I'm using openvpn with ldap authentication connected to our windows Active Directory.
When openvpn client connects it uses user and password form AD. (so opnsense has the ability to know if an user is in a specific AD group)
I want to define some specific rules like: if user in "Developer Group" allow ssh to xxx.xxx.xxx.xxx internal IP.
Is there a way to do this on openvpn?
Thx!
(ps: I'm migrating from stormshield, and it has this functionnality)
Firewall > Aliases > OpenVPN group
should do the trick. I have not tried it with AD, though.
Hi, it work? regards