<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS v5.6 and authorization problems with remote forest in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3334404#M556216</link>
    <description>&lt;P&gt;Folks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a weird ACS authorisation problem on which I'm hoping the AAA community here can shed some light...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Users &amp;amp; computers exist in a remote AD (abc.local) which has a 2-way Forest Trust AD with the AD to which ACS v5.6 is joined (xyz.net)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My ACS will 'authorise' AD-authenticated&amp;nbsp;in the abc.local AD ONLY IF ExternalGroups ARE NOT&amp;nbsp;configured in the authorisation rule.&amp;nbsp; If ExternalGroups are configured, the authorisation fails with 'Access-Reject'&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 18:46:08 GMT</pubDate>
    <dc:creator>simong</dc:creator>
    <dc:date>2020-02-21T18:46:08Z</dc:date>
    <item>
      <title>ACS v5.6 and authorization problems with remote forest</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3334404#M556216</link>
      <description>&lt;P&gt;Folks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a weird ACS authorisation problem on which I'm hoping the AAA community here can shed some light...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Users &amp;amp; computers exist in a remote AD (abc.local) which has a 2-way Forest Trust AD with the AD to which ACS v5.6 is joined (xyz.net)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My ACS will 'authorise' AD-authenticated&amp;nbsp;in the abc.local AD ONLY IF ExternalGroups ARE NOT&amp;nbsp;configured in the authorisation rule.&amp;nbsp; If ExternalGroups are configured, the authorisation fails with 'Access-Reject'&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3334404#M556216</guid>
      <dc:creator>simong</dc:creator>
      <dc:date>2020-02-21T18:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: ACS v5.6 and authorization problems with remote forest</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3334443#M556220</link>
      <description>&lt;P&gt;It seems during the user lookup, the AD groups are not popping up for that specific user, hence not matching the authz policy and getting the results ( Deny ) from the Default one. In order to verify, look at the details of radius authentication log for external AD groups. Was this working in the past ? also do you have forest 2-way trust ?&lt;/P&gt;
&lt;P&gt;~ JK&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 16:58:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3334443#M556220</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2018-02-20T16:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: ACS v5.6 and authorization problems with remote forest</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3334524#M556225</link>
      <description>&lt;P&gt;Hi Jatin, thanks for replying. This particular AD authorization policy is a new requirement to enable wifi mobility with partner organisation's AD. The RADIUS authorisation log does contain an entry indicating 'Retrieval of all groups was not possible' (or similar message) but I've seen this message before and ignored it as no problems were encountered.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a forest 2-way trust in place with this AD. Authz policies for other Ad's that do work are external 2-way trusts so I don't have a working precedent though I'm presuming it is a supported configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If there was a handy command which could be used with the ACS ADCLIENT CLI troubleshooting to obtain the list of groups an AD user belongs then this may help to highlight the underlying issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Simon&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 19:13:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3334524#M556225</guid>
      <dc:creator>simong</dc:creator>
      <dc:date>2018-02-20T19:13:22Z</dc:date>
    </item>
    <item>
      <title>Re: ACS v5.6 and authorization problems with remote forest</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3335244#M556246</link>
      <description>&lt;P&gt;Not sure if you are aware about this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACS-EOL.png" style="width: 713px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/7851i77B2728BF1640AE6/image-size/large?v=v2&amp;amp;px=999" role="button" title="ACS-EOL.png" alt="ACS-EOL.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 16:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3335244#M556246</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2018-02-21T16:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: ACS v5.6 and authorization problems with remote forest</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3335285#M556271</link>
      <description>&lt;P&gt;Lets check the debugs:&lt;/P&gt;
&lt;P&gt;Can you enable the &lt;STRONG&gt;debug-adclient enable &lt;/STRONG&gt;&amp;amp; duplicate the issue while having a external groups in the authz condition.&lt;/P&gt;
&lt;P&gt;For more info on how to enable debugs.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-6/command/reference/cli/cli_app_a.html#53984" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-6/command/reference/cli/cli_app_a.html#53984&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;then check &lt;STRONG&gt;show acs-logs filename ACSADAgent.log&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 16:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3335285#M556271</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2018-02-21T16:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: ACS v5.6 and authorization problems with remote forest</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3335739#M556279</link>
      <description>&lt;P&gt;Hi Jatin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for suggestion - it has proven most helpful!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are errors being logged for a particular AD login such as :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Feb 22 09:26:08 bv-acs5 adclient[18044]: DEBUG &amp;lt;fd:42 MS-RPC user authentication &amp;gt; base.adagent.domaininfo isForeignDomain: Domain abc.local not in map&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Feb 22 09:26:08 bv-acs5 adclient[18044]: DEBUG &amp;lt;fd:28 CAPIGetObjectBySID &amp;gt; base.aduser Domain doesn't trust us.&amp;nbsp; Fetching a foreign object S-1-5-21-1005532245-1684542211-154385&lt;/P&gt;
&lt;P&gt;9470-5758&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Feb 22 09:26:08 bv-acs5 adclient[18044]: DIAG&amp;nbsp; &amp;lt;fd:28 CAPIGetObjectBySID &amp;gt; base.adagent S-1-5-21-1005532245-1684542211-1543859470-9931 is from a one-way trust.&amp;nbsp; Creating fake o&lt;/P&gt;
&lt;P&gt;bject&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Feb 22 09:26:08 bv-acs5 adclient[18044]: DEBUG &amp;lt;fd:28 CAPIGetObjectBySID &amp;gt; base.aduser Creating foreign user object dn &amp;lt;GUID=71ad1fee32e9428fa1f1a428e33889cf&amp;gt;;&amp;lt;SID=010500000000&lt;/P&gt;
&lt;P&gt;0005150000005534ef3b031368640e6d055c56320000&amp;gt;;CN=71ad1fee32e9428fa1f1a428e33889cf,CN=Foreign User,CN=One Way Trust,DC=XYZ,DC=NET&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now....where to investigate these error codes and translate to microsoft lingo!&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 09:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-v5-6-and-authorization-problems-with-remote-forest/m-p/3335739#M556279</guid>
      <dc:creator>simong</dc:creator>
      <dc:date>2018-02-22T09:47:16Z</dc:date>
    </item>
  </channel>
</rss>

