Barra de espaço
Barra de espaço

This tutorial presents a detailed procedure showing how to configure zabbix to authenticate on the active directory of microsof through the LDAP protocol.

YOUTUBE

In our channel you can view the video of this tutorial.



Go to the domain controller where users must be authenticated and create a firewall rule allowing the incoming of TCP packets on port 389. (As shown in the video above)


zabbix autenticar no active directory via ldap 1

zabbix autenticar no active directory via ldap 2

zabbix autenticar no active directory via ldap 3



Go to the active directory and create two users:

  • admin - Administrative Zabbix User
  • zabbix - The user that the zabbix server will use to query the password based on active directory

zabbix autenticar no active directory via ldap 4

Open your browser and access the Zabbix web interface.

zabbix monitorar vmware 1


Click on the administration menu, select the Authentication option and select the LDAP option.

When presented to the authentication properties, configure your LDAP authentication according to our example below.  

zabbix autenticar no active directory via ldap 5

In our example:

  • 52.10.72.212 - It is the IP address of the domain controller.
  • dc=fkit,dc=local - It is the name of our domain FKIT.LOCAL
  • This email address is being protected from spambots. You need JavaScript enabled to view it. - It is the account that will be used by zabbix to search the password in active directory

Test your setup and when it works properly, click on the update button

Note! Remember that in order to authenticate a user against active directory, it must also exist in the zabbix server user database. 


When you have finished your configuration, try to log in with the active directory admin user on the web interface.


zabbix autenticar no active directory via ldap 6

 

 CONCLUSION

This tutorial presented the Zabbix configuration process to authenticate the password for your users in the active directory using LDAP.