<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACS with Active Directory Authentication based on AD Groups in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-with-active-directory-authentication-based-on-ad-groups/m-p/2422638#M87645</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your response. I am not at liberty to disclose sensitive information however I will use a pseudo form to illustrate what you are asking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under Default Device Admin &amp;gt; Authorization&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Status = Green&lt;/P&gt;&lt;P&gt;Name = Rule1&lt;/P&gt;&lt;P&gt;Compound Condition = AD-AD1:ExternalGroups contains any example.com/Groups/GroupName&lt;/P&gt;&lt;P&gt;Shell Profile = Example1&lt;/P&gt;&lt;P&gt;Command Sets = Example1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the general set up that I have with names replaced for confidentiality. Let me know if you need further information and I will see what I can provide without breaching confidentiality. Thank you. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now Kashif your answer is the equivalent to "I don't know the answer to your question, but to sound smart I will tell you where to look for it." That doesn't help me at all since I have referenced that and several Youtube videos. I know where to look I just don't know based on the information provided what I am doing wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;UPDATE: I have figured out the problem. It seems the administrator who initially stood this up set up a default parameter to "permit" access even if the rules don't apply. I flipped the switch to deny and viola. So to those who are encountering this issue please look at the very bottom of the list for "Default" and modify those settings.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Feb 2014 14:34:06 GMT</pubDate>
    <dc:creator>BrunoVic</dc:creator>
    <dc:date>2014-02-28T14:34:06Z</dc:date>
    <item>
      <title>ACS with Active Directory Authentication based on AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-with-active-directory-authentication-based-on-ad-groups/m-p/2422635#M87641</link>
      <description>&lt;P&gt;Good Morning&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to integrate Cisco ACS 5.4.0.46 with AD and I have successfully linked the ACS to AD and I have successfully used AD as an authentication for network devices however my problem now is that anyone with an AD account can log into the network devices which compromises the security. I have created a group in AD that I would like to use and I have added the group under Users and Identity Stores &amp;gt; External Identity Stores &amp;gt; Active Directory &amp;gt; Directory Groups. I've also selected Identity source for Default Device Admin as AD1 and under Authorization I have an Authorization Policy that uses a compound condition that uses AD1 and the custom group. However after setting all that I am still able to log onto the switch with a user not in the custom group. Based on what I've explained can anyone tell me if I am missing a step?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Derek Velez&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-with-active-directory-authentication-based-on-ad-groups/m-p/2422635#M87641</guid>
      <dc:creator>BrunoVic</dc:creator>
      <dc:date>2019-03-11T04:28:24Z</dc:date>
    </item>
    <item>
      <title>ACS with Active Directory Authentication based on AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-with-active-directory-authentication-based-on-ad-groups/m-p/2422636#M87643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Derek,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please provide the scree shot of the compound condition you have created under Default Device Admin &amp;gt; authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you check the passed authentication attempt to verify what rule the user got assigned?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Feb 2014 06:27:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-with-active-directory-authentication-based-on-ad-groups/m-p/2422636#M87643</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2014-02-28T06:27:31Z</dc:date>
    </item>
    <item>
      <title>ACS with Active Directory Authentication based on AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-with-active-directory-authentication-based-on-ad-groups/m-p/2422637#M87644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;kindly check the following link for reference&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-4/user/guide/acsuserguide/policy_mod.html"&gt;http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-4/user/guide/acsuserguide/policy_mod.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Feb 2014 09:48:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-with-active-directory-authentication-based-on-ad-groups/m-p/2422637#M87644</guid>
      <dc:creator>kaaftab</dc:creator>
      <dc:date>2014-02-28T09:48:59Z</dc:date>
    </item>
    <item>
      <title>Re: ACS with Active Directory Authentication based on AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-with-active-directory-authentication-based-on-ad-groups/m-p/2422638#M87645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your response. I am not at liberty to disclose sensitive information however I will use a pseudo form to illustrate what you are asking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under Default Device Admin &amp;gt; Authorization&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Status = Green&lt;/P&gt;&lt;P&gt;Name = Rule1&lt;/P&gt;&lt;P&gt;Compound Condition = AD-AD1:ExternalGroups contains any example.com/Groups/GroupName&lt;/P&gt;&lt;P&gt;Shell Profile = Example1&lt;/P&gt;&lt;P&gt;Command Sets = Example1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the general set up that I have with names replaced for confidentiality. Let me know if you need further information and I will see what I can provide without breaching confidentiality. Thank you. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now Kashif your answer is the equivalent to "I don't know the answer to your question, but to sound smart I will tell you where to look for it." That doesn't help me at all since I have referenced that and several Youtube videos. I know where to look I just don't know based on the information provided what I am doing wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;UPDATE: I have figured out the problem. It seems the administrator who initially stood this up set up a default parameter to "permit" access even if the rules don't apply. I flipped the switch to deny and viola. So to those who are encountering this issue please look at the very bottom of the list for "Default" and modify those settings.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Feb 2014 14:34:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-with-active-directory-authentication-based-on-ad-groups/m-p/2422638#M87645</guid>
      <dc:creator>BrunoVic</dc:creator>
      <dc:date>2014-02-28T14:34:06Z</dc:date>
    </item>
    <item>
      <title>Re: ACS with Active Directory Authentication based on AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-with-active-directory-authentication-based-on-ad-groups/m-p/2422639#M87646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for updating and closing the thread. The &lt;STRONG&gt;Default rule by-default set for deny access&lt;/STRONG&gt; so that if the legimitate user doesn't match any rule defined by the ACS administration he should get deny access. In your case it was set to Permit so both type of users getting access (member and non-member of AD groups).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The best way to troubleshoot this kind of issues is to look at Monitoring and Troubleshooting &amp;gt; User attempt &amp;gt; Magnifying glass. There you will see how this user got permit access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Feb 2014 15:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-with-active-directory-authentication-based-on-ad-groups/m-p/2422639#M87646</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2014-02-28T15:51:53Z</dc:date>
    </item>
  </channel>
</rss>

