This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Using Active Directory to Authenticate Selected VPN Users

I would like to set up a VPN at the company office, but limit access to only selected user accounts on our Windows Server. I have successfully created the Authentication Server in Definitions and Users, Authentication Services. The Test server settings and Authenticate example user Tests both pass.

When configuring a VPN, I can choose "Active Directory Users" for Users and Groups, but I cannot choose only a subset of those users.

What are the steps necessary to have a selectable list of active directory users for my VPN services? (Step by step, please.)

Will I be violating Bob's Rulz #6 if I allow users to use their Windows passwords to authenticate to the VPN?



This thread was automatically locked due to age.
Parents
  • You can create a group on the UTM with backend Acrive Directory which is limited to a AD group:

    ----------
    Sophos user, admin and reseller.
    Private Setup:

    • XG: HPE DL20 Gen9 (Core i3-7300, 8GB RAM, 120GB SSD) | XG 18.0 (Home License) with: Web Protection, Site-to-Site-VPN (IPSec, RED-Tunnel), Remote Access (SSL, HTML5)
    • UTM: 2 vCPUs, 2GB RAM, 50GB vHDD, 2 vNICs on vServer (KVM) | UTM 9.7 (Home License) with: Email Protection, Webserver Protection, RED-Tunnel (server)
Reply
  • You can create a group on the UTM with backend Acrive Directory which is limited to a AD group:

    ----------
    Sophos user, admin and reseller.
    Private Setup:

    • XG: HPE DL20 Gen9 (Core i3-7300, 8GB RAM, 120GB SSD) | XG 18.0 (Home License) with: Web Protection, Site-to-Site-VPN (IPSec, RED-Tunnel), Remote Access (SSL, HTML5)
    • UTM: 2 vCPUs, 2GB RAM, 50GB vHDD, 2 vNICs on vServer (KVM) | UTM 9.7 (Home License) with: Email Protection, Webserver Protection, RED-Tunnel (server)
Children
No Data