Support Center

Configuring pfSense VPN to use JumpCloud's LDAP-as-a-Service

See Using JumpCloud's LDAP-as-a-Service to obtain the JumpCloud specific settings required below.

When using pfSense's VPN LDAP integration, here are the basic settings to configure authentication with JumpCloud's hosted LDAP server:

We've received feedback that the entire certificate chain is required as of v2.4.0. This has not been qualified yet, but if needed, can be generated by the following:
echo -n | openssl s_client -connect -prexit -showcerts | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p'

LDAP Server Settings:

Type: LDAP
Hostname or IP Address:
Port Value: 636 (SSL)
Transport: SSL - Encrypted
Peer Certificate Authority: JumpCloud LDAPS SSL Client Certificate
Protocol Version: 3
Search Scope - Level: Entire Subtree
Search Scope - Base DN: ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Authentication Containers: ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Extended Query: &(objectClass=inetOrgPerson)(uid=*)
Bind Credentials - User DN: uid=<ldap-binding-user>,ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Bind Credentials - Password: <ldap-binding-user's-password>
User Naming Attribute: uid
Group Naming Attribute: cn
Group Member Attribute: memberOf
Group Object Class: groupOfNames


Last Updated: Sep 13, 2018 01:52PM MDT

Related Articles
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
Invalid characters found