  • Tags:
  • Agent
  • Agents
  • Auth Agent
  • Authentication Agent
  • Community Thread
  • Discussion
  • external identity source
  • external identity source ldaps certificate
  • Forum Thread
  • LDAP
  • ldaps
  • openssl
  • rras
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
  • vpn
0 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
1 Solution

Accepted Solutions
MHelmy
Moderator MHelmy Moderator
Moderator
In response to AleksMarfunenko
‎2016-08-26 09:44 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Try using this KB article to make sure you have the correct certificate imported 000030537 - Get the external Identity Source LDAPS certificate using openssl for Authentication Manager 8.1

View solution in original post

2 Likes
Share
Reply
4 Replies
JayGuillette
Apprised Contributor JayGuillette Apprised Contributor
Apprised Contributor
‎2016-08-25 11:22 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

SecurID cannot protect an RRAS VPN on Win2012, only on Windows 2003 with the old Windows Agent v. 6.1,

but there was another thread on your external Identity Source question, how to get AD users into Authentication Manager.  

Integrate RSA secure ID & LDAP(AD)  

There is a pretty good PowerPoint attached to the bottom of this Discussion that explains how to setup Active Directory as an external Identity Source for Authentication Manager.  The shorter PDF version is attached here.  The PDF is more 'how to' while the .PPT has more of the 'Why'

Preview file
770 KB
1 Like
Share
Reply
AleksMarfunenko
AleksMarfunenko Beginner
Beginner
In response to JayGuillette
‎2016-08-26 09:24 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Thank you Jay.

I imported CA root certificate, but it still doesn't work. without SSL it works.

So, i will sort out with certs.

0 Likes
Share
Reply
MHelmy
Moderator MHelmy Moderator
Moderator
In response to AleksMarfunenko
‎2016-08-26 09:44 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Try using this KB article to make sure you have the correct certificate imported 000030537 - Get the external Identity Source LDAPS certificate using openssl for Authentication Manager 8.1

2 Likes
Share
Reply
JayGuillette
Apprised Contributor JayGuillette Apprised Contributor
Apprised Contributor
‎2016-08-26 09:55 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Aleks,

The Root CA should work, and Mostafa's KB on how to verify is probably the first place to check to make sure the Cert is the right one.

Other trouble-shooting techniques are to use LDAPsearch to browse Active Directory on the Domain Cotroller and TCPDump.to capture network traffic from Auth Manager to the DC, to see if the encryption/protocols are negotiated successfully or if the the Request is simply rejected by the DC.

For TCPDump

SSH to the Virtual Appliance with the operating system account rsaadmin.

                sudo su -

<same password again>                                               This makes you root

#             cd /usr/sbin

./tcpdump -i eth0 -s 1514 -Z root  port 389 -w /tmp/ldap.pcap

./tcpdump -i eth0 -s 1514 -Z root  port 636 -w /tmp/ldaps.pcap

chmod 777 /tmp/ ldap*.pcap                                 This grants full permissions to everyone, makes it easy to copy file off with WinSCP and use WireShark to analyze.  If you need to open a case and send us the packet capture.

 

for LDAPsearch, Open a second SSH and type the following command lines:

sudo su root

cd /usr/bin

Note: Type the following command but changing according to customer’s environment.

./ldapsearch -h { Windows_Domain_Controller} -D { LDAP_UserID } -w { LDAP_UserID_Password } -b {Windows_Domain} -s sub "(objectcategory=person)" sn givenname samaccountname

I am providing the following example from my Lab for your reference.

Variables:
Windows_Domain_Controller = 2k8r2-dc1.2k8r2-vcloud.local
LDAP_UserID = administrator@2k8r2-vcloud.local
LDAP_UserID_Password = mypass99!
Windows_Domain = dc=2k8r2-vcloud,dc=local

./ldapsearch -h 2k8r2-dc1.2k8r2-vcloud.local -D administrator@2k8r2-vcloud.local -w mypass99! -b "dc=2k8r2-vcloud,dc=local" -s sub "(objectcategory=person)" sn givenname samaccountname

 

Hat tip to Sergio Dias for that LDAPsearch info.

0 Likes
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.