This page describes how to set up Foxpass to delegate authentication to Google's LDAP, bypassing Google's MFA.
Our regular Google delegated authentication cannot check passwords for accounts configured with Google's MFA. However, we can get around this restriction by using Google's LDAP endpoint to check passwords, bypassing MFA.
By using Google's LDAP as a delegated authentication source, we can expose Google's LDAP to RADIUS and non-TLS based systems by acting as a proxy.
Note: Use of Google's LDAP requires a license to one of Google Workspace Business Plus; Enterprise Standard or Plus; Education Fundamentals, Standard, Teaching and Learning Upgrade, or Plus; or Cloud Identity Premium.
Sign up for Google Workspace Enterprise Plus, Cloud Identity Premium, G Suite for Education, or G Suite for Education using the links below:
Google Workspace Enterprise Plus - https://support.google.com/a/answer/7284269
Cloud Identity Premium - https://cloud.google.com/identity/
G Suite Enterprise for Education - https://support.google.com/a/answer/7370133
G Suite for Education - https://edu.google.com/products/gsuite-for-education/
Google Workspace Enterprise Plus, Cloud Identity Premium, G Suite Enterprise for Education, or G Suite for Education is required for Secure LDAP use as shown by these docs.
Next, assign Enterprise or Cloud Identity licenses to your users that use Foxpass. You can read more about how to assign a license here:
Google needs to register each LDAP client that connects to it separately. You'll need to create a specific entry for Foxpass in Google. Generalized instructions from Google on this process can be found here:
Go to your Google Admin account at admin.google.com and select 'Apps.' Then, select LDAP from the Apps menu.
Click 'ADD CLIENT'. Then name the client appropriately.
Next, set permissions for the Foxpass connection. For delegated authentication, Foxpass needs credential verification for all users that use Foxpass. Select all users or whatever specific OU's you use in Foxpass. Read user information and read group information permissions are not necessary.
Then, download and unzip the certificate and key from Google. You should have a .crt and a .key file. You'll upload these into Foxpass later.
Finally, enable the Foxpass integration by setting the status to ON and saving the settings in the Google console.
Go to the Foxpass 'Authentication Settings' page. Go to the "Password authentication delegation" panel. Choose Google Secure LDAP from the dropdown menu. Next, upload your certificate and key from the previous section and click save.
Now, try signing into one of your systems that's configured with Foxpass using your Google password and you're all set!
If you're having authentication issues, you'll want to check the logs to see what error is occurring under the hood.
You can find instructions on how to check Google's logs here:
Foxpass logs for RADIUS and LDAP can be found here:
Common error codes:
|Error code||Possible issue|
|INSUFFICIENT_ACCESS||- incorrect user password|
- user is missing Enterprise or Cloud Identity Premium license
- LDAP client is disabled in Google
|SERVER_DOWN||- incorrect certificate/key combination|
I just made a change in Google and nothing is happening:
Wait 10 or so minutes and try again. Google takes time to update.
What if my issue isn't listed here:
Read Google's guide on common error messages:
Updated 12 months ago