@hbc because as @mimugmail pointed out, LDAP (even though the domain controllers are actually using LDAPS)
doesn't work if the password's sent cleartext. This was my logic behind using the imported users; being already in the system I'd be circumventing the sending-credentials-in-the-clear part necessary for tunneled EAP. Apparently not, plus...I think it still queries for updates the upstream servers anyway, it's in the documentation I believe.
@mimugmail Yeah I know. Unfortunately I just can't quite get it to work: I deployed a separate dedicated FreeRADIUS server, joined AD and get it to authenticate to AD, users can log in to the system with their AD credentials and Kerberos works flawlessly, also using the FR CLI tools for testing pass all tests. However when it's time to FreeRADIUS to do it's thing with an actual client something fails. :( So far the only RADIUS server I've been able to get to work using the AD base it's NPS itself! I'm OK with that but it's missing some protocols and the extra attributes from the hotspot services that make it super useful, OPNsense's got those built-in.
This leaves me more confused as there's a tiny Nextcloud instance that also uses LDAP to connect to AD, in order for it to be able to let users modify their passwords LDAPS must be used so no cleartext credentials are flying around from server to server unprotected, pretty much the same concept of FreeRADIUS's. Just as OPNsense, Nextcloud works fine with AD through LDAPS, the actual directory not that ADAM decoy thing. Other non-MIcrosoft systems work fine too, like Synology, Univention...macOS Server even "Kerberizes" services.
Anyway, thank you both for getting your answers. I'll keep trying. Maybe I have better luck on an Ubuntu-based distro or something like that. I really like the OPNsense UI though, and I had just discovered the themes too! :(
doesn't work if the password's sent cleartext. This was my logic behind using the imported users; being already in the system I'd be circumventing the sending-credentials-in-the-clear part necessary for tunneled EAP. Apparently not, plus...I think it still queries for updates the upstream servers anyway, it's in the documentation I believe.
@mimugmail Yeah I know. Unfortunately I just can't quite get it to work: I deployed a separate dedicated FreeRADIUS server, joined AD and get it to authenticate to AD, users can log in to the system with their AD credentials and Kerberos works flawlessly, also using the FR CLI tools for testing pass all tests. However when it's time to FreeRADIUS to do it's thing with an actual client something fails. :( So far the only RADIUS server I've been able to get to work using the AD base it's NPS itself! I'm OK with that but it's missing some protocols and the extra attributes from the hotspot services that make it super useful, OPNsense's got those built-in.
This leaves me more confused as there's a tiny Nextcloud instance that also uses LDAP to connect to AD, in order for it to be able to let users modify their passwords LDAPS must be used so no cleartext credentials are flying around from server to server unprotected, pretty much the same concept of FreeRADIUS's. Just as OPNsense, Nextcloud works fine with AD through LDAPS, the actual directory not that ADAM decoy thing. Other non-MIcrosoft systems work fine too, like Synology, Univention...macOS Server even "Kerberizes" services.
Anyway, thank you both for getting your answers. I'll keep trying. Maybe I have better luck on an Ubuntu-based distro or something like that. I really like the OPNsense UI though, and I had just discovered the themes too! :(
"