<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I'm not aware of another way in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/2762471#M54166</link>
    <description>&lt;P&gt;I'm not aware of another way of doing this, the use case for this type of thing is normally filled by BYOD scenarios, where the authorization rules can be more granular if you use something like a single ssid with PEAP to start provisioning of certificates for "BYOD" devices.&lt;/P&gt;</description>
    <pubDate>Fri, 04 Sep 2015 14:53:29 GMT</pubDate>
    <dc:creator>jan.nielsen</dc:creator>
    <dc:date>2015-09-04T14:53:29Z</dc:date>
    <item>
      <title>Sponsored Guest Portal with Active Directory users and group restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/2762468#M54159</link>
      <description>&lt;P&gt;Hi board,&lt;/P&gt;&lt;P&gt;I'm using Cisco ISE 1.3 and 1.4 and (disclaimer following:) maybe this is a silliy question &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Here's the deal:&lt;/P&gt;&lt;P&gt;I want to create a sponsored guest portal using Active Directory credentials.&lt;/P&gt;&lt;P&gt;The use case is Internet access for employees with personal devices and I don't want to implement the BYOD device registration stuff - sorry.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's what I did:&lt;/P&gt;&lt;P&gt;1.) Created a new &lt;STRONG&gt;guest type&lt;/STRONG&gt; for employees. Basically to save the endpoint MAC addresses to a separate endpoint identity group ("&lt;EM&gt;employee_guest_endpoints&lt;/EM&gt;")&lt;/P&gt;&lt;P&gt;2.) &lt;STRONG&gt;Added the Active-Directory&lt;/STRONG&gt; external identity store to the &lt;STRONG&gt;guest sequence&lt;/STRONG&gt;, which is used in the sponsored guest portal configuration&lt;/P&gt;&lt;P&gt;3.) Added an authorization rule for the corresponding AD group which are allowed to use this Internet access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sounds easy right? But there are some issues using this approach.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;1.) All AD objects are able to authenticate (not authorize) at the guest portal&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Because in the guest portal configuration only a sequence of identity stores is possible, all AD objects are able to register a MAC address because authentication is ok, right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To overcome the issue 1.) I have to following authorization rule (simplified):&lt;/P&gt;&lt;P&gt;&lt;EM&gt;If "Wireless_MAB" and "guest-SSID" and "AD:external-groups equals "allowed-internet-employees" then PermitAccess&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;This works perfectly - but ....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;2.) When the wireless connection is shortly down (WLC deletes user from WLC user db after the user idle timeout), the user needs to authorize again at the portal&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Here's why:&lt;/P&gt;&lt;P&gt;The WLC performs MAB and sends the MAC to the ISE. The ISE passes authentication because it has the MAC in the EP identity group. Authorization fails, because the rule mentioned above with the AD group does not match. There is no link between the MAC address to the AD group if there's no authentication at the web portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- I cannot build an authorization rule like&lt;/P&gt;&lt;P&gt;&lt;EM&gt;If "employee_guest_endpoints" and "Wireless_MAB" and "guest-SSID" and then PermitAccess&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Because the EP group &lt;EM&gt;"employee_guest_endpoints" &lt;/EM&gt;is not limited to members of an AD group. Each object in the AD (because of the guest portal configuration) is able to authenticate to the portal and therefore a MAC address is added to the EP group "&lt;EM&gt;employee_guest_endpoints&lt;/EM&gt;"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So long story short:&lt;/P&gt;&lt;P&gt;Is there a way to&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Authenticate AD users but only authorize them if they belong to a group for CWA?&lt;/LI&gt;&lt;LI&gt;At the same time the AD users should not need to use the guest portal everytime the WLAN connection is shortly down as for the sponsored normal guest users&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/2762468#M54159</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2019-03-11T06:01:39Z</dc:date>
    </item>
    <item>
      <title>Create a new AD connector</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/2762469#M54161</link>
      <description>&lt;P&gt;Create a new AD connector with LDAP to the same AD, and point the base DN user search to only look in the group you wan't to be able to authenticate with their AD credentials, to get guest access. Then use this id store in your guest sequence, and remove the old AD one. Now you should be able to allow the guest portal to auto-register those mac adresses in it's own group, and then just mab validate those mac addresses the next time the device is kicked off and tries to come back online, with a specific authorization rule for the condition : endpoint group+ssid+mab. If you wan't to, you can purge the devices from that group&amp;nbsp; when they reach a certain age, to re-trigger guest login.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2015 14:14:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/2762469#M54161</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-09-04T14:14:27Z</dc:date>
    </item>
    <item>
      <title>Wow - thats pretty clever!</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/2762470#M54163</link>
      <description>&lt;P&gt;Wow - thats pretty clever! With this approach I can cover one AD group.&lt;/P&gt;&lt;P&gt;But (sorry to say this) this is like a "hack" for the whole problem (but a very clever one).&lt;/P&gt;&lt;P&gt;Is there no standard solution for this use case? Or does Cisco want to enforce the BYOD and myportal solution for this?&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2015 14:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/2762470#M54163</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2015-09-04T14:32:03Z</dc:date>
    </item>
    <item>
      <title>I'm not aware of another way</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/2762471#M54166</link>
      <description>&lt;P&gt;I'm not aware of another way of doing this, the use case for this type of thing is normally filled by BYOD scenarios, where the authorization rules can be more granular if you use something like a single ssid with PEAP to start provisioning of certificates for "BYOD" devices.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2015 14:53:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/2762471#M54166</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-09-04T14:53:29Z</dc:date>
    </item>
    <item>
      <title>I have the exact same need to</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/2762472#M54167</link>
      <description>&lt;P&gt;I have the exact same need to lockdown my staff portal to users in an AD group but having issues. I have the connector setup no problem but I can't find the users that are in an AD group. To clarify, this setup is for finding users in a group versus an OU? If I point the Subject Search Base to an OU where the user is stored it works but my users are stored in OUs all over AD so this won't work for this setup. If I point the Subject Search Base to the path of the group then it doesn't find any users. I've messed around with different combinations within the schema configuration and no luck.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any help from anyone that has pointed the connector to a group and is able to retrieve the users would be much appreciated!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2017 22:07:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/2762472#M54167</guid>
      <dc:creator>dkorell</dc:creator>
      <dc:date>2017-01-13T22:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: I have the exact same need to</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/4589221#M573986</link>
      <description>&lt;P&gt;Hey I know this is a few years old, but were you ever able to figure out a solution to this? I'm running into this exact same scenario.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2022 16:23:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/4589221#M573986</guid>
      <dc:creator>Stevenmns</dc:creator>
      <dc:date>2022-04-08T16:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: I have the exact same need to</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/4593651#M574181</link>
      <description>&lt;P&gt;I suggest creating a new Question in the community with your specific details.&lt;/P&gt;
&lt;P&gt;See &lt;LI-MESSAGE title="How to Ask The Community for Help" uid="3704356" url="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/m-p/3704356#U3704356"&gt;&lt;/LI-MESSAGE&gt; to minimize any back and forth for details.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2022 18:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsored-guest-portal-with-active-directory-users-and-group/m-p/4593651#M574181</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-04-15T18:17:01Z</dc:date>
    </item>
  </channel>
</rss>

