example_configs/pfsense.md
[!NOTE]
Replacedc=example,dc=comwith the same LDAP Base DN that you set via the LLDAP_LDAP_BASE_DN environment variable or inlldap_config.toml.
System > User Manager > Authentication Servers+ Add buttonA Descriptive NameLDAPHostname or IP for your LLDAP hostYour LLDAP portTCP - Standard325[!NOTE] Make sure the host running LLDAP is accessible to pfSense and that you mapped the LLDAP port to the LLDAP host
Entire Subtree
dc=example,dc=com
ou=people
[!Note] The
Select a containerseach fuction will not work for selecting containers. You enter theAuthentication containersdirectly into the text field. This is due to Pfsense running the following filter"(|(ou=*)(cn=Users))", andOrganizational Unitsis currently not supported.Could not connect to the LDAP server. Please check the LDAP configuration.
[!WARNING] if search button is pressed a warning will show on the bottom of the page:
Could not connect to the LDAP server. Please check the LDAP configuration.
Enable extended query:
Checked&(objectClass=person)(|(memberof=cn=pfsense_admin,ou=groups,dc=example,dc=com)(memberof=cn=pfsense_guest,ou=groups,dc=example,dc=com))
This example gives you two groups in LLDAP, one for pfSense admin access (pfsense_admin) and one for guest access (pfsense_guest). You must create these exact same groups in both LLDAP and pfSense, then give them the correct permissions in pfSense.
Uncheckeduid=yourbinduser,ou=people,dc=example,dc=com
It is recommended that you create a separate read-only user account (e.g, readonly) instead of admin for sharing Bind credentials with other services. The readonly should be a member of the lldap_strict_readonly group to limit access to your LDAP configuration in LLDAP.
LLDAPPasswordForBindUser
uid
cn
memberof
UncheckedgroupOfUniqueNames
cn=pfsense_admin,ou=groups,dc=example,dc=com
(This is only if you want to give a group shell access through LDAP. Leave blank and only the pfSense admin user will have shell access.
Enable the following options on the pfSense configuration page for your LLDAP server (the same page where you entered the prior configuration):
CheckedUncheckedUncheckedGo to System > User Manager > Groups and create a new group(s) with the same exact name as the LLDAP group(s) used to authenticate users for pfSense (pfsense_admin and pfsense_guest in this example).
If you want your LLDAP users to have full administrator access in pfSense, then you need to edit the Assigned Privileges for the group and add the WebCfg - All pages system privilege. If you do not give any permissions to a group, you will be able to log in but only see an empty webUI.
Go to System > User Manager > Settings page. Add your LLDAP server configuration to the Authentication Server field. The "Save & Test" Button will fail the test results at step 3. No clue why.
pfSense includes a built-in feature for testing user authentication at Diagnostics > Authentication. Select your LLDAP server configuration in the Authentication Server to test logins for your LLDAP users. The groups (only the ones you added to pfSense) should show up when tested.
[!WARNING] When running
Save and test, theAttempting to fetch Organizational Units fromwill fail. This is due to Pfsense running the following filter"(|(ou=*)(cn=Users))", andOrganizational Unitsis currently not supported.
Please read the pfSense docs for more information on LDAP configuration and managing access to pfSense.