{"id":12887,"date":"2022-05-23T23:32:29","date_gmt":"2022-05-23T20:32:29","guid":{"rendered":"https:\/\/kifarunix.com\/?p=12887"},"modified":"2024-03-09T12:53:44","modified_gmt":"2024-03-09T09:53:44","slug":"integrate-syspass-with-openldap-for-authentication","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/integrate-syspass-with-openldap-for-authentication\/","title":{"rendered":"Integrate sysPass with OpenLDAP for Authentication"},"content":{"rendered":"\n<p>Follow through this tutorial to learn how to integrate sysPass with OpenLDAP for authentication and account management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Install and Setup OpenLDAP server<\/h2>\n\n\n\n<p>In our previous tutorials, we covered how to install and setup OpenLDAP server. Follow the link below to check them.<\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/?s=openldap+server\" target=\"_blank\" rel=\"noreferrer noopener\">Install and Setup OpenLDAP server<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Install and Setup sysPass<\/h2>\n\n\n\n<p>Follow the link below to install and setup sysPass.<\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/?s=syspass\" target=\"_blank\" rel=\"noreferrer noopener\">Install and setup sysPass on Linux<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Integrate sysPass with OpenLDAP for Authentication<\/h2>\n\n\n\n<p>To begin, ensure sysPass is installed with PHP-LDAP modules.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>php -m | grep ldap<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Create OpenLDAP User Group for sysPass<\/h3>\n\n\n\n<p>Create an group of OpenLDAP that can be used to control access to sysPass. All members of the group to be created will allowed to access\/login to sysPass.<\/p>\n\n\n\n<p>Follow our guide below to learn how to setup OpenLDAP groups.<\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/how-to-create-openldap-member-groups\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Create OpenLDAP Member Groups<\/a><\/p>\n\n\n\n<p>In our OpenLDAP server, we have created a group called <strong><code>syspass<\/code><\/strong>.<\/p>\n\n\n\n<p>Some members have been added to this group as evident in the command output below;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ldapsearch -H ldapi:\/\/\/ -Y EXTERNAL -LLL -Q -b \"dc=ldapmaster,dc=kifarunix-demo,dc=com\" cn=syspass<\/code><\/pre>\n\n\n\n<p>Sample output;<\/p>\n\n\n\n<pre class=\"scroll-box\"><code>dn: cn=syspass,ou=groups,dc=ldapmaster,dc=kifarunix-demo,dc=com\nobjectClass: groupOfNames\ncn: syspass\nmember: uid=johndoe,ou=people,dc=ldapmaster,dc=kifarunix-demo,dc=com\nmember: uid=janedoe,ou=people,dc=ldapmaster,dc=kifarunix-demo,dc=com\nmember: uid=devadmin,ou=people,dc=ldapmaster,dc=kifarunix-demo,dc=com\n<\/code><\/pre>\n\n\n\n<p>Once you have setup your OpenLDAP user\/groups for sysPass authentication, login to sysPass web user interface as administrator.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Create OpenLDAP users group.<\/h3>\n\n\n\n<p>This will be required to specify the default group under which OpenLDAP users belong to on sysPass.<\/p>\n\n\n\n<p>To create group, click <strong>Users and accesses<\/strong> icon &gt; GROUPS &gt; New Group.<\/p>\n\n\n\n<div><a href=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-user-groups.png\" class=\"td-modal-image\"><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1868\" height=\"675\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-user-groups.png\" alt=\"Integrate sysPass with OpenLDAP for Authentication\" class=\"wp-image-12898\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-user-groups.png?v=1653337237 1868w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-user-groups-768x278.png?v=1653337237 768w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-user-groups-1536x555.png?v=1653337237 1536w\" sizes=\"(max-width: 1868px) 100vw, 1868px\" \/><\/figure><\/a><\/div>\n\n\n\n<p>Save the group.<\/p>\n\n\n\n<p>Next, create OpenLDAP Users default Profile<\/p>\n\n\n\n<p>This is where you define the default permissions to be assigned to a specific user profile. To create a profile, click <strong>Users and accesses<\/strong> icon &gt; PROFILE &gt; New Profile.<\/p>\n\n\n\n<p>Sample account permissioms.<\/p>\n\n\n\n<div><a href=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-profile-account-permissions.png\" class=\"td-modal-image\"><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1861\" height=\"949\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-profile-account-permissions.png\" alt=\"\" class=\"wp-image-12899\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-profile-account-permissions.png?v=1653337271 1861w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-profile-account-permissions-768x392.png?v=1653337271 768w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-profile-account-permissions-1536x783.png?v=1653337271 1536w\" sizes=\"(max-width: 1861px) 100vw, 1861px\" \/><\/figure><\/a><\/div>\n\n\n\n<p>For the rest of the accesses, we didn&#8217;t give any for this particular profile. Feel Free to set the accesses accordingly.<\/p>\n\n\n\n<p>So we now have a group, <strong><code>ldapuser-gp<\/code><\/strong>, and profile, <strong><code>ldapusers-pf<\/code><\/strong>.<\/p>\n\n\n\n<p>Note that you should be able to define the specific profile\/groups once the LDAP users are in the sysPass system.<\/p>\n\n\n\n<p>Next, click the gear icon to access the configuration menu and click LDAP.<\/p>\n\n\n\n<div><a href=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-ldap-configuration.png\" class=\"td-modal-image\"><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1704\" height=\"903\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-ldap-configuration.png\" alt=\"Integrate sysPass with OpenLDAP for Authentication\" class=\"wp-image-12897\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-ldap-configuration.png?v=1653337064 1704w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-ldap-configuration-768x407.png?v=1653337064 768w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-ldap-configuration-1536x814.png?v=1653337064 1536w\" sizes=\"(max-width: 1704px) 100vw, 1704px\" \/><\/figure><\/a><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Define sysPass OpenLDAP Configuration options<ul><li>Toggle the button to enable LDAP based authentication.<\/li><li>Also turn on TLS connection if your OpenLDAP server is configured with TLS.<ul><li>To be able to use TLS connection, you need to;<ul><li>Install LDAP CA cert on the sysPass server<\/li><li>Define the LDAP CA Path on sysPass server as <a href=\"#install-ldap-ca-cert\" target=\"_blank\" rel=\"noreferrer noopener\">shown below<\/a>.<\/li><\/ul><\/li><\/ul><\/li><\/ul>\n<ul class=\"wp-block-list\">\n<li>Server type: <strong><code>standard<\/code><\/strong>.<\/li>\n\n\n\n<li>Server:\n<ul class=\"wp-block-list\">\n<li>This is the LDAP server url or IP address. In our setup, <strong>ldap.kifarunix-demo.com<\/strong>.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Bind User:\n<ul class=\"wp-block-list\">\n<li>This is the DN of the user to authenticate. In our setup, it is <strong><code>cn=readonly,ou=system,dc=ldapmaster,dc=kifarunix-demo,dc=com.<\/code><\/strong><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Bind Password:\n<ul class=\"wp-block-list\">\n<li>The credentials for the user to authenticate<\/li>\n\n\n\n<li>This is the password for the user specified by the bind DN above.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Search Base:\n<ul class=\"wp-block-list\">\n<li>defines the location in the OpenLDAP directory where the search for a particular directory object begins.<\/li>\n\n\n\n<li>In our setup, the search base for users and groups is <strong><code>dc=ldapmaster,dc=kifarunix-demo,dc=com<\/code><\/strong>.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Group:\n<ul class=\"wp-block-list\">\n<li>This defines the group to which the user must belong to to be able to login to sysPass.<\/li>\n\n\n\n<li>As seen above, the group in our setup is <strong><code>cn=syspass,ou=groups,dc=ldapmaster,dc=kifarunix-demo,dc=com<\/code><\/strong>.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Default Group and Default Profile, leave empty.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<div><a href=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-ldap_configuration.png\" class=\"td-modal-image\"><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1839\" height=\"913\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-ldap_configuration.png\" alt=\"Integrate sysPass with OpenLDAP for Authentication\" class=\"wp-image-12900\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-ldap_configuration.png?v=1653337338 1839w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-ldap_configuration-768x381.png?v=1653337338 768w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-ldap_configuration-1536x763.png?v=1653337338 1536w\" sizes=\"(max-width: 1839px) 100vw, 1839px\" \/><\/figure><\/a><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Next, click the &#8220;<strong>exchange<\/strong>&#8221; icon to check connection to LDAP server. Ensure you have installed OpenLDAP CA certs if you enabled TLS before you can test the connection.<\/li>\n\n\n\n<li>If the connection is successful, you should see a list of all users in the OpenLDAP sysPass group.<\/li>\n<\/ul>\n\n\n\n<div><a href=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-test-ldap-connection.png\" class=\"td-modal-image\"><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1400\" height=\"830\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-test-ldap-connection.png\" alt=\"Integrate sysPass with OpenLDAP for Authentication\" class=\"wp-image-12901\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-test-ldap-connection.png?v=1653337465 1400w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/syspass-test-ldap-connection-768x455.png?v=1653337465 768w\" sizes=\"(max-width: 1400px) 100vw, 1400px\" \/><\/figure><\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Install OpenLDAP server CA cert and define the path on sysPass server.<\/h3>\n\n\n\n<p>Install OpenLDAP utilities on the sysPass server;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>apt install ldap-utils -y<\/code><\/pre>\n\n\n\n<p>Download LDAP CA cert;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>openssl s_client -connect ldap:389 -starttls ldap -showcerts &lt;\/dev\/null 2&gt;\/dev\/null |  openssl x509<\/code><\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>\n-----BEGIN CERTIFICATE-----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\nbkc1+yvlgKUPaXH20\/C1COiGI+r8UGA=\n-----END CERTIFICATE-----\n<\/code><\/pre>\n\n\n\n<p>Install the OpenLDAP CA cert on specific path;<\/p>\n\n\n\n<pre class=\"scroll-box\"><code>\ncat > \/etc\/ssl\/certs\/openldap-ca.pem &lt;&lt; 'EOL'\n-----BEGIN CERTIFICATE-----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\nbkc1+yvlgKUPaXH20\/C1COiGI+r8UGA=\n-----END CERTIFICATE-----\nEOL\n<\/code><\/pre>\n\n\n\n<p>You can use one command though;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>openssl s_client -connect ldap:389 -starttls ldap \\\n-showcerts &lt;\/dev\/null 2&gt;\/dev\/null |\\\nopenssl x509 &gt; \/etc\/ssl\/certs\/openldap-ca.pem<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">sysPass OpenLDAP User Login<\/h3>\n\n\n\n<p>Once you have configured sysPass for OpenLDAP authentication, you need to generate a temporary master password as it is required for every first login. Temporary master password is used so as not to reveal the original admin password.<\/p>\n\n\n\n<p>To generate temporary master password, login to sysPass as admin and navigate to <strong>Configuration &gt; Encryption &gt; Temporary Password<\/strong>. Note the <strong>lifetime<\/strong> of the password.<\/p>\n\n\n\n<p>For every new user logging in, share with them the temporary master password generated.<\/p>\n\n\n\n<p>For example, logging in as our LDAP user janedoe;<\/p>\n\n\n\n<p>When you first enter your credentials and press Enter, authentication will fail with <strong>Master password is not saved or wrong<\/strong>.<\/p>\n\n\n\n<p>The enter the username\/password and temporary master password provided.<\/p>\n\n\n\n<div><a href=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/ldap-user-authentication-syspass.png\" class=\"td-modal-image\"><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1152\" height=\"591\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/ldap-user-authentication-syspass.png\" alt=\"Integrate sysPass with OpenLDAP for Authentication\" class=\"wp-image-12902\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/ldap-user-authentication-syspass.png?v=1653337610 1152w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/ldap-user-authentication-syspass-768x394.png?v=1653337610 768w\" sizes=\"(max-width: 1152px) 100vw, 1152px\" \/><\/figure><\/a><\/div>\n\n\n\n<p>From Administrator site, you should be able to see LDAP accounts added to the sysPass system.<\/p>\n\n\n\n<div><a href=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/ldap-user-accounts.png\" class=\"td-modal-image\"><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1870\" height=\"506\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/ldap-user-accounts.png\" alt=\"Integrate sysPass with OpenLDAP for Authentication\" class=\"wp-image-12903\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/ldap-user-accounts.png?v=1653337686 1870w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/ldap-user-accounts-768x208.png?v=1653337686 768w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/05\/ldap-user-accounts-1536x416.png?v=1653337686 1536w\" sizes=\"(max-width: 1870px) 100vw, 1870px\" \/><\/figure><\/a><\/div>\n\n\n\n<p>And that is how easily you can sysPass can be integrated with OpenLDAP for authentication.<\/p>\n\n\n\n<p>Other Tutorials<\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/configure-sssd-for-ldap-authentication-on-ubuntu-22-04\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configure SSSD for LDAP Authentication on Ubuntu 22.04<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/integrate-gitlab-with-openldap-for-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">Integrate Gitlab with OpenLDAP for Authentication<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Follow through this tutorial to learn how to integrate sysPass with OpenLDAP for authentication and account management. Install and Setup OpenLDAP server In our previous<\/p>\n","protected":false},"author":1,"featured_media":11551,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[1099,285,121,339,34,595],"tags":[5220,5222,5215,5223,5221],"class_list":["post-12887","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-openldap","category-directory-server","category-howtos","category-password-managers","category-security","category-syspass","tag-integrate-syspass-with-openldap-for-authentication","tag-ldap-syspass","tag-syspass","tag-syspass-ldap","tag-syspass-ldap-tls-ca-certs","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/12887"}],"collection":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/comments?post=12887"}],"version-history":[{"count":8,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/12887\/revisions"}],"predecessor-version":[{"id":20501,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/12887\/revisions\/20501"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media\/11551"}],"wp:attachment":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media?parent=12887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/categories?post=12887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/tags?post=12887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}