<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACS 5.x with either AD or RSA Authentication depending on us in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124413#M171384</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just changed the timeout value to 5 seconds and I am able to login to VPN now!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This may have fixed it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will have to verify now that RSA two-factor is actually working with this timeout...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't really understand why I need to specify a timeout but hey if it works...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 30 Jan 2013 06:02:21 GMT</pubDate>
    <dc:creator>timsilverline</dc:creator>
    <dc:date>2013-01-30T06:02:21Z</dc:date>
    <item>
      <title>ACS 5.x with either AD or RSA Authentication depending on user</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124399#M171370</link>
      <description>&lt;P&gt;I am trying to implement RSA two-factor authentication for our company for access to secure resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our current setup before we had RSA, due to PCI restrictions, was based on AD group membership but was still extremely restrictive on even our admin users to ensure that no secure resources could be accessed without two-factor authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not want to have to enable RSA tokens for our entire company - but I would like to be able to allow admins the ability to connect from the outside with two-factor authentication and have access to secure resources in an emergency.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have less than ten people that require elevated access privileges so my hope is to enable RSA only for those ten users, and leave the rest of the accounts authenticating normally against AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot figure out how to configure this.&amp;nbsp; With ACS 4.x such a policy would be simple - just create the user on ACS and point to the Identity Store that I want to authenticate against.&amp;nbsp; Not as easy with 5.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried creating an rules based selection for Identity policy, making RSA the first one, configuring it to drop if no users is found, and configuring the RSA to treat user rejects as user not found.&amp;nbsp; This broke VPN completely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I can tell it seems like ACS really wants me to choose an Identity store based on the NDG - but in this case it will always be our same ASA VPN device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone know how to accomplish this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running 5.4 with the latest patches.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:00:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124399#M171370</guid>
      <dc:creator>timsilverline</dc:creator>
      <dc:date>2019-03-11T03:00:34Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x with either AD or RSA Authentication depending on user</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124400#M171371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume you created an identity store sequence and set the RSA at the top of the sequence followed by AD? If so, then setting the process to continue if user not found should have fixed your issue. Please post a screenshot of your settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 06:17:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124400#M171371</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-24T06:17:17Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x with either AD or RSA Authentication depending on user</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124401#M171372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I created an Identity store sequence which has RSA at the top of the sequence and then I was just using the Default Rule for AD to match all users that aren't in RSA but I have also tried creating an explicit rule to match All Devices and am having the same result.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have done some additional analysis on what is happening today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a log from my session:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;11017&amp;nbsp; RADIUS created a new session&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Service Selection Policy&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15004&amp;nbsp; Matched rule&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15012&amp;nbsp; Selected Access Service - Default Network Access&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Identity Policy&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15004&amp;nbsp; Matched rule&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15013&amp;nbsp; Selected Identity Store -&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24500&amp;nbsp; Authenticating user against the RSA SecurID Server.&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24501&amp;nbsp; A session is established with the RSA SecurID Server.&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24552&amp;nbsp; Reject response from the RSA server is considered as User not found.&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24502&amp;nbsp; The session with RSA SecurID Server is closed&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;22056&amp;nbsp; Subject not found in the applicable identity store(s).&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;22058&amp;nbsp; The advanced option that is configured for an unknown user is used.&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;22060&amp;nbsp; The 'Continue' advanced option is configured in case of a failed authentication request.&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Group Mapping Policy&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Exception Authorization Policy&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15042&amp;nbsp; No rule was matched&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Authorization Policy&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15006&amp;nbsp; Matched Default Rule&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15016&amp;nbsp; Selected Authorization Profile - DenyAccess&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15039&amp;nbsp; Selected Authorization Profile is DenyAccess&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;11003&amp;nbsp; Returned RADIUS Access-Reject&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From this it seems that my policy is working for RSA and it is continuing to evaluate afterwards, but is no longer using the Authorization Policies that are configured to evaluate the AD user and somehow defaulting to the DenyAll policy.&amp;nbsp; If I switch back to single result for Identity evaluation, everything goes back to working - so I know that the Authorization Profiles are configured correctly if they are properly evaluated.&amp;nbsp; What is the "Exception Authorization Policy"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I have configured on the Identity pages:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/7/2/126277-Capture.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/7/2/126278-Capture1.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/7/2/126279-Capture2.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 16:41:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124401#M171372</guid>
      <dc:creator>timsilverline</dc:creator>
      <dc:date>2013-01-24T16:41:07Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x with either AD or RSA Authentication depending on user</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124402#M171373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Each of the results in your identity policy are only selecting a single store; either RSA or AD1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to:&lt;/P&gt;&lt;P&gt;1) Create an identity sequence: Users and Identity Stores &amp;gt; Identity Store Sequences&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) select Password based and then add both RSA and AD1 in the selected list in teh order you desire&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Ocne this is created; select as as the "Identity Source" in the identity policy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 17:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124402#M171373</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2013-01-24T17:22:35Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x with either AD or RSA Authentication depending on user</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124403#M171374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay this was very helpful and seems to have gotten me past where I was stuck at but something is still not working right....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACS Server is evaluating the rules in order, matching the right authorization policy, and sending a success response back, but I am getting a login failed message from AnyConnect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to try doing some active debugs on the firewall while this is happening to see maybe what is going on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;11001&amp;nbsp; Received RADIUS Access-Request&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;11017&amp;nbsp; RADIUS created a new session&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Service Selection Policy&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15004&amp;nbsp; Matched rule&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15012&amp;nbsp; Selected Access Service - Default Network Access&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Identity Policy&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15006&amp;nbsp; Matched Default Rule&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15013&amp;nbsp; Selected Identity Store - AD1&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24500&amp;nbsp; Authenticating user against the RSA SecurID Server.&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24501&amp;nbsp; A session is established with the RSA SecurID Server.&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24552&amp;nbsp; Reject response from the RSA server is considered as User not found.&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24502&amp;nbsp; The session with RSA SecurID Server is closed&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24430&amp;nbsp; Authenticating user against Active Director&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24416&amp;nbsp; User's Groups retrieval from Active Directory succeeded&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;24402&amp;nbsp; User authentication against Active Directory succeeded&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;22037&amp;nbsp; Authentication Passed&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Group Mapping Policy&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Exception Authorization Policy&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15042&amp;nbsp; No rule was matched&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Authorization Policy&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15004&amp;nbsp; Matched rule&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;15016&amp;nbsp; Selected Authorization Profile - &lt;OMITTED&gt;&lt;/OMITTED&gt;&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;22065&amp;nbsp; Max sessions policy passed&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;22064&amp;nbsp; New accounting session created in Session cache&lt;/P&gt;&lt;P style="margin-top: 0pt;"&gt;11002&amp;nbsp; Returned RADIUS Access-Accept&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I am still getting a login failed from the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will go get some logs from it to try to see what is happening.&amp;nbsp; Maybe a timeout because it is taking longer or something...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help so far.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 17:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124403#M171374</guid>
      <dc:creator>timsilverline</dc:creator>
      <dc:date>2013-01-24T17:47:19Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x with either AD or RSA Authentication depending on user</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124404#M171375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should be pretty fast when ACS authenticates the session, typically the default timeout on the ASA is 5 if i am not mistaken. You can issue a show run all aaa-server to see what the value is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck great to know your almost there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 03:29:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124404#M171375</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-25T03:29:08Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x with either AD or RSA Authentication depending on user</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124405#M171376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yah something is going on with the firewall and I will probably have to open a TAC case for it..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACS log appears to return the Access-Accept, but the firewall just doesn't seem to be listening or something.&amp;nbsp; I even changed the timeout to 60 seconds, and this seems to cause the firewall to keep sending more requests as evidenced by the errors in ACS showing "11013 RADIUS packet already in the process"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then tried changing on my firewall both the retry intervals to 10 (max).&amp;nbsp; No effect as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone has any ideas let me know.&amp;nbsp; Otherwise I will try opening a case with TAC next week to see if they can help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 21:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124405#M171376</guid>
      <dc:creator>timsilverline</dc:creator>
      <dc:date>2013-01-25T21:51:46Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x with either AD or RSA Authentication depending on user</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124406#M171377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please use the "test aaa authentication...." command while running a capture to the ACS (assuming acs is on the inside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acs permit ip host &lt;ACSIPT&gt; any&lt;/ACSIPT&gt;&lt;/P&gt;&lt;P&gt;access-list acs permit ip any host &lt;ACSIP&gt;&lt;/ACSIP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin match access-list acs interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Jan 2013 06:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124406#M171377</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-26T06:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.x with either AD or RSA Authentication depending on us</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124407#M171378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I do a test aaa authentication from the ASA I receive an Authentication Successful message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It showed that the timeout for this test is 62 seconds and I think this is where my issue is....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I timed how long it took for the Authentication Successful message to be returned from the ASA during this test I got more than 25 seconds each time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I do it from the AnyConnect client, I think what is happening is that the response is not coming within the retry interval - and then it is asking me for my password again which is restarting the whole process before it can get a response from the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why would it take so long for ACS to process the request this way?&amp;nbsp; I don't see any errors other than the "&lt;SPAN style="font-size: 10pt;"&gt;24552&amp;nbsp; Reject response from the RSA server is considered as User not found." message.&amp;nbsp; But the process continues on after this as normal until it sends back the RADIUS ACCess-Accept message.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 22:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124407#M171378</guid>
      <dc:creator>timsilverline</dc:creator>
      <dc:date>2013-01-28T22:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.x with either AD or RSA Authentication depending on us</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124408#M171379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very interesting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a timeout interval on the RSA which by default is set at 30 seconds. Not clear that is coming into play here since does appear that a response has been received from the RSA server but may be worth a try to see if impacts things&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is a test system (non production / load) I think can open policy diagnostics&lt;/P&gt;&lt;P&gt;System Administration &amp;gt; Configuration &amp;gt; Log Configuration &amp;gt; Logging Categories &amp;gt; Global&lt;/P&gt;&lt;P&gt;select policy diagnostics and set level to DEBUG. Same for &lt;/P&gt;&lt;P&gt;Identity Stores Diagnostics and Authentication Flow Diagnostics&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run test and then see AAA diagnostics&lt;/P&gt;&lt;P&gt;Monitoring &amp;amp; Reports &amp;gt; Reports &amp;gt; Catalog &amp;gt; AAA Protocol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should see all the steps with the timings to see how long things took&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 23:08:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124408#M171379</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2013-01-28T23:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.x with either AD or RSA Authentication depending on us</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124409#M171380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the guidance here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using these debugs I was able to find the following details in a test authentication in the logs....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 29,13 5:38:12.126 PM A session is established with the RSA SecurID Server.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Jan 29,13 5:38:37.153 PM Reject response from the RSA server is considered as User not found. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;So it is definitely the RSA server which is taking about 25 seconds to respond with the rejection message.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;When I have the live activity monitor running on RSA it seems to show the message about the user cannot be found within 1 or 2 seconds, so I am not sure why it would take 25 seconds to respond back to ACS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I will give RSA a call and see what I can find out.&amp;nbsp; If anyone else has any ideas in the mean time let me know.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks for the help so far.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jan 2013 18:03:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124409#M171380</guid>
      <dc:creator>timsilverline</dc:creator>
      <dc:date>2013-01-29T18:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.x with either AD or RSA Authentication depending on us</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124410#M171381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay so I was able to get on the phone with RSA support today and made a little progress with the issue before I got dragged into other priorities.&amp;nbsp; It is still not resolved though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We installed wireshark to do some packet captures on the server and saw that after each packet by Cisco ACS, RSA responds with something.&amp;nbsp; Since it is encrypted we can't see what but there doesnt seem to be much.&amp;nbsp; In the RSA trace it appears to be seeing the user as invalid right away - matching the live monitor - but I don't see anywhere that specifies when it sends the response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It just seems like there is some back and forth communication for 25 seconds at which point the ACS server recognizes a Reject response and proceeds with authenticating against AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone with a working setup like this do a wireshark capture to see what a regular transaction should look like?&amp;nbsp; Is it just one packet in each direction?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RSA has sent the wireshark capture, the ACS debug, and the RSA trace up to engineering for a closer look and I will see what they come back with.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This sure is frustrating!&amp;nbsp; &lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2013 05:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124410#M171381</guid>
      <dc:creator>timsilverline</dc:creator>
      <dc:date>2013-01-30T05:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.x with either AD or RSA Authentication depending on us</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124411#M171382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please post a screenshot of the settings in your identity store sequence, I am curious to see what your settings are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2013 05:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124411#M171382</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-30T05:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.x with either AD or RSA Authentication depending on us</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124412#M171383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One other thing that may be useful as an additional data point&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you look at the definition of the RSA object on ACS it has a timeout setting. By default this is 30 seconds.&lt;/P&gt;&lt;P&gt;It may be worth reducing this and see whether it reduces the round trip time for the case of the user not found while still being short enough for users that are found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May not solve anything but can be an additional datapoint to see if the timeout on ACS side is the thing that is terminating the interaction&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2013 05:53:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124412#M171383</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2013-01-30T05:53:32Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.x with either AD or RSA Authentication depending on us</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124413#M171384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just changed the timeout value to 5 seconds and I am able to login to VPN now!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This may have fixed it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will have to verify now that RSA two-factor is actually working with this timeout...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't really understand why I need to specify a timeout but hey if it works...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2013 06:02:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124413#M171384</guid>
      <dc:creator>timsilverline</dc:creator>
      <dc:date>2013-01-30T06:02:21Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x with either AD or RSA Authentication depending on user</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124414#M171385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was able to get RSA and AD authentication working fine with the timeout set to 5 seconds and all is working now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am confused on why thie timesout setting is required though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone help to clarify why this is needed?&amp;nbsp; Is it just a bug that I am working around by changing the timeout?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help guys.&amp;nbsp; Much appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2013 06:50:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124414#M171385</guid>
      <dc:creator>timsilverline</dc:creator>
      <dc:date>2013-01-30T06:50:02Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.x with either AD or RSA Authentication depending on us</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124415#M171386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Not suprised&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is still a work around and means system is working in one of two ways&lt;/P&gt;&lt;P&gt;- valid user / password: positive response immediately&lt;/P&gt;&lt;P&gt;- invalid user/password: response from RSA appears to be received but does not seem to get flushed/processed until timeout occurs &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In means in case of failures processing is taking longer than it should and not sure of can clearly distnguish all cases including a real timeout from server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Worth still digging some more to undelying causes and also debug from RSA side&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2013 06:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124415#M171386</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2013-01-30T06:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.x with either AD or RSA Authentication depending on us</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124416#M171387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you say Not Surprised is that because this sort of timeout behavior is expected?&amp;nbsp; I have sent logs to RSA and am waiting on their response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the meantime, during further testing I found a flaw in my current design....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Succesful Authentication works properly for users as intended.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I have found that when using the elevated privilege level account, if I enter the AD password for this account, after RSA authentication fails it still successfully authenticates the end users against AD afterwards and they end up being given the same network access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way I have it setup right now is Authorization Profiles are tied to AD group memberships.&amp;nbsp; So even though I have users authenticating against RSA, RSA is still checking against AD for these user accounts, and ACS is still using their group membership from AD to determine which Authorization Profile to provide to the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see how else I can set this up to get it working anymore.&amp;nbsp; If I can't base the Authorization Profile on AD group, or NDG device, I can't figure out how to change their authorization profile to know that this user was authenticated against RSA and use the proper profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea how I can accomplish this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 03:54:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124416#M171387</guid>
      <dc:creator>timsilverline</dc:creator>
      <dc:date>2013-02-07T03:54:36Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x with either AD or RSA Authentication depending on user</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124417#M171388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure I haev all the details of the issue but I think there is an additional attribute that defines the name of the external store that was authenticated against. Variable is called "AuthenticationIdentityStore" and is in system dictionary. In fact this is last database that was used to check authentication. In case authentication passed it will in fact be the database against which authentication passed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore, best conditon to use is ("System:AuthenticationIdentityStore" equals "RSA" ) and ("System:AuthenticationStatus" equlas "AuthenticationPassed" )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will check if authentication was done against RSA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 14:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124417#M171388</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2013-02-07T14:40:27Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x with either AD or RSA Authentication depending on user</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124418#M171389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again jrabinow.&amp;nbsp; That was the exact attribute I had been looking for.&amp;nbsp; It doesn't show up as an option when you just click customize.&amp;nbsp; You have to select Compound Condition when you customize and then select the System variable from that option, and then select its options to see this attribute.&amp;nbsp; It is buried more than the others it seems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In any event, all authentication is working successfully right now with the timeout set to 5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still waiting on feedback from RSA engineering&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 15:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-with-either-ad-or-rsa-authentication-depending-on-user/m-p/2124418#M171389</guid>
      <dc:creator>timsilverline</dc:creator>
      <dc:date>2013-02-07T15:50:56Z</dc:date>
    </item>
  </channel>
</rss>

