OpenVPN Access Server System Administrator Guide

OpenVPN Access Server System Administrator Guide OpenVPN Access Server System Administrator Guide

05.08.2013 Views

4.3 Authentication Pages 4.3.1 General Figure 32: General User Authentication page Access Server does not store and manage user credentials. Instead, it interfaces with one of the following systems for user authentication: Local: This is a user authentication system that is managed by OpenVPN Access Server. You can set the vpn users password on the User Permissions page when Local Authentication is enabled. PAM: Pluggable Authentication Modules - The system used to authenticate users to the Unix host running Access Server. RADIUS: Between one and five RADIUS servers can be contacted for user authentication and (optionally) also user accounting. LDAP: An Active Directory domain controller or other LDAP server is used to validate user credentials. On the General User Authentication page, you can choose between the three methods of authenticating Access Server users. This setting can also be changed on the configuration pages for PAM, RADIUS and LDAP (e.g., on the RADIUS page, you can press Use RADIUS if RADIUS isn't already chosen). Note, however, that only one authentication method type can be chosen for Access Server user authentication. OpenVPN Access Server System Administrator Guide 35

4.3.2 PAM Figure 33: PAM Authentication page PAM stands for Pluggable Authentication Modules and is the standard method for authenticating users on a Unix system. Selecting PAM for authenticating OpenVPN Access Server users means that users must provide the same username and password credentials to the Access Server as they would when authenticating to the Unix host that runs the Access Server. When PAM is not already selected to be used to authenticate users, the Use PAM button selects PAM (instead of RADIUS or LDAP) for authentication. When PAM is selected, there are no configuration settings to adjust in the Admin Web UI. Internally, the Access Server authenticates using a PAM service named openvpn_as, which corresponds to the file /etc/pam.d/openvpn_as (added during initial configuration of Access Server). OpenVPN Access Server System Administrator Guide 36

4.3.2 PAM<br />

Figure 33: PAM Authentication page<br />

PAM stands for Pluggable Authentication Modules and is the standard method for authenticating<br />

users on a Unix system. Selecting PAM for authenticating <strong>OpenVPN</strong> <strong>Access</strong> <strong>Server</strong> users means<br />

that users must provide the same username and password credentials to the <strong>Access</strong> <strong>Server</strong> as they<br />

would when authenticating to the Unix host that runs the <strong>Access</strong> <strong>Server</strong>.<br />

When PAM is not already selected to be used to authenticate users, the Use PAM button selects<br />

PAM (instead of RADIUS or LDAP) for authentication. When PAM is selected, there are no<br />

configuration settings to adjust in the Admin Web UI.<br />

Internally, the <strong>Access</strong> <strong>Server</strong> authenticates using a PAM service named openvpn_as, which<br />

corresponds to the file /etc/pam.d/openvpn_as (added during initial configuration of <strong>Access</strong><br />

<strong>Server</strong>).<br />

<strong>OpenVPN</strong> <strong>Access</strong> <strong>Server</strong> <strong>System</strong> <strong>Administrator</strong> <strong>Guide</strong><br />

36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!