Problems to authenticate against an Azure AD -Ldap

Uwe Faber uf at zkm.de
Fri Sep 22 13:56:09 UTC 2023


Alan DeKok schrieb:
> On Sep 21, 2023, at 10:59 AM, Uwe Faber <uf at zkm.de> wrote:
>> here the debug output
>> ...
>> (5) eap_ttls:   User-Name = "testuser at karlshochschule.de"
>> (5) eap_ttls:   User-Password = "password"
>    So EAP-TTLS with PAP.  That's good.
>
>> (5) ldap_khs: WARNING: No "known good" password added. Ensure the admin user has permission to read the password attribute
>> (5) ldap_khs: WARNING: PAP authentication will *NOT* work with Active Directory (if that is what you were trying to configure)
>    yeah...
>
>    Read https://github.com/FreeRADIUS/freeradius-server/blob/v3.2.x/raddb/mods-available/ldap
>
>    There's documentation for this.
>
>> ldap_msgfree
>> rlm_ldap (ldap_khs): Released connection (5)
>> Need 4 more connections to reach min connections (5)
>> rlm_ldap (ldap_khs): Opening additional connection (6), 1 of 9 pending slots used
>> rlm_ldap (ldap_khs): Connecting to ldaps://ldap.karlshochschule.de:636
>> ldap_create
>> ldap_url_parse_ext(ldaps://ldap.karlshochschule.de:636)
>> TLS: warning: cacertdir not implemented for gnutls
>    And using gnutls (in libldap) with OpenSSL (for EAP-TTLS) is likely to cause issues.
>
>    We've put more checks and warnings into v3 which complain about this issue.  But they exist only in the debug output, which usually means that they're hard to find.
>
>    Alan DeKok.
>
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
Hi alan,
i changed the code in the inner tunnel as described in the Link you gave 
the result is :

/etc/freeradius/3.0/sites-enabled/inner-khs[12]: Unknown or invalid 
value "ldap" for attribute Auth-Type
/etc/freeradius/3.0/sites-enabled/inner-khs[11]: Failed to parse 
"update" subsection.
/etc/freeradius/3.0/sites-enabled/inner-khs[2]: Errors parsing authorize 
section.




here the code:
server inner-tunnel {
     authorize {
         filter_username
         suffix
         update control {
             &Proxy-To-Realm := LOCAL
         }
         ldap_khs
         #text
         if ((ok || updated) && User-Password && !control:Auth-Type) {
                 update {
                     control:Auth-Type := ldap
                 }
         }
         #ende text
         inner_eap {
             ok = return
         }
         pap
     }

     authenticate {
         Auth-Type PAP {
             pap
         }
         Auth-Type MS-CHAP {
             mschap
         }
         Auth-Type inner_eap {
             inner_eap
         }
     }

     post-auth {
         inner_tunnel_linelog

         Post-Auth-Type REJECT {
             inner_tunnel_linelog
             attr_filter.access_reject
             update outer.session-state {
                 &Module-Failure-Message := &request:Module-Failure-Message
             }
         }
     }
}






More information about the Freeradius-Users mailing list