Skip to Content

How do I configure Ezeelogin to authenticate using OpenLdap or Window AD server?

1. How do I configure the Ezeelogin jump server to authenticate using OpenLDAP or Window AD server?

2. How do I configure the SSH gateway to authenticate from LDAP or Windows AD server?

With the AutoCreate feature, the backend ssh authentication would not be using PAM-LDAP, instead, it would create a system user in the shell and would then be using system authentication for the backend authentication.

The advantage of using the AutoCreate feature is that you would not have to configure LDAP in ssh or modify your existing Active Directory attributes or OpenLDAP attributes.

Do read more about the drawbacks,  since the ssh authentication would not be via LDAPhere

Make sure that the PHP-LDAP extension is installed on the server 

root@jumpserver:~# apt-get install php5-ldap/php7-ldap/php-ldap (ubuntu 14/16/18)

root@jumpserver:~# yum install php-ldap ; apachectl restart (centos6/7)

Integration of OpenLdap in ezeelogin jumpserver (Import openldap user to Ezeelogin jumpserver)

1. Login to Web-GUI > open settings > Ldap 

    Add the details of LDAP configurations 

 2  .Open Settings > General SettingsAuthentication > Change webpanel authentication to LDAP

3.  Open Settings > General settings > Security > Check Auto Create User

4. Select the LDAP users and import them to Ezeelogin.

 

You can confirm the imported LDAP users were listed in the Users tab.

After importing the users to Ezeelogin, log in with the user and set up security code for the user under Account > Password > New Security Code.

 

Integration of Windows AD in Ezeelogin(Import Windows AD user to jump server)

 

1.  Login to Web-GUI > open settings > LDAP

       Add the details of LDAP configurations & Check the WINDOWS ACTIVE DIRECTORY 

 2. Open Settings > General Authentication > change webpanel authentication to LDAP 

3. Open Settings >General > Security >Check Auto Create User

4. Select the LDAP users and import them to Ezeelogin  

 

You can confirm the imported LDAP users were listed in the Users