<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA LDAP Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341496#M334040</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey I was looking at the command line and I am starting to think its is not a multivalue attribute.  I took this from the CLI..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server-host mode commands/options:&lt;/P&gt;&lt;P&gt;  WORD &amp;lt; 129 char  Specify the Relative Distinguished Name attribute that&lt;/P&gt;&lt;P&gt;                   uniquely identifies an entry on the LDAP server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASAVPNUsers(config-aaa-server-host)# ldap-naming-attribute samaccountname ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server-host mode commands/options:&lt;/P&gt;&lt;P&gt;  &lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"samaccountname ?" and all we get back is a &lt;CR&gt;?  that tells me that there is not a seperator value.  Could be looking at a clerical error in the ASDM.&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and if you pass in "ldap-naming-attribute userprincipalname" in the hopes you can have the command twice, it overwrites other other vale and replaces with the new.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Sep 2009 18:09:55 GMT</pubDate>
    <dc:creator>Eric Hansen</dc:creator>
    <dc:date>2009-09-28T18:09:55Z</dc:date>
    <item>
      <title>ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341490#M334013</link>
      <description>&lt;P&gt;I'm testing LDAP authentication on our ASA and it is working well. A problem I am experiencing though is that we have some users who log in as 'DOMAIN\user' and '&lt;A href="mailto:user@domain.org" target="_blank"&gt;user@domain.org&lt;/A&gt;'. LDAP authentication doesn't appear to support this. I'm able to log in as 'user' just fine, but 'DOMAIN\user' and '&lt;A href="mailto:user@domain.org" target="_blank"&gt;user@domain.org&lt;/A&gt;' do not work. I've enabled the options to strip the realm and group before sending to the AAA server, but it doesn't make a difference. Using '&lt;A href="mailto:user@domain.org" target="_blank"&gt;user@domain.org&lt;/A&gt;' and 'DOMAIN\user' works fine when authenticating using RADIUS via IAS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know if there is a way to support 'DOMAIN\user' and '&lt;A href="mailto:user@domain.org" target="_blank"&gt;user@domain.org&lt;/A&gt;' authentication while using LDAP authentication? Is there a way to just strip this information before sending it to LDAP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Steve&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341490#M334013</guid>
      <dc:creator>sbader48220</dc:creator>
      <dc:date>2019-03-10T23:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341491#M334014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you say "I'm able to log in as 'user' just fine" - what LDAP attribute does that apply to?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In MS AD, the DNS login (user@domain) maps to the 'userPrincipalName' attribute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In MS AD, the netbios login (domain\user) maps to the 'sAMAccountName' attribute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ive never personally mapped ASA directly to AD (we go through ACS) but it should be pretty straight forward.  Choose which attribute you want to have for user itendity and specify it in the server group on the ASA under 'naming attribute'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am assuming your Base DN(never query the whole of AD), Login DN/password, attribute maps and are all good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;e-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Sep 2009 15:39:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341491#M334014</guid>
      <dc:creator>Eric Hansen</dc:creator>
      <dc:date>2009-09-28T15:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341492#M334015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;'user' maps to sAMAccountName. I'm not able to get 'DOMAIN\user' to work when using sAMAccountName as the 'naming attribute'. I am able to use userPrincipalName and use the 'user@domain' login, and it does work, but then that breaks just 'user'. I'm trying to find a way to make it so all three combinations (user,DOMAIN\user,user@domain) will all work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Sep 2009 16:49:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341492#M334015</guid>
      <dc:creator>sbader48220</dc:creator>
      <dc:date>2009-09-28T16:49:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341493#M334018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm wondering if its something in the code, or maybe something just beyond me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to replicate what your doing on some dev ASA's and when I use  userPrincipalName I can get user@domain to work.  When I use sAMAccountName I can get juse user to work.  But when I put a comma seperated multivalue of 'sAMAccountName,userPrincipalName' I cant get anything to work.  I have also tried "sAMAccountName, userPrincipalName" with the quotes no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea what the delimiter might be?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thumbed through the docs, and I cant find any indication that the naming attribute cant be multivalue.  I assume it can since is says in ASDM "naming attribute(s)".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Sep 2009 17:22:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341493#M334018</guid>
      <dc:creator>Eric Hansen</dc:creator>
      <dc:date>2009-09-28T17:22:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341494#M334022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like you're trying the same things I am. I was looking at how it says "naming attribute(s)" as well and thinking it must allow multiple options. I've tried comma and semi-colon with no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate your help. This is definitely and interesting one. I want to get very restrictive with user access, and mapping access to groups within AD makes the most sense in our situation, otherwise I'd just use RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Sep 2009 17:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341494#M334022</guid>
      <dc:creator>sbader48220</dc:creator>
      <dc:date>2009-09-28T17:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341495#M334032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no problem, barring you calling tac I'll keep playing with this.  I'll have a ccie sec here on thursday, maybe he'll know.  &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They should really specify in the docs.  =(&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Sep 2009 17:32:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341495#M334032</guid>
      <dc:creator>Eric Hansen</dc:creator>
      <dc:date>2009-09-28T17:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341496#M334040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey I was looking at the command line and I am starting to think its is not a multivalue attribute.  I took this from the CLI..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server-host mode commands/options:&lt;/P&gt;&lt;P&gt;  WORD &amp;lt; 129 char  Specify the Relative Distinguished Name attribute that&lt;/P&gt;&lt;P&gt;                   uniquely identifies an entry on the LDAP server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASAVPNUsers(config-aaa-server-host)# ldap-naming-attribute samaccountname ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server-host mode commands/options:&lt;/P&gt;&lt;P&gt;  &lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"samaccountname ?" and all we get back is a &lt;CR&gt;?  that tells me that there is not a seperator value.  Could be looking at a clerical error in the ASDM.&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and if you pass in "ldap-naming-attribute userprincipalname" in the hopes you can have the command twice, it overwrites other other vale and replaces with the new.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Sep 2009 18:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341496#M334040</guid>
      <dc:creator>Eric Hansen</dc:creator>
      <dc:date>2009-09-28T18:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341497#M334052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm going to contact TAC to get a firm answer on this. I was also looking at the CLI and came to the same conclusion as you. Maybe there is way to use a regex to change the username. I'm going to open the case in a minute here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Sep 2009 18:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341497#M334052</guid>
      <dc:creator>sbader48220</dc:creator>
      <dc:date>2009-09-28T18:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341498#M334066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just spoke with TAC. It appears as though the strip realm/group feature should work, but there is a bug in 8.2(1) which prevents this from working. They are sending me another release to try. I'll try it tomorrow and let you know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Sep 2009 20:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341498#M334066</guid>
      <dc:creator>sbader48220</dc:creator>
      <dc:date>2009-09-28T20:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341499#M334079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Steve,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What kind of VPN connection do you have?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;remote access or L2TP or what?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the Cisco documentation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1408323" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1408323&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname(config-tunnel-general)# default-group-policy remotegrp&lt;/P&gt;&lt;P&gt;hostname(config-tunnel-general)# strip-realm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a bug also and it has identified the problem of not stripping the realm in&lt;/P&gt;&lt;P&gt;L2TP/IPSEC connection as a functionality bug and have registered a defect CSCta39633.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like this bug has been fixed in 8.002(001.010)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIP: stripping is also possible on the ACS server since you are using LDAP directly with ASA...this is not for you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;JK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Sep 2009 11:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341499#M334079</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2009-09-29T11:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341500#M334091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using LDAP authentication for IPSec and Clientless SSL &amp;amp; AnyConnect authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TAC sent me version 8.2(1)1, but it still doesn't appear to be stripping the realm. I'm enabled 'strip-realm' for the group policy we're using, but it isn't making any difference. As a test I setup RADIUS authentication, and it still doesn't strip the realm when using RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd have no problem using RADIUS, but I need to be able to allow users within certain groups within Active Directory access to specific resources. For instance, users in the 'intranet' group get Clientless access and get the intranet bookmark. Only users who are in the 'anyconnect' group can connect via anyconnect, etc. I haven't found an easy way to do this through RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Sep 2009 14:54:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341500#M334091</guid>
      <dc:creator>sbader48220</dc:creator>
      <dc:date>2009-09-29T14:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA LDAP Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341501#M334111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So here is what I've found out after working with TAC. There is a bug in 8.2.1 which prevents the strip realm and strip group commands from working. I downgraded to 8.0, and it works, but that only supports user@domain, and not DOMAIN\user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, my workaround is to use RADIUS authentication for IPSec access and LDAP for SVC and WebVPN. It isn't pretty, but it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all the help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Oct 2009 22:59:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-ldap-authentication/m-p/1341501#M334111</guid>
      <dc:creator>sbader48220</dc:creator>
      <dc:date>2009-10-01T22:59:01Z</dc:date>
    </item>
  </channel>
</rss>

