Integrate Red Hat IDM in Ezeelogin jump server

Follow the steps to interate Red Hat IDM (Ldap protocol) in ezeelogin

Refer this document to install an IDM server


  1. Run ldapsearch on IDM server to find the ’DN’ of the admin user or other user having admin privileges

          You can run "ldapsearch" comand on IDM server and it will return all user,usergroup details etc

[root@ipaserver ~]# ldapsearch
SASL/GSSAPI authentication started
SASL username: admin@EXAMPLE.COM
SASL data security layer installed.
# extended LDIF
# LDAPv3
# base <dc=example,dc=com> (default) with scope subtree
# filter: (objectclass=*)
# requesting: ALL


# compat,
dn: cn=compat,dc=example,dc=com
objectClass: extensibleObject
cn: compat


# users, compat,
dn: cn=users,cn=compat,dc=example,dc=com
objectClass: extensibleObject
cn: users


# marc, users, compat,
dn: uid=marc,cn=users,cn=compat,dc=example,dc=com
objectClass: posixAccount
objectClass: ipaOverrideTarget
objectClass: top
gecos: marc f
cn: marc f
uidNumber: 1023000004
gidNumber: 1023000002
loginShell: /bin/sh
homeDirectory: /home/marc
ipaAnchorUUID:: OklQQTpleGFtcGxlLmNvbTpmYjVjYjAwZS01NWExLTExZWItODc0Ni0wODAwMj
uid: marc


# steve, users, compat,
dn: uid=steve,cn=users,cn=compat,dc=example,dc=com
objectClass: posixAccount
objectClass: ipaOverrideTarget
objectClass: top
gecos: steve m
cn: steve m
uidNumber: 1023000003
gidNumber: 1023000000
loginShell: /bin/sh
homeDirectory: /home/steve
uid: steve


# manu, users, compat,
dn: uid=manu,cn=users,cn=compat,dc=example,dc=com
objectClass: posixAccount
objectClass: ipaOverrideTarget
objectClass: top
gecos: manu c
cn: manu c
uidNumber: 1023000001
gidNumber: 1023000001
loginShell: /bin/sh
homeDirectory: /home/manu
ipaAnchorUUID:: OklQQTpleGFtcGxlLmNvbTpkNjVkMDA5NC01NTlmLTExZWItYWNjZi0wODAwMj
uid: manu


# admin, users, compat,
dn: uid=admin,cn=users,cn=compat,dc=example,dc=com
objectClass: posixAccount
objectClass: ipaOverrideTarget
objectClass: top
gecos: Administrator
cn: Administrator
uidNumber: 1023000000
gidNumber: 1023000000
loginShell: /bin/bash
homeDirectory: /home/admin
ipaAnchorUUID:: OklQQTpleGFtcGxlLmNvbToyMGIzMDdkZS01NThiLTExZWItOGEwNi0wODAwMj
uid: admin


# ng, compat,
dn: cn=ng,cn=compat,dc=example,dc=com
objectClass: extensibleObject
cn: ng


# groups, compat,
dn: cn=groups,cn=compat,dc=example,dc=com
objectClass: extensibleObject
cn: groups

   Or you can run ldapsearch command to find the "DN" of admin user. Replace  dc=example,dc=com  with your domain name

[root@ipaserver ~]# ldapsearch -b "uid=admin,cn=users,cn=accounts,dc=example,dc=com"

SASL/GSSAPI authentication started
SASL username: admin@EXAMPLE.COM
SASL data security layer installed.
# extended LDIF
# LDAPv3
# base <uid=admin,cn=users,cn=accounts,dc=example,dc=com> with scope subtree
# filter: (objectclass=*)
# requesting: ALL

# admin, users, accounts,
dn: uid=admin,cn=users,cn=accounts,dc=example,dc=com
objectClass: top
objectClass: person
objectClass: posixaccount
objectClass: krbprincipalaux
objectClass: krbticketpolicyaux
objectClass: inetuser
objectClass: ipaobject
objectClass: ipasshuser
objectClass: ipaSshGroupOfPubKeys
uid: admin
krbPrincipalName: admin@EXAMPLE.COM
cn: Administrator
sn: Administrator
uidNumber: 1023000000
gidNumber: 1023000000
homeDirectory: /home/admin
loginShell: /bin/bash
gecos: Administrator
ipaUniqueID: 20b307de-558b-11eb-8a06-080027497fcc
memberOf: cn=admins,cn=groups,cn=accounts,dc=example,dc=com
memberOf: cn=Replication Administrators,cn=privileges,cn=pbac,dc=example,dc=co
memberOf: cn=Add Replication Agreements,cn=permissions,cn=pbac,dc=example,dc=c
memberOf: cn=Modify Replication Agreements,cn=permissions,cn=pbac,dc=example,d
memberOf: cn=Read Replication Agreements,cn=permissions,cn=pbac,dc=example,dc=
memberOf: cn=Remove Replication Agreements,cn=permissions,cn=pbac,dc=example,d
memberOf: cn=Modify DNA Range,cn=permissions,cn=pbac,dc=example,dc=com
memberOf: cn=Read PassSync Managers Configuration,cn=permissions,cn=pbac,dc=ex
memberOf: cn=Modify PassSync Managers Configuration,cn=permissions,cn=pbac,dc=
memberOf: cn=Read LDBM Database Configuration,cn=permissions,cn=pbac,dc=exampl
memberOf: cn=Add Configuration Sub-Entries,cn=permissions,cn=pbac,dc=example,d
memberOf: cn=Read DNA Range,cn=permissions,cn=pbac,dc=example,dc=com
memberOf: cn=Host Enrollment,cn=privileges,cn=pbac,dc=example,dc=com
memberOf: cn=System: Add krbPrincipalName to a Host,cn=permissions,cn=pbac,dc=
memberOf: cn=System: Enroll a Host,cn=permissions,cn=pbac,dc=example,dc=com
memberOf: cn=System: Manage Host Certificates,cn=permissions,cn=pbac,dc=exampl
memberOf: cn=System: Manage Host Enrollment Password,cn=permissions,cn=pbac,dc
memberOf: cn=System: Manage Host Keytab,cn=permissions,cn=pbac,dc=example,dc=c
memberOf: cn=System: Manage Host Principals,cn=permissions,cn=pbac,dc=example,
memberOf: cn=trust admins,cn=groups,cn=accounts,dc=example,dc=com
krbLastPwdChange: 20210113104036Z
krbPasswordExpiration: 20210413104036Z
krbExtraData:: AAIkzv5fcm9vdC9hZG1pbkBFWEFNUExFLkNPTQA=
krbLoginFailedCount: 0
krbLastFailedAuth: 20210113161038Z

# search result
search: 4
result: 0 Success

# numResponses: 2
# numEntries: 1

2 .  Login to Ezeelogin Web-GUI > open settings > Ldap

   Add the details of LDAP configurations . Refer the first step to find BindDN & attributes

Refer the article if got the error while configuring with TLS - "error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed (self signed certificate in certificate chain)"



3. Go to  S ettings > general > Authentication > change Webpanel authentication to ldap

If you want to configure IDM/LDAP authentication in backend skip STEP 4

4.  Open Settings > General settings > Security > Check Auto Create user
5. Select the LDAP users and click on the button to  import users into Ezeelogin  

      you can confirm the imported LDAP users were listed in Users  tab in ezeelogin GUI


      Now you can login to ezeelogin with IDM user in ezeelogin GUI

Follow the instructions to configure IDM on backend . Skip STEP 4 if you are configuring backend 
  Here we are configure backend using sssd ( System Security Services Daemon) is a system service to access remote directories and authentication mechanisms
Run the following commands to install the sssd packages

yum install sssd sssd-client nscd

Run following command to enable OpenLdap and SSSD

authconfig --enablesssd --enablesssdauth --ldapserver="" --ldapbasedn="[ldap-base-dn]" --update

Add ldap_search_base,ldap_default_bind_dn,ldap_default_authtok,ldap_uri,default_shell = /usr/local/bin/ezsh, override_shell = /usr/local/bin/ezsh ,domian to /etc/sssd/sssd.conf
   I have used in this configuration as ldap server 
#autofs_provider = ldap
cache_credentials = True
id_provider = ldap
auth_provider = ldap
#chpass_provider = ldap
ldap_search_base = cn=accounts,dc=example,dc=com
ldap_default_bind_dn = uid=admin,cn=users,cn=accounts,dc=example,dc=com
ldap_default_authtok = zaq1XSW@
ldap_uri = ldap://
ldap_id_use_start_tls = False
override_homedir = /home/%u
default_shell = /bin/bash
override_shell = /usr/local/bin/ezsh
ldap_tls_reqcert = never
ldap_tls_cacertdir = /etc/openldap/cacerts
services = nss, pam, ssh
domains = example
Restart sssd & nscd service

service sssd restart && service nscd restart  

Enable autocreate home directory on login by the following command  

authconfig --enablemkhomedir --update

Now run the id / finger command and see whether you are able get LDAP user details 

[root@jumpserver ~]# finger marc

Login: marc             Name: Marc c

Directory: /home/marc   Shell: /usr/local/bin/ezsh

Last login Wed Jun 13 05:02 (EDT) on pts/1 from

No mail.

No Plan.

[root@jumpserver ~]# id jake

uid=1001(marc) gid=20001(domain users) groups=1547600513(domain users)

5 (1)
Article Rating (1 Votes)
Rate this article
    Attached Files
    There are no attachments for this article.
    Related Articles RSS Feed
    Can we map existing user group in ldap to ezeelogin as ezeelogin user group ?
    Viewed 4915 times since Mon, Sep 25, 2017
    setup web ssh console in ezeelogin and ssh via browser
    Viewed 13706 times since Tue, Jan 30, 2018
    How to reset cluster keys in ezeelogin Master-slave Configuration ?
    Viewed 1304 times since Fri, Jun 8, 2018
    Default outbound ssh port for target servers added in
    Viewed 2283 times since Thu, Dec 21, 2017
    How to enable google 2FA (Two factor Authentication) in ezeelogin ?
    Viewed 5871 times since Mon, Oct 9, 2017
    How to change default global key in Ezeelogin
    Viewed 3425 times since Thu, Jun 15, 2017
    Can i install ezeelogin Jump server solution in a lan?
    Viewed 20785 times since Sat, Jul 8, 2017
    Set SSH User Expiry
    Viewed 2319 times since Thu, Sep 20, 2018
    Integrate OneLogin SSO with jumpserver
    Viewed 1304 times since Wed, Aug 14, 2019
    configure jump server to use SSL for MySQL
    Viewed 3666 times since Mon, Apr 30, 2018