Configure squid for LDAP authentication using squid_ldap_auth helper

by on January 13, 2007 · 18 comments· LAST UPDATED June 20, 2008

in , ,

My last post was about Squid proxy authentication using ncsa_auth helper. This time I will show you how to configure squid for LDAP authentication.

The Lightweight Directory Access Protocol, (LDAP) is a networking protocol for querying and modifying directory services running over TCP/IP.

LDAP server (such as OpenLDAP or others) uses the Lightweight Directory Access Protocol. In order to use Squid LDAP authentication you need to tell which program to use with the auth_param option in squid.conf. You specify the name of the program, plus command line options.

Squid comes with squid_ldap_auth helper. This helper allows Squid to connect to a LDAP directory to validate the user name and password of Basic HTTP authentication. This helper is located at /usr/local/squid/libexec/ or /usr/lib/squid or /usr/lib64/squid/ directory.

Step # 1: Make sure squid can talk to LDAP server

Before configuring makes sure that the squid is working with LDAP auth. Type the following command:
# /usr/lib/squid/squid_ldap_auth -b "dc=nixcraft,dc=com" -f "uid=%s" ldap.nixcraft.com

Once you hit enter key you need to provide UID and password using following format:
USERID blankspace PASSWORD

If it was able to connect to LDAP server you will see "ok".

Step # 2: Configuration

Open your squid.conf file:
# vi /etc/squid/squid.conf

Next you need to add following code which specifies the base DN under where your users are located and the LDAP server name.
auth_param basic program /usr/lib/squid/squid_ldap_auth -b "dc=nixcraft,dc=com" -f "uid=%s" -h ldap.nixcraft.com
acl ldapauth proxy_auth REQUIRED
http_access allow ldapauth
http_access deny all

Save and close the file. Restart Squid to take effect.
# /etc/init.d/squid restart

Zimbra LDAP With Squid

You need to use it as follows
/usr/lib/squid/squid_ldap_auth -v 3 -b dc=zimbra,dc=example,dc=com -f "(&(uid=%s)(objectClass=zimbraAccount))" -h zimbra.example.com

Squid authentication against Microsoft's Active Directory

I have not used group_ldap_auth helper against Microsoft's Active Directory. But someone (user) pointed out the following solution. Add following configuration directive to squid.conf:

ldap_auth_program /usr/lib/squid/group_ldap_auth -b dc=my-domain,dc=de -h \
server.my-domain.de -p 636 -g distinguishedName -d CN=lookup,OU=Services,\
OU=Users,DC=my-domain,DC=de -w lookup -u cn -m member -o group -S -l \
/var/log/squid/ldaplog
acl ldap_backoffice ldap_auth static 'CN=BackOffice,OU=Groups,dc=my-domain,dc=de'
acl ldap_management ldap_auth static 'CN=Management,OU=Groups,dc=my-domain,dc=de'
acl ldap_it-service ldap_auth static 'CN=IT-Service,OU=Groups,dc=my-domain,dc=de'
acl ldap_development ldap_auth static 'CN=DEVELOPMENT,OU=Groups,dc=my-domain,dc=de'
http_access allow ldap_development
http_access allow ldap_backoffice
http_access allow ldap_management
http_access allow ldap_it-service
http_access deny all

Further readings

  • man squid_ldap_auth
  • man group_ldap_auth
TwitterFacebookGoogle+PDF versionFound an error/typo on this page? Help us!

{ 18 comments… read them below or add one }

1 tt binda March 27, 2008 at 10:33 am

Ehi! If you have any problem, start to try with -v 3 instead of ldap version 2.
I could bind to my ldap server in reason of this.
It is a good start this try:
# /usr/lib/squid/ldap_auth -b “dc=mydc” -D cn=admin,dc=mydc -w passwd -H ldap://ldapserver -v 3 -f “uid=%s”

when typed name and password you must see
OK. Be sure to have typed name and password with a blank separator.
byee

Reply

2 Manoranjan April 27, 2011 at 11:29 am

thanks a ton bro…. mine started workin with -v 3
auth_param basic program /usr/lib64/squid/squid_ldap_auth -b dc=MYDOM -D cn=root,dc=MYDOM -w password -H ldap://127.0.0.1 -v 3 -f uid=%s

Reply

3 Deepak March 31, 2008 at 5:13 am

IF i configured Active directory Ldap with Squid for authendication than ,how can i block internet access as per user ??? want to block internet access as per user.

Reply

4 John J. Martinez December 13, 2008 at 8:46 pm

Excelente!!!
Muchas gracias!!
Excelent!!!
Very thanks!!

Reply

5 Paul December 15, 2008 at 10:04 am

Excellent! I also had to specify version 3 before my query would work. Thanks.

Reply

6 rajkumar December 16, 2008 at 2:39 pm

Hi Friends,

this is the first time i’m posting query.i need in help for configure squid proxy server . i.e, i want to block url and download by user based , not based on ip address. that while i’m trying to open IE (or) FIREFOX (or) OPERA , it have to ask for username and password , the permission will be granted accordimg to user. if any user can login in any system but proxy have to block according to their username and password. i need squid proxy based on user restriction not on ip address restricting. please try to solve my problem by sending configuration method to me. thank you friends

Reply

7 eder December 22, 2008 at 2:21 pm

Hello.
I’m trying to auth against zimbra with this command :

/usr/lib64/squid/squid_ldap_auth -v 3 -b dc=zimbra,dc=mydomain,dc=com,dc=br -f “(&(uid=%s)(objectClass=zimbraAccount))” -h myserver.mydomain.com.br

after inserting user pass and user@domain I get this answer.

squid_ldap_auth: WARNING, LDAP search error ‘No such object’
ERR Success

could you help me, please?

Reply

8 Zied Fakhfakh May 19, 2009 at 7:21 am

I got this error too,

and I’m pretty sure it’s a permission issue. As the LDAP server from LDAP won’t let you see (read) the userPassword Attribute.

Should we create a squid user on ldap, give him the permission to read userPassword and uid ?

any idea is welcome,
Zied.

Reply

9 Deiveegan.S September 19, 2009 at 6:09 am

hello sir

how to configure LDAP in Red hat Linux 5.3 .then how to make centralized login for windows and linux .Here we are having Nasstore ,Linux mail server, squid and one windows client . the user should login in one user name and password to all the system above please give me your suggestion and tutorial to do ..which flavor is essential for LDAP Fedora or red hat Linux

Thanking you,

with regards
Deiveegan.S
Tifac-Core
SASTRA University,
Thanjavur-613402
Mobile :09843015235

Reply

10 Niraj M. Vara September 24, 2009 at 5:27 am

this is perfect working for squid ldap authentication, my query is that we have any perl or cgi script which can change users password from anywhere.

Reply

11 khaled January 10, 2010 at 10:23 am

i can ‘nt bind the server zimbra with php what i must to do?

Reply

12 cristian January 18, 2010 at 4:52 pm

Its posible to setup squid with zimbra with enable/disable users suport only for internet access ?

Reply

13 Markus July 12, 2011 at 9:37 pm

Hello everyone,

please consider the following line in the squid.conf, if you try to authenticate against ldap server.
auth_param basic utf8 on

If the browser authentification is transmitted via iso 8859-1 (west europe) and ldap only understands UTF-8, some characters will not be correctly sent to and interpreted by the ldap server.
add the line and give it a try…

with kind regards

Markus (Germany)

Reply

14 Sagar July 23, 2011 at 1:12 pm

while trying to communicate with the LDAP server, am getting an ERR.

/usr/local/squid/libexec/squid_ldap_auth -b o=xyz,c=IN -D cn=Manager,o=xyz,c=IN -w adDs7w543FDsf -h ldap.xyz.com
Where r we going wrong? However we are able to telnet LDAP server on the prescribed port…..
Can anyone help on this?????

Reply

15 Rodrigo August 6, 2012 at 5:15 pm

Hello !
With your ldap_auth doc is working.
I get login my users with auth.
Very good is tip.

Reply

16 srinivas April 29, 2013 at 11:48 am

this authentication process is working fine.

Can you please tell me how can i block site for specific users .

Reply

17 srinivas April 29, 2013 at 2:03 pm

Now it is working ,By using these below lines,

acl blockusers proxy_auth “/usr/local/etc/blockusers”
acl badsite dstdomain http://www.facebook.com
http_access deny blocksers badsite

i entered some users from ldap in to /usr/local/etc/blockusers

Reply

18 zahadom June 3, 2013 at 11:50 am

Very good job!!
thanks

Reply

Leave a Comment

Tagged as: , , , , , , ,

Previous post:

Next post: