cancel
Showing results for 
Search instead for 
Did you mean: 

SSL4500 - AD LDAP - user privilege for AdminDN

SOLVED
R11ver_
Occasional Contributor

SSL4500 - AD LDAP - user privilege for AdminDN

Hi All!

Please could you help with a couple of questions,

We have Juniper SSL 4500 device and are going to integrate it with Active Directory via LDAP. Server type will be Active Directory. What is the necessary rights for username that should be pointed in the Admin DN field? Should it be Domain Administrator or just Domain User will be enough?

Thanks for your help!

1 ACCEPTED SOLUTION

Accepted Solutions
ruc_
Regular Contributor

Re: SSL4500 - AD LDAP - user privilege for AdminDN

Yes domain user should suffice. For password management  related functionality most of the operations are performed within the actual end user's context so the service account will not need any special permissions around password change either.

View solution in original post

7 REPLIES 7
cbarcellos_
Regular Contributor

Re: SSL4500 - AD LDAP - user privilege for AdminDN

If you can use domain admin, that would be best way to go. We have a KB for setting up an AD domain user with extra permissions however: http://kb.pulsesecure.net/KB2624 the setup for LDAP should be the same. I would recommend using a domain admin account if possible, it is much easier. If the domain user account doesn't have the exact needed permissions, you could have intermittent authentication issues.

R11ver_
Occasional Contributor

Re: SSL4500 - AD LDAP - user privilege for AdminDN

Thanks for an answer.

This KB is for kerberos way of integration with AD - in this case Juniper needs to be joined to AD.

But using LDAP service there is no need to join the domain. So it seems it is not necessary to give "Create Computer Objects" and "Delete Computer Objects" privilege to this account, etc..

For the security reasons we can not use domain administrator as service account.

Please could you determine exactly what privilege should this account has?

Is it enough to be only Domain User for AdminDN account for AD LDAP?

Your help is really appreciated.. Thanks,

R11ver_
Occasional Contributor

Re: SSL4500 - AD LDAP - user privilege for AdminDN

Hi!

Do you have any suggestions? Have somebody experience with it?

You help is really needed and will be appreciated!

Thanks!

ruc_
Regular Contributor

Re: SSL4500 - AD LDAP - user privilege for AdminDN

For LDAP based AD integration a simple service account should be enough i.e. an account that can bind to the LDAP server and browse the directory structure (read only) should suffice.

R11ver_
Occasional Contributor

Re: SSL4500 - AD LDAP - user privilege for AdminDN

Ruc, thanks for the reply. So, will Domain User be enough? Is it necessary to grant password change rights to the account to allow SSL users to change their password?

ruc_
Regular Contributor

Re: SSL4500 - AD LDAP - user privilege for AdminDN

Yes domain user should suffice. For password management  related functionality most of the operations are performed within the actual end user's context so the service account will not need any special permissions around password change either.

R11ver_
Occasional Contributor

Re: SSL4500 - AD LDAP - user privilege for AdminDN

Thanks a lot!