<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi; in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823582#M56247</link>
    <description>&lt;P&gt;Hi;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Attached more information.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your support.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Feb 2016 13:43:45 GMT</pubDate>
    <dc:creator>fuhrersk8</dc:creator>
    <dc:date>2016-02-16T13:43:45Z</dc:date>
    <item>
      <title>ACS 5.8.0.32 not matching Active Directory Authorization Rules for TACACS after upgrade from 5.6</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823573#M56238</link>
      <description>&lt;P&gt;Hi Guys;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; We had a primary/secondary ACS 5.6 deployment working beautifully with all of our switches authenticating (TACACS) with our Active Directory accounts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We decided to upgrade to version 5.8.0.32. Both virtual machines upgraded successfully (at least that was the message form each vm after upgarded).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;But, after the upgrade, bot ACS were disconnected form the AD. We rejoined both of them successfully, but now, after the upgrade, all of the authorization rules referencing AD (active directory accounts) are being ignored and it goes directly to the default deny rule.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The local accounts existing on the ACS authenticate successfully. It is the Rules referencing AD accounts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;All diagnostic tests pass successfully., ecen in the ACS logs, the users from AD gets authenticated, but in the authorization rules &amp;nbsp;the ACS ignores the existing AD rules and uses the Default deny Rule.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advanced Guys!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823573#M56238</guid>
      <dc:creator>fuhrersk8</dc:creator>
      <dc:date>2019-03-11T06:28:55Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823574#M56239</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Can you please confirm whether Binary certificate comparison is enabled in Certificate Authentication Profile object?&lt;/P&gt;
&lt;P&gt;I mean the whether following check box is enabled?&lt;/P&gt;
&lt;P&gt;"Perform Binary Certificate Comparison with Certificate retrieved from LDAP or Active Directory"&lt;/P&gt;
&lt;P&gt;This configuration is available in GUI "Users and Identity Stores &amp;gt; &lt;SPAN class="Apple-tab-span"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;Certificate Authentication Profile"&lt;/P&gt;
&lt;P&gt;If yes, can you please disable and try.&lt;/P&gt;
&lt;P&gt;If not, Can you please share the list of steps shown in the report in failed case.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Radhakrishna&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2016 10:08:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823574#M56239</guid>
      <dc:creator>radmedur</dc:creator>
      <dc:date>2016-02-12T10:08:29Z</dc:date>
    </item>
    <item>
      <title>Hi and thanks for your reply;</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823575#M56240</link>
      <description>&lt;P&gt;Hi and thanks for your reply;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;It was disabled. I proceeded to enabled it, but same result. The rules related to AD1 authentication are ignored and authorization is denied by ACS.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Below the steps of a failed authentication attempt of my AD Account on a Cisco switch:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;StepData=19=c191341 : StepData=20=na.am.lilly.com : StepData=21=corp.lilly.com : StepData=23=C191341@na.am.lilly.com : StepData=26=C191341@na.am.lilly.com : IdentityAccessRestricted=false&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks again.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2016 14:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823575#M56240</guid>
      <dc:creator>fuhrersk8</dc:creator>
      <dc:date>2016-02-12T14:16:39Z</dc:date>
    </item>
    <item>
      <title>Hello;</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823576#M56241</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Not even the ACS admin authorization rule is working. It was working on previous version 5.6.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That is, we were able to access the ACS as SuperAdmin with our AD accounts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks again.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2016 14:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823576#M56241</guid>
      <dc:creator>fuhrersk8</dc:creator>
      <dc:date>2016-02-12T14:51:18Z</dc:date>
    </item>
    <item>
      <title>Did you access ACS 5.8 via</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823577#M56242</link>
      <description>&lt;P&gt;Did you access ACS 5.8 via Chrome as a browser? The Reason I am asking because no version of ACS supports Chrome browser - &lt;A href="http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-8/release/notes/acs_58_rn.html#pgfId-434586"&gt;ACS browser Support &lt;/A&gt;and we have a very &lt;A href="https://tools.cisco.com/bugsearch/bug/CSCuo93378/?reffering_site=dumpcr"&gt;severe defect&lt;/A&gt; on this where it corrupts all the authz rules and no matter how authorization works for an user, it always take you to default policy that is set to deny in majority of the cases. In order to fix the issue do this:&lt;/P&gt;
&lt;PRE class="prettyprint" style="font-family: monospace; font-size: 12px; white-space: -o-pre-wrap; word-wrap: break-word;"&gt;Use supported browser and check whether all policies and its rules and conditions are displayed correctly and resubmit all of them. Restart ACS services to get the latest changes into effect.&lt;/PRE&gt;
&lt;P&gt;~ Jatin&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2016 18:54:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823577#M56242</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2016-02-12T18:54:25Z</dc:date>
    </item>
    <item>
      <title>Hello and thanks for the</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823578#M56243</link>
      <description>&lt;P&gt;Hello and thanks for the information.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am using Mozilla Firefox&amp;nbsp;43.0.4.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What does resubmiting the policies refers to?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks again.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2016 19:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823578#M56243</guid>
      <dc:creator>fuhrersk8</dc:creator>
      <dc:date>2016-02-12T19:00:57Z</dc:date>
    </item>
    <item>
      <title>so basically it messed up all</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823579#M56244</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;so basically it messed up all the operators that we use to create conditions with external AD groups. I would like you to review all the authz rules and ensure the and/or operators are still intact. Once done - save changes again. Restart the ACS services from the ACS CLI and test again.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;~ Jatin&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2016 19:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823579#M56244</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2016-02-12T19:07:39Z</dc:date>
    </item>
    <item>
      <title>Hi;</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823580#M56245</link>
      <description>&lt;P&gt;Hi;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Basically, I deleted and recreated the AD rules, but still no authorization is being allowed but the default deny rule.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Even the Authorization rule for administering the ACS is being bypassed into the default rule.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks again.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2016 19:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823580#M56245</guid>
      <dc:creator>fuhrersk8</dc:creator>
      <dc:date>2016-02-12T19:11:16Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823581#M56246</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We need more details on the issue. For example as i mentioned "Steps" in the Authentication/Authorization reports. The step details you have shared are not useful here.&lt;/P&gt;
&lt;P&gt;For specific authorization failure, please click on "Details" icon which will open new window. In the new page, please go to end and there are steps mentioned. please take the screenshot and attach here.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Radhakrishna&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 07:58:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823581#M56246</guid>
      <dc:creator>radmedur</dc:creator>
      <dc:date>2016-02-15T07:58:08Z</dc:date>
    </item>
    <item>
      <title>Hi;</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823582#M56247</link>
      <description>&lt;P&gt;Hi;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Attached more information.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your support.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 13:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823582#M56247</guid>
      <dc:creator>fuhrersk8</dc:creator>
      <dc:date>2016-02-16T13:43:45Z</dc:date>
    </item>
    <item>
      <title>Hi fuhresk8,</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823583#M56248</link>
      <description>&lt;P&gt;Hi fuhresk8,&lt;/P&gt;
&lt;P&gt;Could you please configure "AD1:memberOf"&amp;nbsp; instead of "AD1:ExternalGroups"&amp;nbsp; to check whether the authorization is working fine.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We suspect that this is the permission issue to fetch the "TokenGroups" attribute.&lt;/P&gt;
&lt;P&gt;Please let us know the results after configuring "AD1:memberOf" attribute.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Priya.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2016 06:39:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823583#M56248</guid>
      <dc:creator>Priya Gurumoorthy</dc:creator>
      <dc:date>2016-02-17T06:39:38Z</dc:date>
    </item>
    <item>
      <title>Hi Priya and thanks for your</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823584#M56250</link>
      <description>&lt;P&gt;Hi Priya and thanks for your support;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; Did as you mentioned, but same result.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks again.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2016 18:48:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823584#M56250</guid>
      <dc:creator>fuhrersk8</dc:creator>
      <dc:date>2016-02-17T18:48:37Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823585#M56256</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I've the same problem. On 5.7 there was no problem, see screendump. You see the external groups&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/acs_57.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;On the 5.8, same config &amp;amp; access policies, there is no AD group matching.&lt;BR /&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/acs_58.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;As you see, there are (the same) directory groups, with Group SID. I've checked the SIDs and are correct.&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/acs_directory_groups_0.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Anybody a hint?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2016 08:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823585#M56256</guid>
      <dc:creator>H-J B</dc:creator>
      <dc:date>2016-04-21T08:15:17Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823586#M56258</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Can any one of you please raise SR, so that DE team can analyze logs and confirm the issue.&lt;/P&gt;
&lt;P&gt;OR&lt;/P&gt;
&lt;P&gt;please attach the support bundle here.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Radhakrishna&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2016 09:17:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823586#M56258</guid>
      <dc:creator>radmedur</dc:creator>
      <dc:date>2016-04-21T09:17:54Z</dc:date>
    </item>
    <item>
      <title>Hi;</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823587#M56259</link>
      <description>&lt;P&gt;Hi;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; Below solution as explained by Cisco TAC:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;"As you can see the Ability to read tokenGroups attributes was added. From the logs&amp;nbsp;we can see the following error:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white; margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #222222; font-family: 'Courier New'; font-size: 10pt;"&gt;Error code: 60173 (symbol: LW_ERROR_TOKEN_GROUPS_INSUFFICIENT_PERMISSIONS)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;Therefore we need to request the Active Directory administrator to update the permissions for the ACS computer account in Active Directory. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;The command to update the permissions is “dsacls [distinguished name of domain] /I:T /G "User or Group":rp;tokenGroups” "" &lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;Attached are the meaning of the AD commands.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;Hope this helps.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;Regards, &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2016 13:24:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823587#M56259</guid>
      <dc:creator>fuhrersk8</dc:creator>
      <dc:date>2016-04-21T13:24:07Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823588#M56260</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We have set the permissions on the AD but no changes. But thx for the response&lt;BR /&gt;Our smartnet is not active jet, so I can't create a SR at this moment.&lt;/P&gt;
&lt;P&gt;I've reinstall the 5.7 and wait for the smartnet &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 13:13:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823588#M56260</guid>
      <dc:creator>H-J B</dc:creator>
      <dc:date>2016-04-22T13:13:51Z</dc:date>
    </item>
    <item>
      <title>Hi;</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823589#M56261</link>
      <description>&lt;P&gt;Hi;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; In my case, the AD administrator actually didn't execute the command as stated by Cisco TAC; what they did instead was to add the ACS object in an AD Object group&amp;nbsp;&amp;nbsp;with &lt;SPAN style="font-family: 'Calibri','sans-serif'; font-size: 11pt;"&gt;&lt;EM&gt;Pre-Windows 2000 type of access and then the ACS was able to read the tokenGroupos as required.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Calibri','sans-serif'; font-size: 11pt;"&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'Calibri','sans-serif'; font-size: 11pt;"&gt;&lt;EM&gt;Regards, &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 14:17:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823589#M56261</guid>
      <dc:creator>fuhrersk8</dc:creator>
      <dc:date>2016-04-22T14:17:43Z</dc:date>
    </item>
    <item>
      <title>SR638838907</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823590#M56262</link>
      <description>&lt;P&gt;SR638838907&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 18:36:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823590#M56262</guid>
      <dc:creator>H-J B</dc:creator>
      <dc:date>2016-04-22T18:36:10Z</dc:date>
    </item>
    <item>
      <title>Thanks we will work on this.</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823591#M56263</link>
      <description>Thanks we will work on this.</description>
      <pubDate>Sat, 23 Apr 2016 16:20:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823591#M56263</guid>
      <dc:creator>radmedur</dc:creator>
      <dc:date>2016-04-23T16:20:36Z</dc:date>
    </item>
    <item>
      <title>Hi all,</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823592#M56264</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;thx for the response.&lt;/P&gt;
&lt;P&gt;It is&amp;nbsp;a bug.&amp;nbsp;CSCuy12884&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2016 08:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-8-0-32-not-matching-active-directory-authorization-rules/m-p/2823592#M56264</guid>
      <dc:creator>H-J B</dc:creator>
      <dc:date>2016-04-26T08:47:42Z</dc:date>
    </item>
  </channel>
</rss>

