<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authorization problem between ASA - ACS 5.1 - AD (with Certi in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552271#M346101</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for updating this thread, I am sure this will be helpful for many more in the future.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Dec 2010 05:24:51 GMT</pubDate>
    <dc:creator>Tarik Admani</dc:creator>
    <dc:date>2010-12-22T05:24:51Z</dc:date>
    <item>
      <title>Authorization problem between ASA - ACS 5.1 - AD (with Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552268#M346057</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an authentication &amp;amp; authorization problem with certificates between ASA, ACS 5.1 and AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AAA requests are handled in the following way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco VPN client with certificate ---&amp;gt; ASA ---&amp;gt; ASA sends the appropriate certificate field with username for authorization to radius server (ACS 5.1) --&amp;gt; ACS 5.1 sends the username for identity and authorization to AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured the ACS with following Access Policy (Network Access):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Identity:&lt;/P&gt;&lt;P&gt;Protocol Radius &amp;amp; NDG:ASA --&amp;gt; Identity Source = AD&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authorization:&lt;/P&gt;&lt;P&gt;AD:ExternalGroup=match --&amp;gt; Authorization Profile with radius attribute "Class 25" back to ASA for applying Group Policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this setup the ACS can't handle the authorization. I defined in the Identity under advanced option to continue if authentication failed (the ASA sends only the username without password from the certificate). But in that way the ACS can't retrieve the user attributes from the AD for the authorization. It can only retrieve the user attributes from AD, if it delivers a valid username AND password to the AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What makes me wonder is the fact, that the ACS gets all the user attributes under "Users and Identity Stores" - "External Identity Stores" - "Active Directory" when I do a manual user lookup vs. the AD with a valid username (without password)... but in the access policy the ACS doesn't get the user attributes from the AD when it must process an AAA request with the advanced option to continue if authentication fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any help - Thomas&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:38:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552268#M346057</guid>
      <dc:creator>Thomas Imboden</dc:creator>
      <dc:date>2019-03-11T00:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization problem between ASA - ACS 5.1 - AD (with Certi</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552269#M346071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you see the attributes that are retrieved with a manual user lookup, did you checked the attributes that you want ACS to retrieve ? The fetched attributes are used to make a list of attributes that will be fetched on authentication and to make the process easier you can retrieve it from a sample user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Dec 2010 10:09:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552269#M346071</guid>
      <dc:creator>Bastien Migette</dc:creator>
      <dc:date>2010-12-13T10:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization problem between ASA - ACS 5.1 - AD (with Certi</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552270#M346083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I opened a service request concerning the problem I had with the AAA design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's&amp;nbsp; not possible to do authentication over ASA to ACS with only a valid&amp;nbsp; username against AD. There must be a password for the username. Only with the correct user credentials (username &amp;amp; password) the&amp;nbsp; ACS is able to do a successful authentication against the AD.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 18:38:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552270#M346083</guid>
      <dc:creator>Thomas Imboden</dc:creator>
      <dc:date>2010-12-21T18:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization problem between ASA - ACS 5.1 - AD (with Certi</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552271#M346101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for updating this thread, I am sure this will be helpful for many more in the future.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Dec 2010 05:24:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552271#M346101</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2010-12-22T05:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization problem between ASA - ACS 5.1 - AD (with Certi</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552272#M346118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have the same problem and the same scenario. Our Cisco CE told me to use the radius-common-password for this authorisation purpose.&lt;/P&gt;&lt;P&gt;Until now, for me it does'nt run, but may be you have more luck on this.&lt;/P&gt;&lt;P&gt;By the way, have you already got some information on this from TAC?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ciao&lt;/P&gt;&lt;P&gt;Christian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jan 2011 12:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552272#M346118</guid>
      <dc:creator>constantin</dc:creator>
      <dc:date>2011-01-05T12:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization problem between ASA - ACS 5.1 - AD (with Certi</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552273#M346133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have exactly the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;About Common password:&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P class="pBu2_Bullet2"&gt;&lt;EM&gt;"Common Password—Specifies&amp;nbsp; the common password for use with a RADIUS authorization server. The&amp;nbsp; password is case-sensitive. The box displays only asterisks. If you are&amp;nbsp; defining a RADIUS server to be used for authentication rather than&amp;nbsp; authorization, do not provide a common password. &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;A name="wp1189819"&gt;&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P class="pB3_Body3"&gt;&lt;EM&gt; A RADIUS authorization server requires a password and username for each&amp;nbsp; connecting user. You enter the password here. The RADIUS authorization&amp;nbsp; server administrator must configure the RADIUS server to associate this&amp;nbsp; password with each user authorizing to the server via this FWSM. Be sure&amp;nbsp; to provide this information to your RADIUS server administrator. Enter a&amp;nbsp; common password for all users who are accessing this RADIUS&amp;nbsp; authorization server through this FWSM. &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;A name="wp1189826"&gt;&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P class="pB3_Body3"&gt;&lt;EM&gt; If you leave this field blank, each user password will be his or her own&amp;nbsp; username. For example, a user with the username "jsmith" would enter&amp;nbsp; "jsmith". As a security precaution never use a RADIUS authorization&amp;nbsp; server for authentication. Use of a common password or usernames as&amp;nbsp; passwords is much less secure than strong passwords per user."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried it and it work when I specified my test user's password in common password... but I can't do this for everybody &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ACS 5.2, is there a solution in this version?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2011 14:41:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552273#M346133</guid>
      <dc:creator>Patrick Tran</dc:creator>
      <dc:date>2011-02-25T14:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization problem between ASA - ACS 5.1 - AD (with Certi</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552274#M346140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just adding a thought here in case it might help anyone: instead of doing Radius authorization towards ACS, you could configure the ASA to do LDAP authorization directly to AD. This would not require a password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be similar to this:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008060f261.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008060f261.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;except that you would use certificate authentication instead of Kerberos - so you wouldn't need the authentication-server-group, and instead add username-from-certificate but I suppose you already have that part covered if you're doing Cert+Radius.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Feb 2011 11:55:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552274#M346140</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2011-02-28T11:55:18Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization problem between ASA - ACS 5.1 - AD (with Certi</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552275#M346167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Herbert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested LDAP authorization with group mapping before RADIUS.&lt;BR /&gt;It worked fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested ACS because I wanted to centralized company's authorizations on RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will stay on LDAP for the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Feb 2011 12:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-problem-between-asa-acs-5-1-ad-with-certificate/m-p/1552275#M346167</guid>
      <dc:creator>Patrick Tran</dc:creator>
      <dc:date>2011-02-28T12:39:24Z</dc:date>
    </item>
  </channel>
</rss>

