<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic it worked for me thx in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-8-vpn-authentication-using-ad-and-external-otp-server/m-p/2822400#M41063</link>
    <description>&lt;P&gt;it worked for me thx&lt;/P&gt;
&lt;P&gt;for people who may encunter same problem here is what i did:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i just created an "identity store sequences" with the radius server ( acitveidentity&amp;nbsp;at the top )&amp;nbsp;and than the internal database.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the access policy is configured as follow:&lt;/P&gt;
&lt;P&gt;1)&amp;nbsp; identity: the new identity sequence store&amp;nbsp;&amp;amp; protocol (in the&amp;nbsp;"Rule based result selection"&lt;/P&gt;
&lt;P&gt;2)&amp;nbsp; authorizaion&amp;nbsp;: 2 rules&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;a) check the AD database&amp;nbsp; and protocol&amp;nbsp; ( for employee&amp;nbsp; authentication )&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;b) check protocol and any optional ACL's ( for external partner authentication )&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;This&amp;nbsp;conf worked for me because users lookup is performed against Radius server first and ,if no user is found, is performed then &amp;nbsp;on the internal DB ( identity selection)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;empoyee authorization is performed against specific AD Group ( authorization policy A ) and external authorization with restictions ( authorization policy B )&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Hope it helps&lt;/P&gt;</description>
    <pubDate>Wed, 13 Jan 2016 16:13:06 GMT</pubDate>
    <dc:creator>Dikkia</dc:creator>
    <dc:date>2016-01-13T16:13:06Z</dc:date>
    <item>
      <title>acs 5.8 vpn authentication using AD and External OTP server</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-vpn-authentication-using-ad-and-external-otp-server/m-p/2822396#M41059</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;is it possible to authenticate an user using Active Directory, internal database and OTP server for password?&lt;/P&gt;
&lt;P&gt;what i want to achieve is:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- if the VPN user belongs to a specific group of our AD....perform the user lookup on that Group and if user exists than &amp;nbsp;ask to an external sever ( activeidentity ) for OTP password&lt;/P&gt;
&lt;P&gt;- If the user belong to internal ACS Group, authenticate it internally.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;till now i've been able to authenticate users just with the EXTERNAL server (active identity) but AD lookup is not performed.&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-vpn-authentication-using-ad-and-external-otp-server/m-p/2822396#M41059</guid>
      <dc:creator>Dikkia</dc:creator>
      <dc:date>2019-03-11T06:22:56Z</dc:date>
    </item>
    <item>
      <title>Yes !!</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-vpn-authentication-using-ad-and-external-otp-server/m-p/2822397#M41060</link>
      <description>&lt;P&gt;Yes !!&lt;/P&gt;
&lt;P&gt;Go to access policies &amp;gt; Default network Access &amp;gt; identity &amp;gt; Select a radio button " Rule based result selection. Over here you can use more than identity store based on the condition you have.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps. - Jatin&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2016 10:08:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-vpn-authentication-using-ad-and-external-otp-server/m-p/2822397#M41060</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2016-01-12T10:08:26Z</dc:date>
    </item>
    <item>
      <title>thx.... even if i'm not sure</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-vpn-authentication-using-ad-and-external-otp-server/m-p/2822398#M41061</link>
      <description>&lt;P&gt;thx.... even if i'm not sure how to accomplish it.&lt;/P&gt;
&lt;P&gt;how can i setup a rule that checks if a user&amp;nbsp;belong to&amp;nbsp;an&amp;nbsp;AD group, and &amp;nbsp;(if user&amp;nbsp;exist) ask the password to External radius server?&lt;/P&gt;
&lt;P&gt;at the same time, &amp;nbsp;if the above checks fail, it should check the internal&amp;nbsp; database.&lt;/P&gt;
&lt;P&gt;could you pls me give additional suggestion ?&lt;/P&gt;
&lt;P&gt;many thx&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2016 10:29:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-vpn-authentication-using-ad-and-external-otp-server/m-p/2822398#M41061</guid>
      <dc:creator>Dikkia</dc:creator>
      <dc:date>2016-01-12T10:29:09Z</dc:date>
    </item>
    <item>
      <title>maybe some printscreen could</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-vpn-authentication-using-ad-and-external-otp-server/m-p/2822399#M41062</link>
      <description>&lt;P&gt;maybe some printscreen could help.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;as you&amp;nbsp; can see , i've created the&amp;nbsp;"rule base selection" under "identity" of the "default network access".&amp;nbsp; Same thing&amp;nbsp;for "authorization"....but still doesn't work.&lt;/P&gt;
&lt;P&gt;it seems that it checks if the user is local but after that nothing happen.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;any idea?&lt;/P&gt;
&lt;P&gt;many thx&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2016 12:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-vpn-authentication-using-ad-and-external-otp-server/m-p/2822399#M41062</guid>
      <dc:creator>Dikkia</dc:creator>
      <dc:date>2016-01-12T12:32:44Z</dc:date>
    </item>
    <item>
      <title>it worked for me thx</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-vpn-authentication-using-ad-and-external-otp-server/m-p/2822400#M41063</link>
      <description>&lt;P&gt;it worked for me thx&lt;/P&gt;
&lt;P&gt;for people who may encunter same problem here is what i did:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i just created an "identity store sequences" with the radius server ( acitveidentity&amp;nbsp;at the top )&amp;nbsp;and than the internal database.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the access policy is configured as follow:&lt;/P&gt;
&lt;P&gt;1)&amp;nbsp; identity: the new identity sequence store&amp;nbsp;&amp;amp; protocol (in the&amp;nbsp;"Rule based result selection"&lt;/P&gt;
&lt;P&gt;2)&amp;nbsp; authorizaion&amp;nbsp;: 2 rules&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;a) check the AD database&amp;nbsp; and protocol&amp;nbsp; ( for employee&amp;nbsp; authentication )&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;b) check protocol and any optional ACL's ( for external partner authentication )&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;This&amp;nbsp;conf worked for me because users lookup is performed against Radius server first and ,if no user is found, is performed then &amp;nbsp;on the internal DB ( identity selection)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;empoyee authorization is performed against specific AD Group ( authorization policy A ) and external authorization with restictions ( authorization policy B )&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Hope it helps&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 16:13:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-vpn-authentication-using-ad-and-external-otp-server/m-p/2822400#M41063</guid>
      <dc:creator>Dikkia</dc:creator>
      <dc:date>2016-01-13T16:13:06Z</dc:date>
    </item>
  </channel>
</rss>

