cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1953
Views
0
Helpful
4
Replies

ACS 5.1 / ASA fallback to local AAA if user unknown

Hi there

I know the way to configure the ASA to fallback to LOCAL authentication, if the Radius server is not available.

Now we would like to authenticate the local users, if the user is not found in the AD. Is this possible and how can I configure this with the new policies? I tested it with "dropping" when the user is not found in the AD, but then the Radius server will be marked as "dead" and the other AD users can't login for a given period. Maybe we can configure the dead time to 0, but this is not as nice it could be.

Thanks a lot in advance and best regards?

Dominic

2 Accepted Solutions

Accepted Solutions

jrabinow
Level 7
Level 7

This can be done by creating an identity sequence (Users and Identity Stores > Identity Store Sequences)

An identity store sequence allows you to access multiple databases in sequence until user authenticates

Create a sequence and select Password Based and then AD1 followed by "Internal Users" in the "Authentication Method List". Once created the sequence can then be selected as the result of the corresponding identity policy

View solution in original post

jdcarpenter
Level 1
Level 1

You should be able to accomplish this in the configuration of your tunnel group on your ASA.

tunnel-group general-attributes

     authentication-server-group LOCAL

The keyword 'LOCAL' will have the ASA try the local ASA database if the authentication attempts to ACS via RADIUS fails.

View solution in original post

4 Replies 4

jrabinow
Level 7
Level 7

This can be done by creating an identity sequence (Users and Identity Stores > Identity Store Sequences)

An identity store sequence allows you to access multiple databases in sequence until user authenticates

Create a sequence and select Password Based and then AD1 followed by "Internal Users" in the "Authentication Method List". Once created the sequence can then be selected as the result of the corresponding identity policy

Thanks for the answer. But we already configured first AD1 and then Internal Users. But what I want is the local users on the ASA, not the ACS?

The sequence is really useful, but can I use an authorization policy for each identity store ?

jdcarpenter
Level 1
Level 1

You should be able to accomplish this in the configuration of your tunnel group on your ASA.

tunnel-group general-attributes

     authentication-server-group LOCAL

The keyword 'LOCAL' will have the ASA try the local ASA database if the authentication attempts to ACS via RADIUS fails.