OpenLDAP Simple Authentication
Simple authentication validates users against OpenLDAP using standard LDAP bind. Users are prompted by their browser to enter their directory credentials when accessing the proxy.
Prerequisites
- SafeSquid installed and operational.
- OpenLDAP server reachable from the SafeSquid server (default port 389).
- Admin access to the SafeSquid Configuration Portal.
Configure OpenLDAP Connection
- Access SafeSquid Interface: Click Configure → Application Setup → Integrate LDAP.
- Enable Section: Set the Integrate LDAP global section to TRUE.
- Add LDAP Server:
- Go to LDAP Servers tab and click Add New.
- LDAP Server IP: Enter your OpenLDAP server IP.
- Bind DN: Enter the admin DN (e.g.,
cn=admin,dc=safesquid,dc=net). - Password: Enter the bind password using the encryption arrow.
- Base DN: Enter your directory base (e.g.,
dc=safesquid,dc=net). - LDAP Domain: Enter your domain name.

- Save Configuration: Click the checkmark to save.
Verification
| Step | Action | Expected Result |
|---|---|---|
| Test User Extraction | Go to LDAP Entities tab. | You should see all users and groups from your OpenLDAP server. |
| Check Logs | tail -f /var/log/safesquid/safesquid.log | Look for "LDAP bind successful" messages. |
| Network Test | ldapsearch -h <IP> -D "<BindDN>" -W | Successful response from the LDAP server confirms credentials and connectivity. |
Troubleshooting
| Symptom | Likely Cause | Fix |
|---|---|---|
| No LDAP entries fetched | Incorrect Base DN or Bind DN | Verify your DN syntax. Use a standard LDAP browser to confirm the structure. |
| Connection refused | Firewall or Port issue | Ensure port 389 is open between SafeSquid and the LDAP server. |
| Authentication fails | Password mismatch | Re-enter the password in SafeSquid and ensure it is encrypted correctly. |
| UI shows failure | Bind account permissions | Ensure the account used for Bind DN has read permissions for the entire directory. |
Next steps
- Enable SSO Authentication to apply these identities to access rules.
- Access Restriction to define policies by LDAP group.