product icon

How do I run diagnostics for LastPass Universal Proxy v4.x?

    Use the diagnostic tool for LastPass Universal Proxy to discover and troubleshoot general connectivity issues.

    About this task:
    Note: Requirements:
    • Windows PowerShell 3.0 or higher on Windows operating system
    • Debian-based OS or RedHat-based OS on Linux operating system
    Note: This feature requires an account with the LastPass Business + Advanced MFA add-on. How do I upgrade my LastPass Business account with an add-on?
    Note: You can use the diagnostic tool only for the LDAP and RADIUS protocols. LDAPS protocol diagnostics are currently not supported.

    The diagnostic tool checks the configuration provided in the server.properties configuration file. It automatically detects whether LDAP or RADIUS protocol is used and checks their communication with the appropriate services.

    Note: The diagnostic tool checks the MFA authentication only with a push notification.

    When run, the scripts perform a series of tests and present the results in a console output and also in file, located in /logs folder. The output begins with a summary section that provides a SUCCESS or FAIL indicator for each of the test. A summary of the settings is also listed.

    The result of the diagnostics is saved to a .log file in the C:\Program Files\LastPass\Universal Proxy\logs directory on Windows operating system (or the path you selected during installation, if different) and in the /usr/local/universalproxy/logs directory on Linux operating system.

    If all tests pass, then the output indicates that the specified servers are reachable and can respond to service requests correctly.

    Note: Every check starts with a LastPass Service reachability check. If this check fails, the test will not continue.
    • Select one of the following options based on your operating system:
      • To run diagnostics on Windows operating system, open PowerShell and execute the following command:
        uproxy -diagnostic
      • To run diagnostics on Linux operating system, open the CLI and execute the following command:
        sudo uproxy -diagnostic

    Checking whether Universal Proxy can access the LastPass service

    About this task: This test checks whether Universal Proxy can communicate with the LastPass service.
    • Example:

      Result:

      • SUCCESS: Indicates that Universal Proxy can access the LastPass service.
      • FAIL: Indicates that Universal Proxy is unable to communicate with the LastPass service.

    Checking the RADIUS server configuration with Universal Proxy

    About this task: In this test a RADIUS Access-Request is initiated to check whether the VPN server/Universal Proxy can communicate with the RADIUS server, the RADIUS server will accept or reject the request. This test also checks whether the user receives a push notification to their phone.
    • When running the script, you should add the following:
      • Enter user logon name:
      • Enter user's password:

      For the description of the required properties, see LastPass Universal Proxy 4.x RADIUS configuration using command line on Windows.

      Example: RADIUS server configuration with SFA server mode (SUCCESS)

      RADIUS server configuration with SFA server mode - Success

      Example: RADIUS server configuration with SFA server mode (FAILURE)

      RADIUS server configuration with SFA server mode - Failure

      Example: RADIUS server configuration with LP server mode

      RADIUS server configuration with LP server mode

      Result:

      • SUCCESS:
        • Indicates that the RADIUS server is accessible, expects authentications on the given port and that the user is present with the provided username/password.
      • FAIL:
        • Receive timed out: Indicates that the RADIUS server is not accessible on the given IP address/port.
        • Access-Reject: The response is received but the credentials of the provided user were wrong.

    Checking the LDAP server configuration with Universal Proxy

    • When running the script, select one from the following set of instructions based on your server mode configuration:
      Server Mode Configuration Instructions
      SFA Add the following parameters:
      • Enter user's distinguished name
      • Enter user's password
      LP Add the following parameters:
      • Enter user's LP account name
      • Enter user's password
      PLP Add the following parameters:
      • Enter user's distinguished name
      • Enter user's password
    • Checking whether a designated user can be found in the LDAP server. In this test an LDAP search request is initiated to determine if an LDAP user search will find the necessary user attributes. The LDAP user entry search is first based on the user's distinguishedName, then on the naming attribute which was set in Universal Proxy configuration (by default, it is sAMAccountName on Windows and UID on Linux). For more information on the user configuration, see Configuration checklist for LastPass Universal Proxy using LDAP protocol on Windows.
      Important: The maximum length of the sAMAccountName is 20 characters.

      Example: LDAP server configuration with SFA server mode

      LDAP server configuration with SFA server mode - 1

      LDAP server configuration with SFA server mode - 2

      LDAP server configuration with SFA server mode - 3

      LDAP server configuration with SFA server mode - 4

      Example: LDAP server configuration with LP server mode

      LDAP server configuration with LP server mode

      Result:

      • SUCCESS: Indicates that the LDAP server is up and running.
      • FAIL:
        • Timeout: Indicates that the LDAP server is not accessible on the given IP address/port.
        • Empty search response LDAP server is accessible, but user is not found.

    • Checking whether a designated user can authenticate to the LDAP server. In this test an LDAP bind request is initiated to check whether a designated user can authenticate to the LDAP server.

      Example:

      Result:

      • SUCCESS: Indicates that the LDAP server is there, listening on the given port and the provided user with the given password was found.
      • FAIL:
        • Timeout: Indicates that the LDAP server is not accessible on the given IP address/port.
        • Access-Reject: The LDAP server is there but the credentials of the provided user were wrong.

    • Checking if the user receives a push notification to their phone.

      Example:

      Result:

      • SUCCESS: The push notification was received and accepted.
      • FAIL: The push notification was not received.