AD permissions required for LDAP Bind account?
Posted: Sun Jan 02, 2022 8:31 pm
Greetings everyone,
My OpenVPN server has been collecting dust for a while as I've been working from home and have not had need to leverage it.
I have the server configured to use Google 2FA, LDAP and an additional LDAP requirement.
I had everything working when I last tested it about 16 months ago, however some point between then and now the Additional LDAP Requirement stopped working and I'm unable to sign in.
Attempting to sign in via auth CLI throws an error like this.
API METHOD: authenticate
AUTH_RETURN
status : FAIL
reason : user not found that meets specified requirements: memberOf=CN=OpenVPNUsers,CN=Users,DC=XX,DC=XXXX,DC=XXX
user : xxxx.xxxxx
Authentication does work if I blank out the Additional LDAP Requirement: (Advanced) line
As a (Shitty) test I temporarily made the bind account a member of the Domain Admins group, and sure enough it was able to successfully auth, which tells me that this is something permission related preventing the group membership from being read, perhaps related to a Microsoft patch installed on the DCs.
I'm currently running OpenVPN Access server v2.8.5
What specific permissions should I delegate to the bind account?
My OpenVPN server has been collecting dust for a while as I've been working from home and have not had need to leverage it.
I have the server configured to use Google 2FA, LDAP and an additional LDAP requirement.
I had everything working when I last tested it about 16 months ago, however some point between then and now the Additional LDAP Requirement stopped working and I'm unable to sign in.
Attempting to sign in via auth CLI throws an error like this.
API METHOD: authenticate
AUTH_RETURN
status : FAIL
reason : user not found that meets specified requirements: memberOf=CN=OpenVPNUsers,CN=Users,DC=XX,DC=XXXX,DC=XXX
user : xxxx.xxxxx
Authentication does work if I blank out the Additional LDAP Requirement: (Advanced) line
As a (Shitty) test I temporarily made the bind account a member of the Domain Admins group, and sure enough it was able to successfully auth, which tells me that this is something permission related preventing the group membership from being read, perhaps related to a Microsoft patch installed on the DCs.
I'm currently running OpenVPN Access server v2.8.5
What specific permissions should I delegate to the bind account?