Support Center

Configuring pfSense VPN to use JumpCloud's LDAP-as-a-Service

Prerequisites:
See Using JumpCloud's LDAP-as-a-Service to obtain the JumpCloud specific settings required below.

When using pfSense's VPN LDAP integration, here are the basic settings to configure authentication with JumpCloud's hosted LDAP server:

We've received feedback that the entire certificate chain is required as of v2.4.0. This has not been qualified yet, but if needed, can be generated by the following:
echo -n | openssl s_client -connect ldap.jumpcloud.com:636 -prexit -showcerts | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p'
 

LDAP Server Settings:


Type: LDAP
Hostname or IP Address: ldap.jumpcloud.com
Port Value: 636 (SSL)
Transport: SSL - Encrypted
Peer Certificate Authority: JumpCloud LDAPS SSL Client Certificate
Protocol Version: 3
Search Scope - Level: Entire Subtree
Search Scope - Base DN: ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Authentication Containers: ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Extended Query: &(objectClass=inetOrgPerson)(uid=*)
Bind Credentials - User DN: uid=<ldap-binding-user>,ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Bind Credentials - Password: <ldap-binding-user's-password>
User Naming Attribute: uid
Group Naming Attribute: cn
Group Member Attribute: memberOf
Group Object Class: groupOfNames



 
 
 

Last Updated: Sep 13, 2018 01:52PM MDT

Related Articles
desk-forwarding@jumpcloud.com
https://cdn.desk.com/
false
desk
Loading
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
about
false
Invalid characters found
/customer/en/portal/articles/autocomplete