<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACS 5.1 - Evaluating Exception Authorization Policy in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491074#M377633</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for getting back to me. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AD is part of the selected Identity Store.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to migrate our our old Steelbelted Radius with a Vasco Plugin to the ACS with a new ActivIdentity OTP Token Server.&lt;/P&gt;&lt;P&gt;So I setup those two as Radius Identity Servers and placed them with the AD in an Identity Store. A reject of the first server will be treated as a user not found, if the second server sends a reject the ACS will treat it as an authentication failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't want to authenticate against the AD I just want the attribute in the user object as it contains the VPN Group Policy that needs to be applied to the user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Aug 2010 08:11:00 GMT</pubDate>
    <dc:creator>fschramke</dc:creator>
    <dc:date>2010-08-05T08:11:00Z</dc:date>
    <item>
      <title>ACS 5.1 - Evaluating Exception Authorization Policy</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491072#M377631</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm getting the error 'No rule was matched'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authentication itself passes; the 'Radius Identity Servers' are sending back the accept.&lt;/P&gt;&lt;P&gt;Tcpdump shows that the ACS is not asking the AD as defined in the compound condition.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I missing?&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/9/9/2/6299-ScreenShot015.jpg" alt="ScreenShot015.jpg" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:18:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491072#M377631</guid>
      <dc:creator>fschramke</dc:creator>
      <dc:date>2019-03-11T00:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1 - Evaluating Exception Authorization Policy</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491073#M377632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please clarify what you have selected as the result of the identity policy. If you are still using the default defined access services you will see this at the following location:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="cuesBreadcrumbStatic"&gt;Access Policies&lt;/SPAN&gt; &amp;gt; Access Services &amp;gt; Default Network Access &amp;gt; &lt;SPAN class="cuesBreadcrumbLast"&gt;Identity&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;In order to use the attributes from AD in the authorization decision Active Directory must be included in the results for the identity policy. This can be done in one of two ways:&lt;BR /&gt;- Select the database directly&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;- Define and select an identity sequence that includes Active Directory&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Aug 2010 06:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491073#M377632</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2010-08-05T06:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1 - Evaluating Exception Authorization Policy</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491074#M377633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for getting back to me. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AD is part of the selected Identity Store.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to migrate our our old Steelbelted Radius with a Vasco Plugin to the ACS with a new ActivIdentity OTP Token Server.&lt;/P&gt;&lt;P&gt;So I setup those two as Radius Identity Servers and placed them with the AD in an Identity Store. A reject of the first server will be treated as a user not found, if the second server sends a reject the ACS will treat it as an authentication failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't want to authenticate against the AD I just want the attribute in the user object as it contains the VPN Group Policy that needs to be applied to the user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Aug 2010 08:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491074#M377633</guid>
      <dc:creator>fschramke</dc:creator>
      <dc:date>2010-08-05T08:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1 - Evaluating Exception Authorization Policy</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491075#M377634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Argh...never mind; found it.&lt;/P&gt;&lt;P&gt;I had to add the AD in the Identity Store Sequence to the 'Additional Attribute Retrieval Search List Group'. &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help, put me on the right track. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Aug 2010 08:21:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491075#M377634</guid>
      <dc:creator>fschramke</dc:creator>
      <dc:date>2010-08-05T08:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1 - Evaluating Exception Authorization Policy</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491076#M377635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Was just writing that to respond but you got there first while I was in the middle&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interesting use case using some of the more adavnced capabilities&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Aug 2010 08:24:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491076#M377635</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2010-08-05T08:24:29Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1 - Evaluating Exception Authorization Policy</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491077#M377636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah...took a while to get all the little pieces clicked together, but now i got the last piece of the puzzle and can run some final tests today and then start migrating some test users. &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Aug 2010 08:34:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-evaluating-exception-authorization-policy/m-p/1491077#M377636</guid>
      <dc:creator>fschramke</dc:creator>
      <dc:date>2010-08-05T08:34:11Z</dc:date>
    </item>
  </channel>
</rss>

