Skip to main content

AD Simple Authentication

Simple authentication validates domain users via LDAP bind. When users browse the web, they are prompted by their browser to enter their Active Directory credentials.

When to use Simple Authentication

Use Simple Auth WhenUse SSO (Kerberos) Instead
Client devices are not joined to the domainCorporate workstations are domain-joined
Fast setup is required (no Kerberos config)Best user experience (no prompt) is required
Troubleshooting authentication issuesProduction environment for domain users
Prerequisites

Configure Simple Authentication

  1. Access SafeSquid Interface: Go to Application SetupIntegrate LDAP.
  2. Enable Section: Ensure the Integrate LDAP global section is set to TRUE.
  3. Configure LDAP Server:
    • Go to LDAP Servers tab.
    • Edit your AD server entry.
    • Ensure LDAP Bind Method is set to SIMPLE (for browser-prompt authentication).
  4. Save Configuration: Click the checkmark to save.

Ensure LDAP Enabled

Enable Authentication in Access Rules

  1. Go to Access Restrictions: Application SetupAccess RestrictionsAllow List.
  2. Edit Rule: Find the rule matching your client IPs or create a new one.
  3. Configure Auth:
    • PAM Authentication: Set to TRUE.
    • LDAP Profiles: (Optional) Select specific AD groups if this rule only applies to them. Leave blank for all AD users.
  4. Save Policy: Click the checkmark to save.

Verification

ActionMethodExpected Result
Browser TestAccess any website from a client.A browser login prompt should appear.
Login TestEnter valid AD credentials.Access is granted; the website loads.
Identity Logtail -f /var/log/safesquid/identity.logThe log shows the authenticated AD username.
Detailed LogReportsDetailed LogsRequests are tagged with the directory username and group.

Troubleshooting

SymptomLikely CauseFix
No login promptRule order or IP mismatchEnsure the authentication rule is above general allow rules; verify client IP matches rule scope.
Prompt keeps reappearingIncorrect AD credentials or Bind DNVerify user password in AD; ensure Bind account in "Integrate LDAP" has read access.
Authentication failsTime skew or DNS issuesSync SafeSquid system time with AD server; ensure AD FQDN is resolvable.
Valid users blockedGroup membership issueCheck if the user is a member of the group specified in LDAP Profiles.

Next steps