Advanced Guide: LDAP Authentication on Ruckus vSZ via Azure AD Domain Services (Azure AD DS)
Since Ruckus Virtual SmartZone (vSZ) does not support SAML authentication for admin logins, you must use Azure AD Domain Services (Azure AD DS) to provide an LDAP interface that vSZ can authenticate against.
Below is a more detailed breakdown, including user group mappings and troubleshooting.
1. Configure Azure AD Domain Services (Azure AD DS) for LDAP
Step 1: Enable Azure AD DS
-
Log in to Azure Portal.
-
Go to "Azure AD Domain Services" (AAD DS) and create a managed domain:
- Set the DNS domain name (e.g.,
corp.yourcompany.local). - Choose a resource group and region.
- Select an Azure Virtual Network (VNet) (Ensure vSZ can reach this network).
- Set the DNS domain name (e.g.,
-
Synchronize Users from Azure AD to Azure AD DS:
- Azure AD DS automatically synchronizes users and groups from Azure AD.
- Users must have Kerberos and NTLM authentication enabled (this is automatic for synced users).
Step 2: Enable Secure LDAP (LDAPS)
- Enable Secure LDAP under Azure AD DS > Properties.
- Download and install the SSL certificate for LDAPS.
- Allow LDAP over SSL (TCP 636) through your Network Security Group (NSG).
Step 3: Verify LDAP Access
-
Run the following command from a machine that can reach Azure AD DS:
-
Connect to
yourdomain.localon port 636. -
Bind using an Azure AD DS admin account.
-
If successful, LDAP is ready.
2. Configure LDAP Authentication on Ruckus vSZ
Step 1: Add an LDAP Server
-
Log in to vSZ Web UI.
-
Navigate to Administration > AAA Servers.
-
Click Create and select LDAP.
-
Fill in the LDAP server details:
- Server Address: Enter the IP Address of Azure AD DS.
- Port:
636(for LDAPS). - Bind DN: A service account in Azure AD DS, e.g.:
- Password: The service account's password.
- Base DN: The starting point for LDAP searches, e.g.:
- User Attribute:
sAMAccountName - SSL: Enable LDAPS
- Certificate: Upload the LDAPS certificate from Azure AD DS.
-
Click Test Connection to verify authentication.
3. Configure User Group Mappings
Since Azure AD DS syncs groups from Azure AD, you can map LDAP groups to Ruckus admin roles.
Step 1: Find LDAP Group DNs
- Run
ldp.exeand connect to Azure AD DS. - Browse to OU=Groups to locate the full Distinguished Name (DN) of groups, e.g.:
Step 2: Assign LDAP Groups in vSZ
-
Go to "Administration > Users & Roles".
-
Create a new User Group.
-
Select "Authentication Type: LDAP".
-
Enter Group DN, e.g.:
-
Assign appropriate permissions (e.g., System Admin, Read-Only Admin, etc.).
-
Save and Apply.
4. Troubleshooting LDAP Authentication on vSZ
Issue 1: LDAP Connection Fails
- Check firewall rules: Allow TCP 636 from vSZ to Azure AD DS.
- Verify LDAPS certificate: Upload it again if necessary.
- Ensure service account has permissions to query LDAP.
Issue 2: Users Cannot Log In
- Confirm correct Base DN: Run
ldp.exeto verify the correct structure. - Ensure correct user attribute (
sAMAccountName) in vSZ settings. - Try logging in with UPN (
[email protected]) instead of the username.
Issue 3: Group Mappings Do Not Work
- Use full group DN (not just the group name).
- Ensure users are in the correct group in Azure AD DS.
- Run
ldapsearchto manually verify group membership.
Final Thoughts
Using Azure AD DS with LDAPS is the best way to integrate Azure authentication with Ruckus Virtual SmartZone (vSZ). With proper LDAP configuration and group mappings, you can ensure secure authentication and centralized management.
No Comments