Skip to content

Instantly share code, notes, and snippets.

@joe-speedboat
Forked from cclloyd/guide.md
Created September 22, 2021 11:39
Show Gist options
  • Save joe-speedboat/a242532490b0f3726fc7937f3525fd36 to your computer and use it in GitHub Desktop.
Save joe-speedboat/a242532490b0f3726fc7937f3525fd36 to your computer and use it in GitHub Desktop.
Set up OPNSense with FreeIPA Authentication.

Using FreeIPA Authentication with OPNSense

Step 1

Go to your IPA admin page and create a new user named opnsense. Log in once on any computer joined to the FreeIPA realm and set their password (since the one you provide upon account creation will be expired), then logout.

Step 2

Next we are going to go to System -> Access -> Servers and add an LDAP Server.

Server ipa.example.com
Port 389
Transport TCP - Standard
Peer Certificate Authority # use whatever you have set up on OPNSense. Set up a simple CA if you have none>
Protocol Version 3
Bind Credentials User_DN uid=opnsense,cn=users,cn=accounts,dc=example,dc=com
Bind Credentials Password # Password for the opnsense user we created earlier.
Search Scope Entire Subtree
Base DN dc=example,dc=com
Authentication Containers # select all options from the list
User Naming Attribute uid

Go to System -> Access -> Tester and try logging in with an IPA user to test your configuration. You should be able to successfully authenticate any IPA user here.

Step 3

Go to System -> Access -> Users and click the cloud import button in the bottom right to begin importing an LDAP user.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment