Skip to main content

OpenLDAP SSO Authentication

Configure Access Restrictions to utilize OpenLDAP identities. This enables identity-based policies where users are recognized by their directory username and group membership.

Prerequisites

Enable Authentication in Access Rules

  1. Access Restrictions: Go to Application SetupAccess RestrictionsAllow List.
  2. Edit Rule: Edit the rule matching your client segment or create a new one.
  3. Apply LDAP Profiles:
    • LDAP Profiles: Select specific LDAP groups (e.g., IT_Admins) from the dropdown.
    • Leave blank to apply this rule to all directory users.
  4. Enable PAM: Ensure PAM Authentication is set to TRUE.
  5. Save Policy: Click the checkmark to save.

selecting the users or user groups you want to set the authentication for

Note on Default Rules

SafeSquid includes default entries under the Allow List. You can edit these to quickly map specific LDAP groups to default user-groups like admins or users.

Verification

ActionMethodExpected Result
Test AccessBrowse from a client belonging to a mapped LDAP group.Access is allowed/denied according to the rule.
Check Identity Logtail -f /var/log/safesquid/identity.logShows the authenticated OpenLDAP username for each request.
Review DashboardReportsDetailed LogsVerify the Username column is populated with directory names.

Confirming SSO authentication by seeing the username in SafeSquid detailed logs

Troubleshooting

SymptomLikely CauseFix
Authentication prompt appearsNo match in LDAP ProfilesEnsure the user is a member of the group specified in the LDAP Profiles field.
User recognized but blockedPolicy restrictionCheck the access rules applied to the user-group assigned in the Allow List entry.
No username in logsPAM set to FALSEEnsure PAM Authentication is set to TRUE in the matching Allow List rule.

Next steps