<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic many thx but doesn't work for in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-two-factor-authentication-using-ad-group-internal-user/m-p/2822647#M41056</link>
    <description>&lt;P&gt;many thx but doesn't work for me.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Jan 2016 15:16:54 GMT</pubDate>
    <dc:creator>Dikkia</dc:creator>
    <dc:date>2016-01-12T15:16:54Z</dc:date>
    <item>
      <title>ACS: two factor authentication using AD group/internal user, external proxy</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-two-factor-authentication-using-ad-group-internal-user/m-p/2822645#M41054</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;as far as you know, it could be possible to have two factor authentication in acs 5.x?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What i want to achieve is:&lt;/P&gt;
&lt;P&gt;1) if a VPN user try joint the network, a user lookup needs to be performed against a specific&amp;nbsp;Group in AD, but the password needs to be verified by an external OTP server ( ActiveIdentity).&lt;/P&gt;
&lt;P&gt;2) if the user is not found in the AD Group ABOVE, an internal lookup needs to be performed&amp;nbsp;against &amp;nbsp;ACS database.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you know if it's possible?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Untill now i've been able ONLY to peform External autentication using ( configuring ACS as a proxy) but no lookup against AD as been performed.&lt;/P&gt;
&lt;P&gt;many thx&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-two-factor-authentication-using-ad-group-internal-user/m-p/2822645#M41054</guid>
      <dc:creator>Dikkia</dc:creator>
      <dc:date>2019-03-11T06:22:58Z</dc:date>
    </item>
    <item>
      <title>(1). Configure ActiveIdentity</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-two-factor-authentication-using-ad-group-internal-user/m-p/2822646#M41055</link>
      <description>&lt;P&gt;(1). Configure&amp;nbsp;&lt;SPAN&gt;ActiveIdentity as a RADIUS server for authentication, and then configure a DAP (Dynamic Access Policy) and do an LDAP lookup to confirm the user is a member of the AD group desired. &amp;nbsp;Check out this URL (search for Active Directory to get to the right bit quickly).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/108000-dap-deploy-guide.html"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/108000-dap-deploy-guide.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;(2). &amp;nbsp;90% yes (haven't tried it myself but should work), with the same approach above. &amp;nbsp;Create two policies, but make the above a higher priority policy.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2016 05:53:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-two-factor-authentication-using-ad-group-internal-user/m-p/2822646#M41055</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-01-12T05:53:16Z</dc:date>
    </item>
    <item>
      <title>many thx but doesn't work for</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-two-factor-authentication-using-ad-group-internal-user/m-p/2822647#M41056</link>
      <description>&lt;P&gt;many thx but doesn't work for me.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2016 15:16:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-two-factor-authentication-using-ad-group-internal-user/m-p/2822647#M41056</guid>
      <dc:creator>Dikkia</dc:creator>
      <dc:date>2016-01-12T15:16:54Z</dc:date>
    </item>
    <item>
      <title>Which bit doesn't work?  (1)</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-two-factor-authentication-using-ad-group-internal-user/m-p/2822648#M41057</link>
      <description>&lt;P&gt;Which bit doesn't work? &amp;nbsp;(1) will definitely work. &amp;nbsp;RADIUS provides the authentication and AD provides the authorisation.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2016 17:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-two-factor-authentication-using-ad-group-internal-user/m-p/2822648#M41057</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-01-12T17:29:17Z</dc:date>
    </item>
    <item>
      <title>i'll try to explain.</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-two-factor-authentication-using-ad-group-internal-user/m-p/2822649#M41058</link>
      <description>&lt;P&gt;i'll try to explain.&lt;/P&gt;
&lt;P&gt;i have some difficulties in configuring DAP that's why doesn't work for me...btw i found a different way to accomplish it...a bit easiser&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i just created an identity store sequences with the radius server ( acitveidentity in the top )&amp;nbsp;and than the internal database.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the access policy is configured as follow:&lt;/P&gt;
&lt;P&gt;1)&amp;nbsp; identity: the new identity sequence store&amp;nbsp;&amp;amp; protocol (in the&amp;nbsp;"Rule based result selection"&lt;/P&gt;
&lt;P&gt;2)&amp;nbsp; authorizaion there are 2 rules:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;a) check the AD database&amp;nbsp; and protocol&amp;nbsp; ( for employee&amp;nbsp; authentication )&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;b) check protocol and any optional ACL's ( for external partner authentication )&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;This way it works for me cause users lookup is performed against Radius server first and ,if no user is found, is performed then &amp;nbsp;on the internal DB ( identity selection)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;empoyee authorization is performed against specific AD Group ( authorization policy A ) and external authorization with restiction ( authorization policy B )&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Hope it helps&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 16:08:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-two-factor-authentication-using-ad-group-internal-user/m-p/2822649#M41058</guid>
      <dc:creator>Dikkia</dc:creator>
      <dc:date>2016-01-13T16:08:38Z</dc:date>
    </item>
  </channel>
</rss>

