Legacy RADIUS server IPs will be deprecated on Jan 31, 2019. Please see this KB for more info.

Support Center

Configuring OpenVPN to use JumpCloud's LDAP-as-a-Service

Prerequisites:
See Using JumpCloud's LDAP-as-a-Service to obtain the JumpCloud specific settings required below.

These instructions were qualified using the OpenVPN virtual appliance v2.0.24, the included Admin UI, OpenVPN Connect client software and the documentation for authenticating via LDAP.  


LDAP Settings:


Primary server: ldap.jumpcloud.com
Use SSL to connect to LDAP servers: Checked (SSL port 636) -or- Unchecked (StartTLS port 389)
Credentials for Initial Bind: Use these credentials
Bind DN: uid=LDAP_BINDING_USER,ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Password: LDAP_BINDING_USER_PASSWORD
Username Attribute: uid


 

(Optional) Group Setting:


You may add a requirement for LDAP group membership for users.  To leverage LDAP Groups, see Creating LDAP Groups

Additional LDAP Requirement: memberOf=cn=GROUP_NAME,ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
 

Last Updated: Apr 07, 2017 12:03PM MDT

Related Articles
31b11a79e2c94470a66430cfe6d3eecd@jumpcloud.desk-mail.com
https://cdn.desk.com/
false
desk
Loading
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
about
false
Invalid characters found
/customer/en/portal/articles/autocomplete