Link to Active Directory domain
In order to be able to integrate with existing Active Directory to provide single-sign-on authentication and web filtering based on Active Directory security groups Web Safety needs to be linked to your existing domain.
Open Admin UI / Squid Proxy / Auth and click on the Active Directory tab. The following information has to be provided for the authentication to work correctly. Click the Detect Automatically button at the bottom of the page to try guessing the settings based on your environment.
Setting Name | Description |
---|---|
FQDN of Primary DC | Fully qualified domain name or IP address of your first domain controller. For example, dc1.example.lan. |
FQDN of Secondary DC | Fully qualified domain name or IP address of your second domain controller. For example, dc2.example.lan. This setting is optional and does not need to always be filled in. If your first domain controller goes down for routine maintenance the application will use second domain controller for LDAP group lookup and authentication. |
Base DN | The root of your LDAP tree. When you click Detect Automatically the application tries to do the anonymous bind to a domain controller to get this information from there. Very often the automatically detected value will be correct. |
User Name and Password | This is the name and password of the designated user in Active Directory you have created on the previous step. Note that sometimes you might need to type squid@example.lan as user name, not just squid as indicated on the screenshot above. Use Test Connection button to find the right spelling for the user name. |
After you have provided the information about your domain and clicked Save Changes button, it is advisable to also click Test Connection button. This ensures the connection from proxy to domain controllers works as expected. If everything is fine the following screen will be displayed. If something is wrongly configured the result will be shown in red with output describing problems encountered. You must resolve all the problems before continuing further.
Important
When application does the policy group lookup in Active Directory it connects to remote LDAP port 389 over insecure connection. To use secure LDAP (so called LDAPS) you need to configure Active Directory LDAP Signing on your domain controllers.