<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic acs 5.1 and external (AD) database in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-1-and-external-ad-database/m-p/1508215#M350315</link>
    <description>&lt;P&gt;Good day all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured the acs box properly with all the command sets, shell profiles and authorization rules. Local authorization works well but I am now trying to use the AD to authenticate. I have joined the domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I try to log into the devices now, it does not work using my domain user ID's. but when I specify the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;condition - AD1:UserPrincipalName, shell profile and assign a command set it works. My problem is that I don't want to create a rule per user (as it is required if i user :condition - AD1:UserPrincipalName) neither do I want to apply the rule to the groups in AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I mapp the AD groups to the Local groups?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can I apply the rule using the object : AD1:memberOf&amp;nbsp; with the "CONTAIN" option? When I try this, it does not work. (I.e AD1:memberOf : contain (CN=marketing)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any documentation that clearly explain the steps for configuring external database?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have looked at most Cisco documentation on this but I don't mind, I would still go through any one you recommend.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards to all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks alot.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 00:27:49 GMT</pubDate>
    <dc:creator>ighoisgreat</dc:creator>
    <dc:date>2019-03-11T00:27:49Z</dc:date>
    <item>
      <title>acs 5.1 and external (AD) database</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-and-external-ad-database/m-p/1508215#M350315</link>
      <description>&lt;P&gt;Good day all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured the acs box properly with all the command sets, shell profiles and authorization rules. Local authorization works well but I am now trying to use the AD to authenticate. I have joined the domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I try to log into the devices now, it does not work using my domain user ID's. but when I specify the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;condition - AD1:UserPrincipalName, shell profile and assign a command set it works. My problem is that I don't want to create a rule per user (as it is required if i user :condition - AD1:UserPrincipalName) neither do I want to apply the rule to the groups in AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I mapp the AD groups to the Local groups?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can I apply the rule using the object : AD1:memberOf&amp;nbsp; with the "CONTAIN" option? When I try this, it does not work. (I.e AD1:memberOf : contain (CN=marketing)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any documentation that clearly explain the steps for configuring external database?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have looked at most Cisco documentation on this but I don't mind, I would still go through any one you recommend.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards to all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks alot.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:27:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-and-external-ad-database/m-p/1508215#M350315</guid>
      <dc:creator>ighoisgreat</dc:creator>
      <dc:date>2019-03-11T00:27:49Z</dc:date>
    </item>
    <item>
      <title>Re: acs 5.1 and external (AD) database</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-and-external-ad-database/m-p/1508216#M350337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think I understand your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have the users defined in a group in AD, you can map that group in ACS and then use it in an Authorization profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, specific users we want to allow to connect thru our access points. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under External Identity Store -&amp;gt; Active Directory, on the 2nd tab (Directory Groups) chose select. then you can search for the group you are wanting to be able to map to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under Access Policies, chose the appropriate Access service policy.&amp;nbsp; Set the Identity to AD.&amp;nbsp; Under authorization, click the customize button and AD:External Groups.&amp;nbsp; Now when you create the rule, you can have it Permit Access for the specific group.&amp;nbsp; Change the "default" for the Authorization to deny all.&amp;nbsp; That will allow people matching that rule access and deny others that meat just the AD member requirement.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 19:14:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-and-external-ad-database/m-p/1508216#M350337</guid>
      <dc:creator>burnsidestev</dc:creator>
      <dc:date>2010-10-04T19:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: acs 5.1 and external (AD) database</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-and-external-ad-database/m-p/1508217#M350447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much for your reply. I have tried this but it does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I did :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I followed you step and selected both AD1:External Groups and AD1:member when I customized the authorization menu. The issue is that My organisation did not group each user by department but rather by some other methods so you could have a user in one department in a different AD group but in the Attribute tab of External user database, I have selected the "member of" option so I could use this as all users are well grouped here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When configuring access policies, i try to use this field. I choose the "AD1:member off" attribute and select the "contain" option and fill the space with something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;network team&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;exactly the way it is in AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when I try to authenticate, it does not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i select the AD1:userPrincipalName attribute and fill in the name, it works and applies the exact policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 18:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-and-external-ad-database/m-p/1508217#M350447</guid>
      <dc:creator>ighoisgreat</dc:creator>
      <dc:date>2010-10-05T18:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: acs 5.1 and external (AD) database</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-and-external-ad-database/m-p/1508218#M350544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you set up Active Directory under External Identity Stores, did you go to the Directory Groups tab and add your AD OU's?&lt;/P&gt;&lt;P&gt;Like the your.domain.com/Builtin/Users group?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think you are supposed to type in anything manually when setting up Authorization in the policies, all should be selected from lists.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 21:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-and-external-ad-database/m-p/1508218#M350544</guid>
      <dc:creator>dal</dc:creator>
      <dc:date>2010-10-05T21:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: acs 5.1 and external (AD) database</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-and-external-ad-database/m-p/1508219#M350663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes,&amp;nbsp; as Dal said, you map them in the same identity store area you added AD:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under External Identity Store -&amp;gt; Active Directory, on the 2nd tab&amp;nbsp; (Directory Groups) chose select. then you can search for the group you&amp;nbsp; are wanting to be able to map to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then in the Authorization profile, you only need to customize and add AD:external groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the rule, you put a check mark in that selection and use the select button to chose the mapped group.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 21:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-and-external-ad-database/m-p/1508219#M350663</guid>
      <dc:creator>burnsidestev</dc:creator>
      <dc:date>2010-10-05T21:27:53Z</dc:date>
    </item>
  </channel>
</rss>

