<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configuring LDAP authentication in multi-domain environment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/configuring-ldap-authentication-in-multi-domain-environment/m-p/1692750#M261350</link>
    <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;I am trying to authenticate Remote VPN users via LDAP and integrate this with "Dial-in" Permission attribute of user account. It works fine for a single domain with the following conifguration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server ldap-server (Inside) host 10.10.10.1&lt;/P&gt;&lt;P&gt; ldap-base-dn dc=Alpha, dc=com&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn cn=-svc, ou=admin, dc=Alpha, dc=com&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, this configuration requires only username/password and I can't mention domain along with. So if I wish to implement this in a multiple-domain scenario ( alpha.com, beta.com and gemma.com etc) It's not gonna work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you got an idea.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If some of you could fetch the list of values we can give to "ldap-naming-attribute", I guess there could be something in there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 01:03:20 GMT</pubDate>
    <dc:creator>abidgorsi</dc:creator>
    <dc:date>2019-03-11T01:03:20Z</dc:date>
    <item>
      <title>Configuring LDAP authentication in multi-domain environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ldap-authentication-in-multi-domain-environment/m-p/1692750#M261350</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;I am trying to authenticate Remote VPN users via LDAP and integrate this with "Dial-in" Permission attribute of user account. It works fine for a single domain with the following conifguration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server ldap-server (Inside) host 10.10.10.1&lt;/P&gt;&lt;P&gt; ldap-base-dn dc=Alpha, dc=com&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn cn=-svc, ou=admin, dc=Alpha, dc=com&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, this configuration requires only username/password and I can't mention domain along with. So if I wish to implement this in a multiple-domain scenario ( alpha.com, beta.com and gemma.com etc) It's not gonna work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you got an idea.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If some of you could fetch the list of values we can give to "ldap-naming-attribute", I guess there could be something in there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:03:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ldap-authentication-in-multi-domain-environment/m-p/1692750#M261350</guid>
      <dc:creator>abidgorsi</dc:creator>
      <dc:date>2019-03-11T01:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring LDAP authentication in multi-domain environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ldap-authentication-in-multi-domain-environment/m-p/1692751#M261385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this will only work if you have a Global Catalog&amp;nbsp; Server (GCS) - in that case, the user can enter "username@domain" in&amp;nbsp; the username field.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;cfr. &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://technet.microsoft.com/en-us/library/cc977998.aspx"&gt;http://technet.microsoft.com/en-us/library/cc977998.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One downside of this method is that a GCS does not allow password change operations through LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternatively&amp;nbsp; you could create a tunnel-group per domain, each using a different LDAP&amp;nbsp; server, and instruct the users to connect to the tunnel-group&amp;nbsp; corresponding to their domain.&lt;/P&gt;&lt;P&gt;A variant of this is when the users&amp;nbsp; have a digital certificate that includes information about the domain&amp;nbsp; they're in, then you can use the certificate to automatically map them&amp;nbsp; to the correct tunnel-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 May 2011 05:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ldap-authentication-in-multi-domain-environment/m-p/1692751#M261385</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2011-05-13T05:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring LDAP authentication in multi-domain environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ldap-authentication-in-multi-domain-environment/m-p/1692752#M261414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Herbert,&lt;/P&gt;&lt;P&gt;Thanks for your reply,&lt;/P&gt;&lt;P&gt;Well, I am pointing to Global Catalogur Server but can't enter domain/username format.&lt;/P&gt;&lt;P&gt;It accepts credentials by default for the doamin Alpha.com which we configure with following statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap-base-dn dc=alpha, dc=com&lt;/P&gt;&lt;P&gt;ldap-scope subtree&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if I remove above statements then I can't even authenticate ( with or without &lt;STRONG&gt;domain/&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; name).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also tried to authenticate using NTP protocol and auhorize via LDAP by mentioning:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group EXAMPLE_VPN general-attributes&lt;/P&gt;&lt;P&gt; authentication-server-group NTP-SERVER&lt;/P&gt;&lt;P&gt; authorization-server-group LDAP-SERVER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But this way, authorization phase never triggers and user gets connected even if he doesn't have &lt;STRONG&gt;"DIAL-IN"&lt;/STRONG&gt; permission in active directory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Abid&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 May 2011 12:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ldap-authentication-in-multi-domain-environment/m-p/1692752#M261414</guid>
      <dc:creator>abidgorsi</dc:creator>
      <dc:date>2011-05-16T12:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring LDAP authentication in multi-domain environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-ldap-authentication-in-multi-domain-environment/m-p/1692753#M261458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Abid,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;did you try logging on as "username@domain" as I mentioned, instead of "domain\username" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure what you mean with NTP - usually this refers to Network Time Protocol (protocol used to synchronize clocks on networked devices) so not an authentication protocol.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;In any case, if this NTP auth is working, then after successful authentication it should do the LDAP authorization - are you sure that it is not doing an LDAP lookup, or are you assuming that because the user can connect even without dial-in permission?&lt;/P&gt;&lt;P&gt;To restrict access to users with dial-in permission, you need to use either DAP or an LDAP attribute-map, see e.g. &lt;A __default_attr="13713" __jive_macro_name="document" class="jive_macro jive_macro_document default_title" href="https://community.cisco.com/" title="ASA 8.X : How to deny remote access to LDAP users that don't have Remote Access Permissions"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 10:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-ldap-authentication-in-multi-domain-environment/m-p/1692753#M261458</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2011-05-17T10:34:40Z</dc:date>
    </item>
  </channel>
</rss>

