- Open a web browser and navigate to the OPNSense web UI
- Log in to OPNSense
- Select System > Access > Servers from the left navigation menu
- Click the Add button in the top right of the screen
- Complete the form with the following information
The setup below will allow members of the DnsAdmins AD group to authenticate, tweak as neededDescriptive name: i12bretro.local
Type: LDAP
Hostname or IP address
i12bretro.local
Port value: 389
Transport: TCP - Standard
Protocol version: 3
Bind credentials:
User DN: CN=Readonly SVC,CN=Users,DC=i12bretro,DC=local
Password: Read0nly!!
Search scope: Entire Subtree
Base DN: DC=i12bretro,DC=local
Authentication containers: CN=Users,DC=i12bretro,DC=local
Extended Query:
&(memberOf=CN=DnsAdmins,CN=Users,DC=i12bretro,DC=local)
User naming attribute: sAMAccountName - Scroll to the bottom of the page and click the Save button
- Select System > Access > Tester from the left navigation menu
- Test the login capability of an LDAP user meeting the group requirements set above
- Select System > Settings > General from the left navigation menu
- Scroll down to the Authentication section
- Click the Server dropdown and enable authentication against the LDAP server
- Scroll to the bottom of the page and click the Save button
- Select System > Access > Users from the left navigation menu
- Click the cloud button at the bottom right of the user table
- Select users from LDAP to allow access to OPNSense
- Click the edit button next to each user and add the appropriate Group Memberships
- Click Lobby > Logout from the left navigation menu
- Test logging in as an LDAP authenticated user