Authentication with Google Secure LDAP Service

Version: 19th May 2025

1. Introduction

This document describes primary user authentication to Google LDAP Server for Windows Workstations and Windows Servers using the Comtarsia Logon Client.

A prerequisite is a Google Frontline/Business/Education/Enterprise account where LDAP services are available.

The Google LDAP server requires the client to use client certificates. This is not very common with LDAP servers and therefore, the Comtarsia Logon Client itself does support this via an external free service, Stunnel. This guide describes the method suggested by Google, using the free tool stunnel.

Further information on how to set up clients to use the Google Secure LDAP service can be found here: https://support.google.com/a/answer/9089736


2. Setup LDAP Client in Google LDAP Server

First, an LDAP client must be added in your Google Workspace Admin console.

image001 image002 image003 image004

Download the certificates for this LDAP Client connection and make these files available to the Windows client. The use is described in the following chapter.

image005 image006

The LDAP client still needs to be enabled. Please ensure that the status for the LDAP client is set to "ON".

image007 image008 image009

For LDAP authentication, at least one user with appropriate permissions must be created.

image010

In order for local group mapping to be used in the Logon Client, at least one LDAP group must be created in which the user is a member.

image011

3. Setup Stunnel

The tool “Stunnel” must be installed and configured. It can be installed on the same computer as the Comtarsia Logon Client or on another computer. Multiple Comtarsia Logon Clients can share one Stunnel instance.

Download the latest version from the official website: https://www.stunnel.org/downloads.html

image012

Replace the entire contents of the configuration file C:\Program Files (x86)\stunnel\config\stunnel.conf with the following parameters:

debug = 7
output = stunnel.log

[ldap]
client = yes
accept = 0.0.0.0:1636
connect = ldap.google.com:636
cert = ldap-client.crt
key = ldap-client.key

The Google client certificate files, described in the previous chapter, must now be copied to the C:\Program Files (x86)\stunnel\config\ directory and must be renamed to ldap-client.crt and ldap-client.key.

image013

In order for the stunnel tool to start automatically in the background, it must be installed as a service. The service installation is performed via the command stunnel.exe -install by using an administrative command line window.

image014 image015

Please also make sure that the service has been installed and is running.

image016

4. Setup Comtarsia Logon Client

For authentication on the Windows system, the Comtarsia Logon Client credential provider must be installed.

Please download the latest setup bundle from: https://signon.comtarsia.com/main/en/Download

image017

Run the installer with administrative rights and select the Logon Client module.

image018

After installation, a system restart is required.

The Comtarsia Logon Client is configured by using the Comtarsia Management Console.

The authentication mode must be changed to LDAP.

image019

In order for the logon client to perform authentication via the stunnel interface, the LDAP host must be 127.0.0.1 (if Stunnel is installed on the same computer) and the port 1636 must be specified. The Base DN must match the Google LDAP configuration.

image020

The User DN prefix must be defined as uid= and the User DN suffix must be defined as ,ou=users.

image021

To ensure that LDAP logins work on a server system, this example shows how to assign the Google LDAP group to the local built-in group Administrators. Any LDAP group (left column) can be assigned to any local group (right column).

image022

A system login via the Comtarsia Logon Client, by entering the short name of the LDAP user and the defined password, is now possible.

image023