Anonymous bind when using Sensu-go ldap integration

#1
  1. We tried the below found to have working
  • Configured sensu go ldap to talk to Active Directory with a bind user and password
  • Successful in making a connection and authenticate a user with AD credentials
  1. Tell us about your setup, this should include OS, version of Sensu, version of Sensu components (redis, rabbitmq), plugin versions (if applicable), anything special about your setup such as an airgapped network or strict ACLs
  • Sensu go 5.2
  • RHEL 6.x / 7.x
  • LDAP: Active Directory
  1. Is there a Github issue related to your issue?
    N/A
  2. Is there anything else that can help us effectively help you?
  • is there a possiblity to provide anonymous user to bind to the LDAP, as there are cases where we have regional AD instances and we dont want to manage a bind user and use SSL and interact with AD using a anonymous bind when the cert and root ca matches
#2

Hi Suresh, thanks for letting us know about your needs around anonymous binding and TLS/SSL mutual authentication.

I’ve opened enhancement requests for these items with our team and will be happy to provide you updates through our commercial support channels as we work toward implementing them.

#3

Thanks Cameron

Thanks & Regards,

¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾¾--------------------
Suresh Subramaniam| VP | CATE Emerging Technologies | CitiManagementTools | APAC

PH:
+65 6595 2029

email:
suresh.subramaniam@citi.com

Find Me

cid:image001.png@01D1FED6.1C8268A0

Citi Singapore Campus, 3 Changi Business Park Crescent, Singapore - 486026.

FOLLOW ME on Collaborate

FIND ME on Citi Global Directory

FOLLOW Sensu on Collaborate

FOLLOW Sensu on SharePoint

closed #4
#5

@sureshs We released Sensu Go 5.6 today, adding mutual TLS authentication and anonymous bind capabilities to our LDAP and ActiveDirectory integrations. Please see our release notes and our updated authentication documentation for further details!

1 Like