<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ACS 5.0 and LDAP groups in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276594#M418940</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thx it works now, I attached the Failure Massage&lt;/P&gt;&lt;P&gt;.&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Jul 2010 07:17:28 GMT</pubDate>
    <dc:creator>a.schoppmeier</dc:creator>
    <dc:date>2010-07-20T07:17:28Z</dc:date>
    <item>
      <title>Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276583#M418924</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;having a problem with my new ACS 5.0 installation. &lt;/P&gt;&lt;P&gt;I'm able to read the LDAP-directory and see all need groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when I logon to a switch, my policy-rule, which references to a ldap-group, does not match, it always hits the default-rule. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I change the default rule to "allow" I'm able to logon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas why my rule does not match?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;about the directory:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 group with about 15 users&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Settings:&lt;/P&gt;&lt;P&gt;Subject Objectclass: person&lt;/P&gt;&lt;P&gt;Subject Name Attribute: sAMAccountname&lt;/P&gt;&lt;P&gt;Group Objectclass: group&lt;/P&gt;&lt;P&gt;Group Map Attribute: memberOf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group Objects Contain Reference to Subject &lt;/P&gt;&lt;P&gt;  -&amp;gt; Subjects in Groups are Stored in Member Attribute As: distinguisched name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subject Search-base point to where the users are stored&lt;/P&gt;&lt;P&gt;Object Search-base point to where the groups are stored&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No Username Domain Stripping&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards Dirk&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:47:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276583#M418924</guid>
      <dc:creator>Dirk Woellhaf</dc:creator>
      <dc:date>2019-03-10T23:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276584#M418925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dirk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having the same issue,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;have you solved it ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 05:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276584#M418925</guid>
      <dc:creator>y_yosi</dc:creator>
      <dc:date>2010-07-07T05:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276585#M418927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi together,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the same issue with ACS 5.1.0.44.3 and OpenLDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My LDAP structure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;users (ou=users,dc=cisco,dc=de)&lt;/P&gt;&lt;P&gt;objectClass: organisationalUnit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user:&lt;/P&gt;&lt;P&gt;uid:&lt;/P&gt;&lt;P&gt;userPassword&lt;/P&gt;&lt;P&gt;objectClass: account&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;groups (ou=groups,dc=cisco,dc=de)&lt;/P&gt;&lt;P&gt;objectClass: organisationalUnit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group&lt;/P&gt;&lt;P&gt;objectClass: groupOfNames&lt;/P&gt;&lt;P&gt;member: (z.B:&amp;nbsp; uid=user1,ou=users,dc=cisco,dc=de&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS is beable to read the groups and user from LDAP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Schema:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subject ObjectClass = account&lt;/P&gt;&lt;P&gt;Subject Name Attribute = uid&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group ObjectClass= GroupOfNames&lt;/P&gt;&lt;P&gt;Group Map Attribute = Member&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* Group Objects Contain Refererence To Subjects&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; * Subjects in Groups Are Stored in Member Attributes As: username&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Directory Structure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Subject Search Base: ou=users,dc=cisco,dc=de&lt;/P&gt;&lt;P&gt;- Group Search Base: ou=groups,dc=cisco,dc=de&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TEST CONFIG:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Primary Servers&amp;nbsp; Connection test bind Succeeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Number of Subjects: 6&lt;/P&gt;&lt;P&gt;Number of Groups: 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when I try to make a Group Mapping (Access Policies) the this rule will never match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The User will not authenticated, also I don't see a request from ACS to LDAP to authenticate the USER.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS shows Failure Reason:&amp;nbsp; 22056 Subject not found in the application identity stores(s)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did anyone get this run ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ciao Andre&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 10:56:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276585#M418927</guid>
      <dc:creator>a.schoppmeier</dc:creator>
      <dc:date>2010-07-19T10:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276586#M418929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you authenticating users against this LDAP database? If so you need to seelct this in the identity policy for the selected/matching user service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, after default installation the identity policy for network access RADIUS requests can be found at:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="cuesBreadcrumbStatic"&gt;Access Policies&lt;/SPAN&gt; &amp;gt;Access Services &amp;gt;Default Network Access &amp;gt; &lt;SPAN class="cuesBreadcrumbLast"&gt;Identity and is selected in the identity source&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 11:02:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276586#M418929</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2010-07-19T11:02:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276587#M418931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI &lt;A class="jiveTT-hover-user&amp;nbsp; jive-username-link" href="https://community.cisco.com/people/jrabinow" id="jive-21986130.119.868.447.799.855" onmouseout="" onmouseover=""&gt;jrabinow&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did this settings, I use Default Device Admin for Tacacs, and my internal Users match successfull against this rule &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I changed the order of operations - Users and Identity Stores - Indentity Store Sequence - LDAP first then Internal Users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I never get a Hit Count in the Group Mapping Rule, only the Default Rule match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ciao Andre&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 11:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276587#M418931</guid>
      <dc:creator>a.schoppmeier</dc:creator>
      <dc:date>2010-07-19T11:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276588#M418934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this RADIUS or TACACS+?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you added new access services since installation or using the default ones?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is selected as the result of identity policy in each of the access services?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the failure record, can you click on the details icon and copy the detailed steps performed for the request&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 12:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276588#M418934</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2010-07-19T12:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276589#M418935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I use local Users with Tacacs and Radius&lt;/P&gt;&lt;P&gt;LDAP Users are only Tacacs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I set the protocols for the Service Selection to the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- match protocol Radius - Default Network Access&lt;/P&gt;&lt;P&gt;- match protocol Tacacs - Default Device Admin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the Tacacs HitCount increase when I try to authenticate a LDAP user, so this seems to be working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No additional service was added.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured the nessary Shell-Profiles (Full-Access, Read-Only) and Command Sets (All-Commands), and tested them with the local users , works fine &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Created a Identiy Rule in the Default Device Admin:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* LDAP-RULE -&amp;nbsp; NDG: All Device Types -&amp;gt; use Identity Store "LDAP-Server"&lt;/P&gt;&lt;P&gt;* Default Rule -&amp;gt; use Internal Users&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group Mapping:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LDAP-Group1 - use Identity Group: Full-Access (Shell Profile) - (Command-Set All Commands)&lt;/P&gt;&lt;P&gt;LDAP-Group2 - use Identity Group: Read-Only (Shell Profile) - (Only PrivLevel 1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But still get only HitCounts for the Identity Default Rule, the LDAP-Rule never matches&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reselution step of the detailed failure is, Check whether the subject is present in any one of the chosen identity stores.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will not help me .....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx for your help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 13:08:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276589#M418935</guid>
      <dc:creator>a.schoppmeier</dc:creator>
      <dc:date>2010-07-19T13:08:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276590#M418936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for me it seem that the ACS is only checking the internal user database.&lt;/P&gt;&lt;P&gt;have you configured a "Identity Store Sequence"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not, try to configure on under:&lt;/P&gt;&lt;P&gt;"Users and Identity Stores" -&amp;gt; "Identity Store Sequence" and specifiy the order in which the Directories should be scanned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then map the "Identity Store Sequence" tp your access-policy&lt;/P&gt;&lt;P&gt;"access polivies" -&amp;gt; "Your Policy" -&amp;gt; "Identity" -&amp;gt; "Singel result selection" -&amp;gt; "Identity Source"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Works fine for me with Local-DB + ActiveDirectory as Identity Store.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 13:21:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276590#M418936</guid>
      <dc:creator>Dirk Woellhaf</dc:creator>
      <dc:date>2010-07-19T13:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276591#M418937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dirk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i will try that and let you know ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ciao Andre&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 13:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276591#M418937</guid>
      <dc:creator>a.schoppmeier</dc:creator>
      <dc:date>2010-07-19T13:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276592#M418938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please also provide the details information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To get this do the following:&lt;/P&gt;&lt;P&gt;- go to "&lt;SPAN class="cuesBreadcrumbStatic"&gt;Monitoring &amp;amp; Reports&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="cuesBreadcrumbStatic"&gt;Reports&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="cuesBreadcrumbStatic"&gt;Catalog&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="cuesBreadcrumbLast"&gt;AAA Protocol &amp;gt; TACACS Authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;You will get the pass fail information summary together with the reason. Click on icon (magnifying glass) for details. You will get a page for the full processing of the request. It will tell you which stores were accessed etc, which rules matched&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;Can you copy this information&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 13:29:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276592#M418938</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2010-07-19T13:29:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276593#M418939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dirk, Hi &lt;SPAN class="jiveTT-hover-user&amp;nbsp; jive-username-link"&gt;jrabinow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx for the hint &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That was the problem ,&amp;nbsp; I defined the Identity Store Sequence, but within the Access Policies Indetity, I created two rules, one for all Devices Internal Users, and one for LDAP users, but if the User was not found in one of them the sequence moved to default.&lt;/P&gt;&lt;P&gt;Maybe also because of the Advanced Options, the where default, so no further Rule will be processed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the only rule within Identity is all Devices - Identity Store "LDAP-vy-Internal" created within Identity Store Sequence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And it works as designed !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx again, sometimes we are blind, to see little mistakes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ciao Andre&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;############# Monitor Output ############&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;AAA Protocol &amp;gt; TACACS+ Authentication Details&lt;BR /&gt;Date : &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;July 19, 2010 2010 18:48:54 PM UTC&lt;BR /&gt;Authentication Details&lt;BR /&gt;Status:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Failed&lt;BR /&gt;Failure Reason:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 22056 Subject not found in the applicable identity store(s).&lt;BR /&gt;Logged At:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Jul 19, 2010 18:48 PM&lt;BR /&gt;ACS Time:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Jul 19, 2010 18:48 PM&lt;BR /&gt;ACS Instance:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; LDAP-Server&lt;BR /&gt;Authentication Method:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;PAP_ASCII&lt;BR /&gt;Authentication Type:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;ASCII&lt;BR /&gt;Privilege Level:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;1&lt;BR /&gt;User&lt;BR /&gt;Username:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; test3&lt;BR /&gt;Remote Address:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;169.254.0.50&lt;BR /&gt;Network Device&lt;BR /&gt;Network Device:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cisco-7200-Tac&lt;BR /&gt;Network Device IP Address:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;169.254.0.254&lt;BR /&gt;Network Device Groups:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Device Type:All Device Types:Cisco-7200-Tac, Location:All Locations&lt;BR /&gt;Access Policy&lt;BR /&gt;Access Service:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Default Device Admin&lt;BR /&gt;Identity Store:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;Selected Shell Profile:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;Active Directory Domain:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;Identity Group:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;Access Service Selection Matched Rule :&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Rule-2&lt;BR /&gt;Identity Policy Matched Rule:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Default&lt;BR /&gt;Selected Identity Stores:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Internal Users&lt;BR /&gt;Query Identity Stores:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;Selected Query Identity Stores:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;Group Mapping Policy Matched Rule:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;Authorization Policy Matched Rule:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;Authorization Exception Policy Matched Rule:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;Other&lt;BR /&gt;ACS Session ID:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;LDAP-Server/68386637/134&lt;BR /&gt;Service:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Login&lt;BR /&gt;AV Pairs:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;Response Time:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;9&lt;BR /&gt;Other Attributes:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;ACSVersion=acs-5.1.0.44-B.2347 &lt;BR /&gt;ConfigVersionId=74 &lt;BR /&gt;Device Port=21204 &lt;BR /&gt;Protocol=Tacacs &lt;BR /&gt;Type=Authentication &lt;BR /&gt;Action=Login &lt;BR /&gt;Action=Login&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Authentication Result&lt;BR /&gt;AuthenticationResult=UnknownUser&lt;BR /&gt; Type=Authentication&lt;BR /&gt; Authen-Reply-Status=Fail&lt;BR /&gt;Steps&lt;BR /&gt;Received TACACS+ Authentication START Request&lt;BR /&gt;Evaluating Service Selection Policy&lt;BR /&gt;Matched rule&lt;BR /&gt;Selected Access Service - Default Device Admin&lt;BR /&gt;Returned TACACS+ Authentication Reply&lt;BR /&gt;Received TACACS+ Authentication CONTINUE Request&lt;BR /&gt;Using previously selected Access Service&lt;BR /&gt;Evaluating Identity Policy&lt;BR /&gt;Matched Default Rule&lt;BR /&gt;Selected Identity Store -&lt;BR /&gt;Current Identity Store does not support the authentication method; Skipping it.&lt;BR /&gt;TACACS+ will use the password prompt from global TACACS+ configuration.&lt;BR /&gt;Returned TACACS+ Authentication Reply&lt;BR /&gt;Received TACACS+ Authentication CONTINUE Request&lt;BR /&gt;Using previously selected Access Service&lt;BR /&gt;Identity Policy was evaluated before; Identity Sequence continuing&lt;BR /&gt;&lt;STRONG&gt;Looking up User in Internal Users IDStore - test3&lt;/STRONG&gt;&amp;nbsp; ######## But this is a LDAP User ########&lt;BR /&gt;&lt;STRONG&gt;The user is not found in the internal users identity store.&lt;/STRONG&gt;&lt;BR /&gt;Subject not found in the applicable identity store(s).&lt;BR /&gt;&lt;STRONG&gt;The advanced option that is configured for an unknown user is used.&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;The 'Reject' advanced option is configured in case of a failed authentication request.&lt;/STRONG&gt;&lt;BR /&gt;Returned TACACS+ Authentication Reply&lt;BR /&gt;Additional Details&lt;BR /&gt;Diagnostics ACS Configuration Changes&lt;/P&gt;&lt;P&gt;############# Monitor Output ############&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jul 2010 07:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276593#M418939</guid>
      <dc:creator>a.schoppmeier</dc:creator>
      <dc:date>2010-07-20T07:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276594#M418940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thx it works now, I attached the Failure Massage&lt;/P&gt;&lt;P&gt;.&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jul 2010 07:17:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276594#M418940</guid>
      <dc:creator>a.schoppmeier</dc:creator>
      <dc:date>2010-07-20T07:17:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276595#M418941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cool!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad that we were able to solve it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enjoy the ACS 5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jul 2010 07:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276595#M418941</guid>
      <dc:creator>Dirk Woellhaf</dc:creator>
      <dc:date>2010-07-20T07:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276596#M418942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: Arial;"&gt;Dirk, I think this solves what I am trying to do but I fail to follow a few of the steps. I am trying to have an Access Policy with both an Identity Group pointing to an Internal Identity Store and an External Group pointing to LDAP. The orignal Policy points only to LDAP and works fine. When I added an Internal Group it wouldn't authenticate and it broke LDAP for that Policy. I will use a resolution that works with one Policy line or two. Not sure which way you guys ended up. Under Identity Store Sequence, I have just the default sequence Identity Search Order. Under the first Retrieval Search List I have my LDAP followed by Internal Users. There is an Additional Retrieval Search List that only lists LDAP. And under Access Policies, Access Services, Default Device Admin, Identity, I have Single result selection selected with Identity Source = Identity Search Order. Advanced Options are Reject Reject Drop. Is that what stops the process after LDAP fails to authenticate? Thanks, Kevin&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Sep 2010 23:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276596#M418942</guid>
      <dc:creator>kschleppenbach</dc:creator>
      <dc:date>2010-09-08T23:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS 5.0 and LDAP groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276597#M418943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will be out of office from  06.09.2010 until 20.09.2010&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will respond to your mail after my return to the office.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Landesbank Baden-Wuerttemberg&lt;/P&gt;&lt;P&gt;Anstalt des oeffentlichen Rechts&lt;/P&gt;&lt;P&gt;Hauptsitze: Stuttgart, Karlsruhe, Mannheim, Mainz&lt;/P&gt;&lt;P&gt;HRA 12704&lt;/P&gt;&lt;P&gt;Amtsgericht Stuttgart&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Sep 2010 02:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-5-0-and-ldap-groups/m-p/1276597#M418943</guid>
      <dc:creator>Dirk Woellhaf</dc:creator>
      <dc:date>2010-09-09T02:21:12Z</dc:date>
    </item>
  </channel>
</rss>

