Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
New Member

ACS 5.2: Restricting access based on AD groups

Hello,


Can somebody provide me please with a clear guide how should I configure the question above?

I'm dealing with EAP-TLS situation if that matters (first time set-up, never worked before). As a matter of fact, other EAP flavors will follow – based on the same idea (must belong to certain AD group to authenticate).


Brand new ACS 5.2. I set up an identity rule, using the AD defined, as the authenticator. And an authorization rule – matching only AD1:External Groups (contain all), a certain group I've chosen from the "Directory Groups" tab of AD setup.


The problem is – although I take some users out of that group in active directory (let call it "wireless"), the user does authenticate against the "contained in wireless group" rule. Needless to say, both the identity and authorization default rules say "DenyAccess". Moreover, when I query the AD (using the directory attributes tab of AD setup) I can clearly see that this user does belong (or doesn’t) to that group. And somehow, ACS has problems authenticate correctly.


Any HOWTO guide will be appreciated. In fact, any help will be appreciated but I probably miss something so to begin with – maybe a clear documentation is all that needed (please do not offer cisco's )

Best Regards,
Alex.

Everyone's tags (4)
1 ACCEPTED SOLUTION

Accepted Solutions
Gold

ACS 5.2: Restricting access based on AD groups

I see you are using EAP-TLS. When using this protocol you need to select a Certificate Authentication Profile as the result of the Authentication Policy. A certificate authentication profile defines two things

-Principal Username X509 Attribute: Attribute to be retrieved from certificate to be used as the user name

- Whether to "Perform Binary Certificate Comparison with Certificate retrieved from LDAP or Active Directory"

By default there is a predefined profile called "CN Username" that select the "Common Name" from the certificate

If you want to do EAP-TLS and then retrieve attributes from AD for authorization you need to do the following

- create an Indentity Store Sequence:Users and Indetity Stores >Identity Store Sequence

- Select "Certificate Based" option and then a "Certificate Authenticaiton Profile" 9as defined above)

- In "Additional Attribute Retrieval Search List" use the arrows to put the Active Directory in the list of selected stores

Finally select this Identity Sequence as the result in the Authenticaiton Policy. Then when an EAP-TLS request is received the Certificate Authentication Profile will be use to process the TLS request and then the additional identity stores accessed to retrieve attributes for authorization policy processing

Note that if you want to extend this sequence to be used in other protocols you can select the "Password Based" option (as well) and select the databases to be authenticated against

Good luck and seasons greetings

... >
12 REPLIES
Gold

ACS 5.2: Restricting access based on AD groups

I see you are using EAP-TLS. When using this protocol you need to select a Certificate Authentication Profile as the result of the Authentication Policy. A certificate authentication profile defines two things

-Principal Username X509 Attribute: Attribute to be retrieved from certificate to be used as the user name

- Whether to "Perform Binary Certificate Comparison with Certificate retrieved from LDAP or Active Directory"

By default there is a predefined profile called "CN Username" that select the "Common Name" from the certificate

If you want to do EAP-TLS and then retrieve attributes from AD for authorization you need to do the following

- create an Indentity Store Sequence:Users and Indetity Stores >Identity Store Sequence

- Select "Certificate Based" option and then a "Certificate Authenticaiton Profile" 9as defined above)

- In "Additional Attribute Retrieval Search List" use the arrows to put the Active Directory in the list of selected stores

Finally select this Identity Sequence as the result in the Authenticaiton Policy. Then when an EAP-TLS request is received the Certificate Authentication Profile will be use to process the TLS request and then the additional identity stores accessed to retrieve attributes for authorization policy processing

Note that if you want to extend this sequence to be used in other protocols you can select the "Password Based" option (as well) and select the databases to be authenticated against

Good luck and seasons greetings

... >
New Member

ACS 5.2: Restricting access based on AD groups

Thank you,

I'll try it and update on the result.

New Member

ACS 5.2: Restricting access based on AD groups

Hi,

Unfortunately, the EAP protocol which was finally chosen is PEAP with EAP-TLS as an internal mechanism. And ACS 5.x up until now (5.1/5.2/5.3) does not support EAP-TLS under PEAP.

Hence, the story closed. Thank you.

Gold

ACS 5.2: Restricting access based on AD groups

PEAP with TLS inner method is supported on ACS 5.3

New Member

ACS 5.2: Restricting access based on AD groups

friend,


Already solved?

I have a sample configuration that can assist you.

New Member

ACS 5.2: Restricting access based on AD groups

Hi all,

Jrabinow – thank you for pointing this out (I was relying on someone who claimed it doesn’t Looks like it will be a little upgrade around here
jonatas marques - thank you for suggesting. I'd appreciate if you could post those.

Thank you and happy new year !

Hi all,

Jrabinow – thank you for pointing this out (I was relying on someone who claimed it doesn’t Looks like it will be a little upgrade around here )


jonatas marques - thank you for suggesting. I'd appreciate if you could post those.

Thank you and happy new year !

New Member

ACS 5.2: Restricting access based on AD groups

I will create a document in English and upload it here, since today it is in Portuguese.


Monday hugs do it.

New Member

ACS 5.2: Restricting access based on AD groups

Hello all,

So the support of EAP-TLS within PEAP was indeed added to 5.3 :-) so that works.

But, now it's not able to authenticate based on AD groups. The ACS-AD connection is fine. I'm able to list AD groups using the ACS GUI and poll the attributes for any user or group I'd like to. Moreover, I had selected the group (I test for) using the ACS GUI.

But, the moment I put – authorize if AD1:ExternalGroups contains/equal = wireless (or full DN) the authorization fails. How should I authorize based on AD groups?

Gold

ACS 5.2: Restricting access based on AD groups

Did you follow the instructions below. These should equally apply when EAP-TLS is used as an inner method

If you want to do EAP-TLS and then retrieve attributes from AD for authorization you need to do the following

- create an Indentity Store Sequence:Users and Indetity Stores >Identity Store Sequence

- Select "Certificate Based" option and then a "Certificate Authenticaiton Profile" as defined above)

- In "Additional Attribute Retrieval Search List" use the arrows to put the Active Directory in the list of selected stores

Finally select this Identity Sequence as the result in the Authenticaiton Policy. Then when an EAP-TLS request is received the Certificate Authentication Profile will be use to process the TLS request and then the additional identity stores accessed to retrieve attributes for authorization policy processing

New Member

ACS 5.2: Restricting access based on AD groups

Thank you jrabinow.

That's the way the rules configured. I've opened a TAC ticked, and they confirmed the settings are correct. I'll update on how it develops.

New Member

ACS 5.2: Restricting access based on AD groups

did you ever get a response from the TAC on this one. I have the same thing setup with an identity store sequence however the authorization component is still failing as soon as i ad an AD group to it.

Seems like its not looking up the group correctly.

Gold

ACS 5.2: Restricting access based on AD groups

The best way to trouble shoot this is to grab the authentication details for the request. This should give more details of what was performed during the flow of processing for the request

Can see the authentication details by selecting Monitoring and Reports->Reports->Catalog->AAA Protocol and then selecting RADIUS Authentication.

When see the record that relates to your Authentication then press Details and will see. If possible share the contents

3029
Views
0
Helpful
12
Replies
CreatePlease to create content