<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNG + Authentication Proxy w/Active Directory - LDAP errors in Deployment Strategy</title>
    <link>https://community.cisco.com/t5/deployment-strategy/dng-authentication-proxy-w-active-directory-ldap-errors/m-p/4881771#M116</link>
    <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Raphka,&lt;/P&gt;
&lt;P&gt;Thank You for your reply and Help! You were correct in-that my error was due to missing email attributes for the Active Directory Users. I was mistaken in thinking that with the user account being identified by their email address "&lt;A href="mailto:user%22@citelabs.net"&gt;user"@citelabs.net&lt;/A&gt; that this would sufficient for LDAP to identify the User. By adding the email attribute for each User the LDAP queries are not successful.&lt;/P&gt;
&lt;P&gt;For other who might be following this tread I’ll paste your earlier reply below.&lt;/P&gt;
&lt;P&gt;Thank You Also for taking the time to explain to me how to decipher the Auth Proxy Client-to-Server logs&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;BR /&gt;
RKGraves&lt;/P&gt;
&lt;P&gt;**** earlier reply ****&lt;BR /&gt;
Proxy is always on the left&lt;BR /&gt;
C is client&lt;BR /&gt;
S is server.&lt;/P&gt;
&lt;P&gt;e.g.1, C-&amp;gt;S means the proxy as a Client sent a request to your AD as the server.&lt;BR /&gt;
e.g.2, C&amp;lt;-S means the proxy as a Client received a response from your DC&lt;/P&gt;
&lt;P&gt;2023-03-25T19:14:10.898258-0700 [L■■■■■■■■■■■■■■■■■■■■,RI4MYCQO6MZOY43KTL2A,client] &lt;STRONG&gt;C-&amp;gt;S&lt;/STRONG&gt; LDAPMessage(id=21, value=&lt;STRONG&gt;LDAPSearchRequest&lt;/STRONG&gt;(baseObject=‘&lt;STRONG&gt;DC=CITELABS,DC=net&lt;/STRONG&gt;’, scope=2, derefAliases=0, sizeLimit=0, timeLimit=0, typesOnly=0, filter=&lt;STRONG&gt;LDAPFilter_and&lt;/STRONG&gt;(value=[LDAPFilter_or(value=[LDAPFilter_equalityMatch(attributeDesc=&lt;STRONG&gt;L■■■■■■■■■■■■■■■■■■■■ion(value='mail&lt;/STRONG&gt;’), assertionValue=LDAPAssertionValue(value=‘&lt;STRONG&gt;rkgraves@thefam.info&lt;/STRONG&gt;’))]), LDAPFilter_or(value=[LDAPFilter_and(value=[LDAPFilter_equalityMatch(attributeDesc=L■■■■■■■■■■■■■■■■■■■■ion(value=‘objectClass’), assertionValue=LDAPAssertionValue(value=‘user’)), LDAPFilter_equalityMatch(attributeDesc=L■■■■■■■■■■■■■■■■■■■■ion(value=‘objectCategory’), assertionValue=LDAPAssertionValue(value=‘person’))]), LDAPFilter_equalityMatch(attributeDesc=L■■■■■■■■■■■■■■■■■■■■ion(value=‘objectClass’), assertionValue=LDAPAssertionValue(value=‘inetOrgPerson’)), LDAPFilter_equalityMatch(attributeDesc=L■■■■■■■■■■■■■■■■■■■■ion(value=‘objectClass’), assertionValue=LDAPAssertionValue(value=‘organizationalPerson’))])]), attributes=[b’mail’]), controls=[(b’1.2.840.113556.1.4.319’, True, BERSequence(value=[BERInteger(value=5000), BEROctetString(value=‘’)]))])&lt;/P&gt;
&lt;P&gt;2023-03-25T19:14:10.898258-0700 [duoauthproxy.lib.log#info] Got signature length 16&lt;BR /&gt;
2023-03-25T19:14:10.898258-0700 [L■■■■■■■■■■■■■■■■■■■■,RI4MYCQO6MZOY43KTL2A,client] &lt;STRONG&gt;C&amp;lt;-S&lt;/STRONG&gt; LDAPMessage(id=21, value=&lt;STRONG&gt;L■■■■■■■■■■■■■■■■■■■■ence&lt;/STRONG&gt;(uris=[LDAPString(value=b’ldap://ForestDnsZones.CITELABS.net/&lt;STRONG&gt;DC=ForestDnsZones,DC=CITELABS,DC=net’&lt;/STRONG&gt;)]), controls=None)&lt;BR /&gt;
2023-03-25T19:14:10.898258-0700 [L■■■■■■■■■■■■■■■■■■■■,RI4MYCQO6MZOY43KTL2A,client] &lt;STRONG&gt;C&amp;lt;-S&lt;/STRONG&gt; LDAPMessage(id=21, value=L■■■■■■■■■■■■■■■■■■■■ence(uris=[LDAPString(value=b’ldap://DomainDnsZones.CITELABS.net/&lt;STRONG&gt;DC=DomainDnsZones,DC=CITELABS,DC=net&lt;/STRONG&gt;’)]), controls=None)&lt;BR /&gt;
2023-03-25T19:14:10.898258-0700 [L■■■■■■■■■■■■■■■■■■■■,RI4MYCQO6MZOY43KTL2A,client] &lt;STRONG&gt;C&amp;lt;-S&lt;/STRONG&gt; LDAPMessage(id=21, value=L■■■■■■■■■■■■■■■■■■■■ence(uris=[LDAPString(value=b’ldap://CITELABS.net/&lt;STRONG&gt;CN=Configuration,DC=CITELABS,DC=net&lt;/STRONG&gt;’)]), controls=None)&lt;BR /&gt;
2023-03-25T19:14:10.898258-0700 [L■■■■■■■■■■■■■■■■■■■■,RI4MYCQO6MZOY43KTL2A,client] &lt;STRONG&gt;C&amp;lt;-S&lt;/STRONG&gt; LDAPMessage(id=21, value=&lt;STRONG&gt;LDAPSearchResultDone(resultCode=0&lt;/STRONG&gt;), controls=[(b’1.2.840.113556.1.4.319’, None, b’0\x84\x00\x00\x00\x05\x02\x01\x00\x04\x00’)])&lt;/P&gt;
&lt;P&gt;So we can see the proxy making and ldap search request to your AD for a user with the mail attribute of &lt;STRONG&gt;&lt;A href="mailto:rkgraves@thefam.info"&gt;rkgraves@thefam.info&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We can see your DC searching successfully and essentially not finding anything, even though the search is a success with a result code 0.&lt;/P&gt;
&lt;P&gt;This tells me that most likely you do not have a user in AD with the mail value above.&lt;BR /&gt;
Please ensure a user exists in AD with that email.&lt;/P&gt;
&lt;P&gt;Please let me know if this helps.&lt;BR /&gt;
Have a great day!&lt;BR /&gt;
Kind regards,&lt;/P&gt;
&lt;P&gt;Raphael&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Tue, 28 Mar 2023 01:38:02 GMT</pubDate>
    <dc:creator>RKGraves</dc:creator>
    <dc:date>2023-03-28T01:38:02Z</dc:date>
    <item>
      <title>DNG + Authentication Proxy w/Active Directory - LDAP errors</title>
      <link>https://community.cisco.com/t5/deployment-strategy/dng-authentication-proxy-w-active-directory-ldap-errors/m-p/4881769#M114</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;
&lt;P&gt;Attempting to move from VPN &amp;amp; Remote Desktop Gateway + Duo to Duo Network Gateway.&lt;/P&gt;
&lt;P&gt;Two test deployments using Duo Network Gateway with Active Directory + Authentication Proxy as the SAML provider. Same same error noted on both in the Authentication Proxy SSO logs on both deployments.&lt;/P&gt;
&lt;P&gt;“Failed authentication against server”, “event_type”: “ldap_query”, “query_type”: “Primary authentication”, “status”: “failed”, “server”: “192.168.14.200”, “port”: 389, “username”: “&lt;A href="mailto:xxxxxx@citelabs.net"&gt;xxxxxx@citelabs.net&lt;/A&gt;”, “proxy_key”: “xxxxxxxxx”, “reason”: "LDAP search Failed&lt;/P&gt;
&lt;P&gt;Troubleshooting to-date:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;2 different installs, 1 on Server 2022 and 1 on Server 2019&lt;/LI&gt;
&lt;LI&gt;all the built-in tests pass&lt;/LI&gt;
&lt;LI&gt;error is the same for different user accounts&lt;/LI&gt;
&lt;LI&gt;due diligence is searching articles &amp;amp; videos for a solution&lt;/LI&gt;
&lt;LI&gt;for the Service Account I am using a standard user with local Administrator privileges&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Any and all help is appreciated - Thank You&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 26 Mar 2023 03:16:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/dng-authentication-proxy-w-active-directory-ldap-errors/m-p/4881769#M114</guid>
      <dc:creator>RKGraves</dc:creator>
      <dc:date>2023-03-26T03:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: DNG + Authentication Proxy w/Active Directory - LDAP errors</title>
      <link>https://community.cisco.com/t5/deployment-strategy/dng-authentication-proxy-w-active-directory-ldap-errors/m-p/4881770#M115</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Hi RKGraves, Welcome to the Duo Community!&lt;BR /&gt;
I would normally advise you to reach out to Duo Support to review this case.&lt;BR /&gt;
However in your instance I am aware you already have, as I reviewed and replied to your case my self on the 26th of March.&lt;BR /&gt;
Please do check your email spam and spam filtering to add *.duosecurity.com to your whitelist and we can continue working on this one is your existing support case.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 27 Mar 2023 23:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/dng-authentication-proxy-w-active-directory-ldap-errors/m-p/4881770#M115</guid>
      <dc:creator>raphka</dc:creator>
      <dc:date>2023-03-27T23:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: DNG + Authentication Proxy w/Active Directory - LDAP errors</title>
      <link>https://community.cisco.com/t5/deployment-strategy/dng-authentication-proxy-w-active-directory-ldap-errors/m-p/4881771#M116</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Raphka,&lt;/P&gt;
&lt;P&gt;Thank You for your reply and Help! You were correct in-that my error was due to missing email attributes for the Active Directory Users. I was mistaken in thinking that with the user account being identified by their email address "&lt;A href="mailto:user%22@citelabs.net"&gt;user"@citelabs.net&lt;/A&gt; that this would sufficient for LDAP to identify the User. By adding the email attribute for each User the LDAP queries are not successful.&lt;/P&gt;
&lt;P&gt;For other who might be following this tread I’ll paste your earlier reply below.&lt;/P&gt;
&lt;P&gt;Thank You Also for taking the time to explain to me how to decipher the Auth Proxy Client-to-Server logs&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;BR /&gt;
RKGraves&lt;/P&gt;
&lt;P&gt;**** earlier reply ****&lt;BR /&gt;
Proxy is always on the left&lt;BR /&gt;
C is client&lt;BR /&gt;
S is server.&lt;/P&gt;
&lt;P&gt;e.g.1, C-&amp;gt;S means the proxy as a Client sent a request to your AD as the server.&lt;BR /&gt;
e.g.2, C&amp;lt;-S means the proxy as a Client received a response from your DC&lt;/P&gt;
&lt;P&gt;2023-03-25T19:14:10.898258-0700 [L■■■■■■■■■■■■■■■■■■■■,RI4MYCQO6MZOY43KTL2A,client] &lt;STRONG&gt;C-&amp;gt;S&lt;/STRONG&gt; LDAPMessage(id=21, value=&lt;STRONG&gt;LDAPSearchRequest&lt;/STRONG&gt;(baseObject=‘&lt;STRONG&gt;DC=CITELABS,DC=net&lt;/STRONG&gt;’, scope=2, derefAliases=0, sizeLimit=0, timeLimit=0, typesOnly=0, filter=&lt;STRONG&gt;LDAPFilter_and&lt;/STRONG&gt;(value=[LDAPFilter_or(value=[LDAPFilter_equalityMatch(attributeDesc=&lt;STRONG&gt;L■■■■■■■■■■■■■■■■■■■■ion(value='mail&lt;/STRONG&gt;’), assertionValue=LDAPAssertionValue(value=‘&lt;STRONG&gt;rkgraves@thefam.info&lt;/STRONG&gt;’))]), LDAPFilter_or(value=[LDAPFilter_and(value=[LDAPFilter_equalityMatch(attributeDesc=L■■■■■■■■■■■■■■■■■■■■ion(value=‘objectClass’), assertionValue=LDAPAssertionValue(value=‘user’)), LDAPFilter_equalityMatch(attributeDesc=L■■■■■■■■■■■■■■■■■■■■ion(value=‘objectCategory’), assertionValue=LDAPAssertionValue(value=‘person’))]), LDAPFilter_equalityMatch(attributeDesc=L■■■■■■■■■■■■■■■■■■■■ion(value=‘objectClass’), assertionValue=LDAPAssertionValue(value=‘inetOrgPerson’)), LDAPFilter_equalityMatch(attributeDesc=L■■■■■■■■■■■■■■■■■■■■ion(value=‘objectClass’), assertionValue=LDAPAssertionValue(value=‘organizationalPerson’))])]), attributes=[b’mail’]), controls=[(b’1.2.840.113556.1.4.319’, True, BERSequence(value=[BERInteger(value=5000), BEROctetString(value=‘’)]))])&lt;/P&gt;
&lt;P&gt;2023-03-25T19:14:10.898258-0700 [duoauthproxy.lib.log#info] Got signature length 16&lt;BR /&gt;
2023-03-25T19:14:10.898258-0700 [L■■■■■■■■■■■■■■■■■■■■,RI4MYCQO6MZOY43KTL2A,client] &lt;STRONG&gt;C&amp;lt;-S&lt;/STRONG&gt; LDAPMessage(id=21, value=&lt;STRONG&gt;L■■■■■■■■■■■■■■■■■■■■ence&lt;/STRONG&gt;(uris=[LDAPString(value=b’ldap://ForestDnsZones.CITELABS.net/&lt;STRONG&gt;DC=ForestDnsZones,DC=CITELABS,DC=net’&lt;/STRONG&gt;)]), controls=None)&lt;BR /&gt;
2023-03-25T19:14:10.898258-0700 [L■■■■■■■■■■■■■■■■■■■■,RI4MYCQO6MZOY43KTL2A,client] &lt;STRONG&gt;C&amp;lt;-S&lt;/STRONG&gt; LDAPMessage(id=21, value=L■■■■■■■■■■■■■■■■■■■■ence(uris=[LDAPString(value=b’ldap://DomainDnsZones.CITELABS.net/&lt;STRONG&gt;DC=DomainDnsZones,DC=CITELABS,DC=net&lt;/STRONG&gt;’)]), controls=None)&lt;BR /&gt;
2023-03-25T19:14:10.898258-0700 [L■■■■■■■■■■■■■■■■■■■■,RI4MYCQO6MZOY43KTL2A,client] &lt;STRONG&gt;C&amp;lt;-S&lt;/STRONG&gt; LDAPMessage(id=21, value=L■■■■■■■■■■■■■■■■■■■■ence(uris=[LDAPString(value=b’ldap://CITELABS.net/&lt;STRONG&gt;CN=Configuration,DC=CITELABS,DC=net&lt;/STRONG&gt;’)]), controls=None)&lt;BR /&gt;
2023-03-25T19:14:10.898258-0700 [L■■■■■■■■■■■■■■■■■■■■,RI4MYCQO6MZOY43KTL2A,client] &lt;STRONG&gt;C&amp;lt;-S&lt;/STRONG&gt; LDAPMessage(id=21, value=&lt;STRONG&gt;LDAPSearchResultDone(resultCode=0&lt;/STRONG&gt;), controls=[(b’1.2.840.113556.1.4.319’, None, b’0\x84\x00\x00\x00\x05\x02\x01\x00\x04\x00’)])&lt;/P&gt;
&lt;P&gt;So we can see the proxy making and ldap search request to your AD for a user with the mail attribute of &lt;STRONG&gt;&lt;A href="mailto:rkgraves@thefam.info"&gt;rkgraves@thefam.info&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We can see your DC searching successfully and essentially not finding anything, even though the search is a success with a result code 0.&lt;/P&gt;
&lt;P&gt;This tells me that most likely you do not have a user in AD with the mail value above.&lt;BR /&gt;
Please ensure a user exists in AD with that email.&lt;/P&gt;
&lt;P&gt;Please let me know if this helps.&lt;BR /&gt;
Have a great day!&lt;BR /&gt;
Kind regards,&lt;/P&gt;
&lt;P&gt;Raphael&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 28 Mar 2023 01:38:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/dng-authentication-proxy-w-active-directory-ldap-errors/m-p/4881771#M116</guid>
      <dc:creator>RKGraves</dc:creator>
      <dc:date>2023-03-28T01:38:02Z</dc:date>
    </item>
  </channel>
</rss>

