OpenVPN
OpenVPN Configuration
-
Before starting, please be sure to have a functional VPN
Note: Please be sure to have a TrustelemConnect app correctly configured
-
Install the openvpn-auth-ldap package on the vpn machine by running the apt install openvpn-auth-ldap command
-
Copy the file that was created /usr/share/doc/openvpn-auth-ldap/examples/auth-ldap.conf this way /etc/openvpn/auth/ldap.conf
-
Setup a custom LDAP service account as well as a custom LDAP password on the trustelem app settings (optional)
-
Copy the field's content below into the ldap.conf file you just copied and change the Bind DN line with the required information
<LDAP>
# URL of the server where TrustelemConnect is running
URL ldap://address:port
# Bind DN
BindDN cn=trustelem,DC=mydomain,DC=trustelem,DC=com
# Bind password
Password xNc3x8T0hFtKKpQq
# Network timeout (in seconds)
Timeout 30
# Enable Start TLS
TLSEnable no
# Follow LDAP Referrals (anonymously)
FollowReferrals yes
# TLS CA Certificate File
TLSCACertFile /usr/local/etc/ssl/ca.pem
# TLS CA Certificate Directory
TLSCACertDir /etc/ssl/certs
# Client Certificate and key
# If TLS client authentication is required
TLSCertFile /usr/local/etc/ssl/client-cert.pem
TLSKeyFile /usr/local/etc/ssl/client-key.pem
# Cipher Suite
# The defaults are usually fine here
# TLSCipherSuite ALL:!ADH:@STRENGTH
</LDAP>
<Authorization>
# Base DN
BaseDN DC=mydomain,DC=trustelem,DC=com
# User Search Filter
SearchFilter "(mail=%u)"
# Require Group Membership
RequireGroup false
# Add non-group members to a PF table (disabled)
#PFTable ips_vpn_users
# Uncomment and set to true to support OpenVPN Challenge/Response
#PasswordIsCR false
</Authorization>
-
Add the line plugin /usr/lib/openvpn/openvpn-auth-ldap.so /etc/openvpn/auth/ldap.conf to your server config file
-
Restart your OpenVPN server
OpenVPN configuration
Before starting, please be sure to have a functional VPN
Note: Please be sure to have a TrustelemConnect app correctly configured
-
On the administrator dashboard, under the authentication category click on general and turn on radius
-
At the bottom of the page click on Save
-
On the administrator dashboard, under the authentication category click on radius
-
Select PAP authentication method, in the host field enter the address of the server where your TrustelemConnect app is running
-
Enter your secret in the Shared Secret field as well as the port in the Authentication Port field (often 1812)
OpenVPN configuration
Before starting, please be sure to have a functional VPN
-
On the administrator dashboard, under the settings category click on user authentication
-
Click on edit, select saml and click on the configure button
-
Copy the Issuer Name value in the Entity ID field on the trustelem configuration page
-
On the next page select IdP Metadata XML and copy the metadata.xml content into the planned empty field
-
Click on next then finish
Trustelem configuration
In the trustelem Login URL field enter:
-
The same value of the EntityID field in order to show an help application to configure OpenVPN on the user dashboard
-
Or '-' in order to hide the OpenVPN app from the user dashboard