Forum Discussion
Configuring Active Directory Authentication for BIG-IP Configuration Utility
So far, I haven't been able to get it to work. It would be great if someone could share an example of a working config. Here's what I have:
System >> Authentication
Authentication Source
User Directory: Remote - Active Directory
Configuration
Host: 192.168.xxx.xxx
Port: 389
Remote Directory Tree: OU=AppHosting,OU=Employees,OU=DPO Users,DC=dpo,DC=net
Scope: Base
Bind DN: administrator@dpo.net
User Template: %s@dpo.net
SSL: not enabled
All the accounts for users who need to log on are contained in the AppHosting OU. I also have the Other External Users' Web User Role set to Administrator.
Thanks for your help!
- smp_86112
Cirrostratus
Hi. I spent quite a lot of time on this, and in the end was successful. I am running 6400s (9.3.1) and 5100s (9.1.2). I also got this to work with a couple of GTMs.Displays the distinguished name of the user who is logging on
and passes that as the distinguished name for the bind operation
- ZacMatic_101240
Nimbostratus
I tried your suggestion for the "Bind DN" value, and I removed the "User Template" value, but I still can't log on to the Configuration Utility using my AD credentials. One of my coworkers called F5 for support, but the tech he talked to said this was an "implementation issue," which is therefore only addressed by a consultant. Pretty frustrating! - ZacMatic_101240
Nimbostratus
Good news: we got it working. For whatever reason, the built-in administrator account wasn't working. I made a new domain admin account to use for the LDAP query binding, and now everything works as expected. - StacyAnn_257051
Altostratus
I had the same issue and this link helped me, the trick is to add a group with the same exact name of your active directory group under Remote Role Groups, when adding the attribute string be sure to use memberOf=. this link also provides some good information. https://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/tmos-implementations-11-1-0/16.html - RickM
Nimbostratus
Above where you have "Scope: Base" this was giving me problems, I had specified the OU where the users are listed, but it did not work until I changed it to "sub".
Some troubleshooting tips I ran across while setting this up -- if you capture the LDAP traffic with TCPDUMP, read the cap with Wireshark and it will show you the LDAP conversation and you can see the errors - so helpful.
Another tool is LDP.EXE which I found was already on my domain controller. With this tool, you can perform the simple bind, to validate your bind DN and password, and also you can run the search - to validate that part of your configuration. You'll enter the same DN for your search base, and pick the same Base/Sub selection, then configure the search filter as (samaccountname=testuser). You'll be able to see the results immediately.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com