Posted on 07-07-2016 09:45 AM
Like the title says. OneLogin offers a vLDAP feature which will turn your OneLogin user directory into a cloud-based LDAP directory. It works 75% of the time but I've noticed that it will run into an error such as losing connection/not being able to query any users. Has anyone had better luck or tried using this?
Posted on 07-09-2016 12:14 PM
Posted on 07-11-2016 10:53 AM
@bentoms Yes I spoke with JAMF support regarding that. It will perform authentication for user-initiated enrollments but it will not perform LDAP functions like lookups and binding. Specifically, 9.93 won't perform authentication during DEP or assign users to devices. Hopefully that will change later down the road!
Posted on 10-18-2016 07:36 AM
Hi! Do you just use this for user initiated enrollment? I'm curious to see if it integrates with the OneLogin Desktop App.
Posted on 10-18-2016 04:18 PM
Hey there. I ended up not going with vLDAP because it didn't work 100% of the time. I did get user initiated enrollment to work with OneLogin via SAML which was introduced in 9.93. If you want some direction with that, I'm happy to help where I can
Posted on 01-30-2018 11:39 PM
@bluo212 were you able to get User Group Mappings or User Group Membership Mappings working with VLDAP? I'm able to get users working fine but having difficulty with the other two.
Thanks!
Posted on 07-17-2018 06:04 AM
Tangerinehuge can you please tell me how you were able to configure OneLogin LDAP with JAMF
Posted on 09-10-2018 12:33 PM
@tangerinehuge - are you able to shed some light on how you have vldap configured? I also cant seem to get any of the group mapping tests to work successfully.
Posted on 09-14-2018 06:13 PM
Sorry, forgot to reply earlier. I haven’t gotten groups to work either. Supposedly the new version of OL will work better if they ever release it. At this point I may decouple it from LDAP entirely and just work with the APIs.
Posted on 10-29-2018 01:42 PM
So I finally got OneLogin to be forthright about this after countless hours of communication as well as OL trying to get me to engage a third party partner of theirs to get this working. -__-
"He did see your message and said that he can't provide the mappings information you requested until the group search functionality is out. -- After meeting with the developers this week, he's optimistic this will be implemented in November, but worse case, we have engineering commitment to have it finished prior to the end of the year."
We are very likely ditching vLDAP for JumpCloud. It works.
Posted on 01-28-2019 10:45 AM
@tangerinehuge - OneLogin just relayed to me that group lookup should be working with their vLDAP now. Is it working for you?
Posted on 04-01-2019 04:10 PM
Hi guys I am planning to use OneLogin VLDAP with Jamf Pro unfortunately, I cannot find any documentation.
Please can you point me in the right direction or if you have one can you share it. The email address to share it to is info@cancersl.org
I would be grateful if you can share anything that would be useful.
Thank you
Posted on 04-05-2019 01:52 PM
@bkebbay - Just had a call with OneLogin again today and they are making progress but group lookup is still not functional as we were once told.
User lookup however has actually always been working.
Check out: https://onelogin.service-now.com/support/?id=kb_article&sys_id=7b3ad943db109700d5505eea4b9619db
Posted on 06-06-2019 10:06 PM
@Br3ck Do you know if OneLogin made any progress with fixing the group lookup?
Posted on 06-10-2019 05:06 PM
@Br3ck So I reached out to OneLogin support and they advised that the account you specify in the Jamf LDAP config should have super-user permissions set in the OneLogin console. I've done this and can verify that it works for user, group and group membership lookups.
Posted on 09-17-2019 03:03 PM
@typeraj - Raj! So nice to see you here! Hope you're well.
Sorry for the severe delay here, I somehow missed your reply.
I've been working with OneLogin on this for months now and it seems still pretty dead in the water for us at least.
I appreciate the super user tidbit but unfortunately we have had that permission in place since the initial configuration of vLDAP in JAMF so that wasn't our snag unfortunately.
While the built-in testing mechanism in the JAMF LDAP config pane seems to work successfully for user, group and group membership lookups, it doesn't actually function in action. I can't successfully scope policies to LDAP groups nor can my IT team authenticate to JAMF Pro using vLDAP (say in JAMF Remote as an example or at the /?failover auth URL).
The engineer I have been working with at OneLogin swears this functionality works in their internal instance of JAMF but I have yet to successfully get this going in ours even with their hand holding on call after call with them. Are you able to confirm that you can scope (limit) using a vLDAP group?
Also are you able to add an LDAP group to the JAMF user administration and have your team successfully authenticating that way? (Not individual LDAP account creation within JAMF that part works but who cares because thats not really sustainable :P)
Posted on 10-22-2019 11:21 AM
@Br3ck I am super interested to hear about your work on this. i find myself in the same boat - needed to get this configured for our organization. Please post any more info or updates - thank you!
Posted on 02-13-2020 12:28 PM
@AdminIA - I am meeting with OneLogin today, stay tuned :)
Posted on 03-25-2020 03:52 PM
Posted on 04-02-2020 10:03 AM
@davizmr - wow sorry I am so bad at responding here. Its still not working properly with JAMF from my perspective :-/
This is the latest I have from our NoLogin rep about vLDAP:
*I'm reaching out to advise our base VLDAP refactor came out in our March release. Please find the release notes linked here.
vldap4.us.onelogin.com has also been updated with name attribute and entryDN enhancements.
However please note: there are also role/group search performance improvements coming soon which will be important for Jamf Pro testing. We'd recommend re-testing once all improvements are released for best results.*