Tutorial: Integrate Access Server with JumpCloud using LDAP
How to integrate Access Server with JumpCloud using LDAP.
Overview
You can integrate Access Server with JumpCloud's Directory-as-a-Service using the LDAP protocol.
Installed Access Server
JumpCloud Directory-as-a-Service account.
Begin by creating a user in JumpCloud that will make the handshake and has the authority to scan the LDAP tree. This is called the Bind User.
Sign in to the JumpCloud console.
Create a new user through Manual user entry.
Define the following:
Username: Enter a unique name such as "LDAP."
Email: JumpCloud requires each user to have a unique email.
Click on Specify initial password, rather than sending a welcome email , and define the Bind User's password.
Click on Enable as LDAP Bind DN. (If you receive a pop-up that your user must also be enabled in the JumpCloud LDAP directory, click OK.)
Save your user.
Click on the newly created bind user to open the details.
Under LDAP Distinguished Name, copy the information for Access Server steps below.
Sign in to your Admin Web UI.
Click Authentication.
The General Settings tab displays.
Click the LDAP tab.
Set Enable LDAP authentication to Enabled.
Fill out the LDAP settings:
Connect to LDAP servers with SSL
On
Primary server
ldap.jumpcloud.com
Authenticate with username/password for initial bind
On
Bind DN username
The username for your JumpCloud bind user.
Password
Enter the password you defined for your Bind User.
Base DN for user entries
Copy and paste the LDAP query from your bind user, starting with "ou=Users". Example: ou=Users,o=[ORGANIZATION_ID],dc=jumpcloud,dc=com
Username Attribute
uid
Click Save and Restart.
You can set LDAP as the default authentication method or as the method by users or groups.
When you set it as the default authentication method, all users authenticate via LDAP unless their group or user authentication method overrides it. When you set it as the group authentication method, all users in the group authenticate via LDAP unless their user authentication method overrides it. When you set it as the user authentication method, the user authenticates via LDAP.
Sign in to the Admin Web UI.
Click Authentication.
From the General Settings tab, set the Default authentication system to LDAP.
Click Save and Restart.
Sign in to the Admin Web UI.
Click Groups.
Click the username or edit button for the group you want to assign to the LDAP authentication method.
Select LDAP for the Auth method.
Click Save and Restart.
Sign in to the Admin Web UI.
Click Users.
Click the username or edit button for the user you want to assign to the LDAP authentication method.
Select LDAP for the Auth method.
Click Save and Restart.
For Access Server to find your JumpCloud users, they must be enabled in the JumpCloud LDAP directory. If they are not, you can do so by clicking on Directories/LDAP, clicking on JumpCloud LDAP , and selecting them under the Users tab. You can also do this one user at a time from the Users section.
Now that your users are enabled in the LDAP directory and you have set up your Access Server to authenticate over LDAP, they can sign in to your VPN using their JumpCloud credentials.