Skip to main content

OpenLDAP Simple Authentication

Simple authentication validates users against OpenLDAP using standard LDAP bind. Users are prompted by their browser to enter their directory credentials when accessing the proxy.

Prerequisites
  • SafeSquid installed and operational.
  • OpenLDAP server reachable from the SafeSquid server (default port 389).
  • Admin access to the SafeSquid Configuration Portal.

Configure OpenLDAP Connection

  1. Access SafeSquid Interface: Click ConfigureApplication SetupIntegrate LDAP.
  2. Enable Section: Set the Integrate LDAP global section to TRUE.
  3. Add LDAP Server:
    • Go to LDAP Servers tab and click Add New.
    • LDAP Server IP: Enter your OpenLDAP server IP.
    • Bind DN: Enter the admin DN (e.g., cn=admin,dc=safesquid,dc=net).
    • Password: Enter the bind password using the encryption arrow.
    • Base DN: Enter your directory base (e.g., dc=safesquid,dc=net).
    • LDAP Domain: Enter your domain name.

entering LDAP server IP

  1. Save Configuration: Click the checkmark to save.

Verification

StepActionExpected Result
Test User ExtractionGo to LDAP Entities tab.You should see all users and groups from your OpenLDAP server.
Check Logstail -f /var/log/safesquid/safesquid.logLook for "LDAP bind successful" messages.
Network Testldapsearch -h <IP> -D "<BindDN>" -WSuccessful response from the LDAP server confirms credentials and connectivity.

Troubleshooting

SymptomLikely CauseFix
No LDAP entries fetchedIncorrect Base DN or Bind DNVerify your DN syntax. Use a standard LDAP browser to confirm the structure.
Connection refusedFirewall or Port issueEnsure port 389 is open between SafeSquid and the LDAP server.
Authentication failsPassword mismatchRe-enter the password in SafeSquid and ensure it is encrypted correctly.
UI shows failureBind account permissionsEnsure the account used for Bind DN has read permissions for the entire directory.

Next steps