Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

System: Access: Tester does not return group from user #1169

Closed
ccesario opened this issue Sep 2, 2016 · 12 comments
Closed

System: Access: Tester does not return group from user #1169

ccesario opened this issue Sep 2, 2016 · 12 comments

Comments

@ccesario
Copy link

ccesario commented Sep 2, 2016

Hi,

Tester form does not return Group name of user when using Active Directory as Server

ad_tester

Versions OPNsense 16.7.3-amd64
FreeBSD 10.3-RELEASE-p7
OpenSSL 1.0.2h 3 May 2016

@AdSchellevis
Copy link
Member

@ccesario did you import the user first and assign groups to it?

@ccesario
Copy link
Author

ccesario commented Sep 2, 2016

@AdSchellevis not. I really did not see it. Where can I do it!?

@AdSchellevis
Copy link
Member

@ccesario no problem, you should see a cloud symbol in the system -> access -> user screen on the right bottom of the screen. You can import users into the OPNsense configuration, which you can then assign groups and rights.

@ccesario
Copy link
Author

ccesario commented Sep 2, 2016

@AdSchellevis well, I think that the cloud synbol does not appear in my system.

look this

image

@AdSchellevis
Copy link
Member

ah, I see. it only appears if ldap (/AD) is used as authentication option for the UI. This is handled in the settings (2 menu items below).

@Pimmal
Copy link

Pimmal commented Sep 4, 2016

The same problem is here on my side: Tester form does not return Group name of user when using Active Directory as Server

@AdSchellevis
Copy link
Member

Groups are only supported if LDAP (/AD) is used as authentication for the webgui, System -> Access -> Settings, then choose your server. Next import users into the configuration.
There currently are no other services which make use of groups.

@Pimmal
Copy link

Pimmal commented Sep 4, 2016

Import users into the configuration.

The Users are created in AD, were i have to import the users?
If i have to import the users then AD auth makes no sense.

@AdSchellevis
Copy link
Member

If you want to assign rights within OPNsense, you need to import users, if you just want to use the connector (e.g. openvpn, ipsec), you don't need to assign privileges and therefore don't need to import the users into the firewall (and hence don't need the assigned groups either).
LDAP (/AD) is used for authentication only, authorisation is handled within the product itself.

For reference, the original issue was solved in this issue #266
The reason for handling authorisation locally is simple, keep the acl structure clean and simple without interaction to other services. Like in a lot of other products the "linking pin" needs to be stored in the product to use it.

We do need some documentation about this subject.

@Pimmal
Copy link

Pimmal commented Sep 5, 2016

But it makes no sense to create the users in opnsense localy, i use the AD auth to administrate the opnsense admins in AD, like in pfsense. There all users with the AD Groups pfsense-admin have access to the admin features. I would prefere to do the same in opnsense, if this is not possible then i have to use the non stable pfsenseproduct.

Because i would only one place to administrate all things and this place is the active directory, thats the idea from active directory.

@AdSchellevis
Copy link
Member

You could write your own scripting to synchronize users between the two (or sponsor the feature). We don't supply scripting for this at the moment.
The hook pfSense has to query the groups from within the authentication request won't make it to OPNsense (architectural choice). Synchronisation could reach a similar behaviour.

@AdSchellevis
Copy link
Member

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

3 participants