<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD - FMC - AD -- Secure LDAP / LDAP Over SSL -- Discovered Identi in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-fmc-ad-secure-ldap-ldap-over-ssl-discovered-identity/m-p/5305168#M1121589</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1434723"&gt;@NA-School&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Do you have any solution to the other issue with the "&lt;SPAN&gt;Discovered Identity\username".&lt;BR /&gt;My setup uses just LDAP fpr Authorsation and SAML with Azure for Authentication.&amp;nbsp;&lt;BR /&gt;Both are working, but the mapping to the domain won't happen.&lt;BR /&gt;&lt;BR /&gt;Any idea what I could do to fix it?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 03 Jul 2025 09:44:30 GMT</pubDate>
    <dc:creator>t1m1</dc:creator>
    <dc:date>2025-07-03T09:44:30Z</dc:date>
    <item>
      <title>FTD - FMC - AD -- Secure LDAP / LDAP Over SSL -- Discovered Identity</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-ad-secure-ldap-ldap-over-ssl-discovered-identity/m-p/4963298#M1106060</link>
      <description>&lt;P&gt;Hello Community,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I'm a little bit out of my depth here in trying to troubleshoot a few issues around my configuration and wondering if anyone has some insight into this for me.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I'm currently trying to set up remote access for vpn, I would like to utilize SAML integration with Cisco Duo - this part works swimmingly, following the guide, the only change I had to make was for Duo to return the username in order for the authorization from AD_Integration to work.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I have the LDAP mapping working successfully, but one issue that I can't seem to conquer is that I am able to use LDAP over SSL directly from the FMC but not the FTD. I have confirmed that the same root ca certificate is installed on both, I confirmed that the FTD can resolve the host name of both domain controllers, when I switch to back to IP connect for the directory on the AD_Integration the FTD can perform the bind and the lookup, the group gets passed back and the appropriate LDAP map to cisco vpn group profile applies. My only thinking here is that because of the need of two CA's on the FTD, it is trying to use the Duo certificate when doing the LDAP over SSL - I am not sure how to associate the correct trustpoint here?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Another issue I am running into, is that with this configuration the identities are showing up as Discovered Identity\username, not MYDOMAIN\Username - when I switch to only the AD integration, the passive identity works and the MYDOMAIN\username shows up in FMC dashboard for user statistics.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I have turned the debug ldap 255, debug aaa common 255, and watched the authentication happen (this is how I discovered I needed cisco duo to pass the username back and not the email), this works. Cool, but why doesn't the FTD believe it's MYDOMAIN\Username when Duo saml is the authentication and AD is the authorization?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I would like to keep my ACLs tight and utilize the user identity so that I am as secure as possible. Is this possible while utilizing duo as authentication and ad as authorization?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;-------------------&lt;BR /&gt;Solution for my case:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Discovered via my own replies here - the EE Key was too small, which refers to the RSA key, which in my case was 2048 for the CA root, but the Domain Controller's identity certs were only 1048 - my temporary work around was to enable the weak crypto, via GUI Devices - Certificates - Click the device in question - Click the LOCK to send the command&lt;BR /&gt;or via CLI just add the line&amp;nbsp;&lt;BR /&gt;crypto ca permit-weak-crypto&lt;BR /&gt;&lt;BR /&gt;I gather that the FMC by default doesn't care about the weak key response.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 16:25:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-ad-secure-ldap-ldap-over-ssl-discovered-identity/m-p/4963298#M1106060</guid>
      <dc:creator>NA-School</dc:creator>
      <dc:date>2023-11-22T16:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - FMC - AD + DUO for Remote Access VPN assistance</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-ad-secure-ldap-ldap-over-ssl-discovered-identity/m-p/4964156#M1106121</link>
      <description>&lt;P&gt;Just wanted to update on some additional details -&lt;BR /&gt;&lt;BR /&gt;FMC vers 7.2.5&lt;BR /&gt;FTD vers 7.2.4 (Waiting for scheduled downtime)&lt;BR /&gt;----&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Server Group: AD_Integration&lt;BR /&gt;Server Protocol: ldap&lt;BR /&gt;Server Hostname: AD1.MyDomain.local&lt;BR /&gt;Server Address: 172.16.28.200&lt;BR /&gt;Server port: 636&lt;BR /&gt;Server status: FAILED, Server disabled at 02:41:08 UTC Thu Nov 16 2023&lt;BR /&gt;Number of pending requests 0&lt;BR /&gt;Average round trip time 0ms&lt;BR /&gt;Number of authentication requests 4&lt;BR /&gt;Number of authorization requests 4&lt;BR /&gt;Number of accounting requests 0&lt;BR /&gt;Number of retransmissions 0&lt;BR /&gt;Number of accepts 0&lt;BR /&gt;Number of rejects 0&lt;BR /&gt;Number of challenges 0&lt;BR /&gt;Number of bad authenticators 0&lt;BR /&gt;Number of timeouts 8&lt;BR /&gt;Number of unrecognized responses 0&lt;/P&gt;&lt;P&gt;Server Group: AD_Integration&lt;BR /&gt;Server Protocol: ldap&lt;BR /&gt;Server Address: 172.16.28.100&lt;BR /&gt;Server port: 389&lt;BR /&gt;Server status: FAILED, Server disabled at 02:59:51 UTC Sun Nov 19 2023&lt;BR /&gt;Number of pending requests 0&lt;BR /&gt;Average round trip time 0ms&lt;BR /&gt;Number of authentication requests 1&lt;BR /&gt;Number of authorization requests 14&lt;BR /&gt;Number of accounting requests 0&lt;BR /&gt;Number of retransmissions 0&lt;BR /&gt;Number of accepts 11&lt;BR /&gt;Number of rejects 0&lt;BR /&gt;Number of challenges 0&lt;BR /&gt;Number of bad authenticators 0&lt;BR /&gt;Number of timeouts 4&lt;BR /&gt;Number of unrecognized responses 0&lt;/P&gt;&lt;P&gt;Server Group: AD_Integration&lt;BR /&gt;Server Protocol: ldap&lt;BR /&gt;Server Address: 172.16.28.200&lt;BR /&gt;Server port: 389&lt;BR /&gt;Server status: ACTIVE, Last transaction at 22:37:03 UTC Mon Nov 20 2023&lt;BR /&gt;Number of pending requests 0&lt;BR /&gt;Average round trip time 0ms&lt;BR /&gt;Number of authentication requests 0&lt;BR /&gt;Number of authorization requests 8&lt;BR /&gt;Number of accounting requests 0&lt;BR /&gt;Number of retransmissions 0&lt;BR /&gt;Number of accepts 6&lt;BR /&gt;Number of rejects 2&lt;BR /&gt;Number of challenges 0&lt;BR /&gt;Number of bad authenticators 0&lt;BR /&gt;Number of timeouts 0&lt;BR /&gt;Number of unrecognized responses 0&lt;/P&gt;&lt;P&gt;Server Group: AD_Integration&lt;BR /&gt;Server Protocol: ldap&lt;BR /&gt;Server Hostname: AD2.MyDomain.local&lt;BR /&gt;Server Address: 172.16.28.100&lt;BR /&gt;Server port: 636&lt;BR /&gt;Server status: ACTIVE, Last transaction at 02:44:16 UTC Sat Nov 18 2023&lt;BR /&gt;Number of pending requests 0&lt;BR /&gt;Average round trip time 0ms&lt;BR /&gt;Number of authentication requests 2&lt;BR /&gt;Number of authorization requests 0&lt;BR /&gt;Number of accounting requests 0&lt;BR /&gt;Number of retransmissions 0&lt;BR /&gt;Number of accepts 0&lt;BR /&gt;Number of rejects 0&lt;BR /&gt;Number of challenges 0&lt;BR /&gt;Number of bad authenticators 0&lt;BR /&gt;Number of timeouts 2&lt;BR /&gt;Number of unrecognized responses 0&lt;/P&gt;&lt;P&gt;--------------------------------------------------&lt;BR /&gt;show running-config aaa-server&lt;BR /&gt;aaa-server AD_Integration protocol ldap&lt;BR /&gt;max-failed-attempts 4&lt;BR /&gt;realm-id 2&lt;BR /&gt;aaa-server AD_Integration host AD2.MYDOMAIN.local&lt;BR /&gt;server-port 636&lt;BR /&gt;ldap-base-dn DC=MYDOMAIN,DC=local&lt;BR /&gt;ldap-group-base-dn DC=MYDOMAIN,DC=local&lt;BR /&gt;ldap-scope subtree&lt;BR /&gt;ldap-naming-attribute sAMAccountName&lt;BR /&gt;ldap-login-password *****&lt;BR /&gt;ldap-login-dn firepower@MYDOMAIN.local&lt;BR /&gt;ldap-over-ssl enable&lt;BR /&gt;server-type microsoft&lt;BR /&gt;ldap-attribute-map AD_Integration&lt;BR /&gt;aaa-server AD_Integration host 172.16.28.100&lt;BR /&gt;server-port 389&lt;BR /&gt;ldap-base-dn DC=MYDOMAIN,DC=local&lt;BR /&gt;ldap-group-base-dn DC=MYDOMAIN,DC=local&lt;BR /&gt;ldap-scope subtree&lt;BR /&gt;ldap-naming-attribute sAMAccountName&lt;BR /&gt;ldap-login-password *****&lt;BR /&gt;ldap-login-dn firepower@MYDOMAIN.local&lt;BR /&gt;server-type microsoft&lt;BR /&gt;ldap-attribute-map AD_Integration&lt;BR /&gt;aaa-server AD_Integration host 172.16.28.200&lt;BR /&gt;server-port 389&lt;BR /&gt;ldap-base-dn DC=MYDOMAIN,DC=local&lt;BR /&gt;ldap-group-base-dn DC=MYDOMAIN,DC=local&lt;BR /&gt;ldap-scope subtree&lt;BR /&gt;ldap-naming-attribute sAMAccountName&lt;BR /&gt;ldap-login-password *****&lt;BR /&gt;ldap-login-dn firepower@MYDOMAIN.local&lt;BR /&gt;server-type microsoft&lt;BR /&gt;ldap-attribute-map AD_Integration&lt;BR /&gt;aaa-server AD_Integration (diagnostic) host AD1.MYDOMAIN.local&lt;BR /&gt;server-port 636&lt;BR /&gt;ldap-base-dn DC=MYDOMAIN,DC=local&lt;BR /&gt;ldap-group-base-dn DC=MYDOMAIN,DC=local&lt;BR /&gt;ldap-scope subtree&lt;BR /&gt;ldap-naming-attribute sAMAccountName&lt;BR /&gt;ldap-login-password *****&lt;BR /&gt;ldap-login-dn firepower@MYDOMAIN.local&lt;BR /&gt;ldap-over-ssl enable&lt;BR /&gt;server-type microsoft&lt;BR /&gt;ldap-attribute-map AD_Integration&lt;BR /&gt;----------------------------------------------&lt;BR /&gt;&lt;BR /&gt;On domain controller - ran in an elevated powershell -&amp;nbsp;&lt;BR /&gt;netsh trace start capture=yes IPv4.Address=x.x.x.x tracefile=c:\temp\FTD-TO-AD1.etl&amp;nbsp;&lt;BR /&gt;where x.x.x.x is my management interface IP of the FTD,&amp;nbsp; I then ran&lt;BR /&gt;test aaa-server Authentication AD_Integration host AD1.mydomain.local username tactest password ThePassword&lt;BR /&gt;test aaa-server Authentication AD_Integration host 172.16.28.100 username tactest password ThePassword&lt;BR /&gt;&lt;BR /&gt;back to powershell, netsh trace stop&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I converted the etl to pcap using&amp;nbsp;&lt;A href="https://github.com/microsoft/etl2pcapng/" target="_blank"&gt;https://github.com/microsoft/etl2pcapng/&lt;/A&gt;&amp;nbsp;from the official Microsoft Github repo - ( I see now for my purposes I could have just used netsh convert input=C:/temp/FTD-TO-AD1.etl output=C:/temp/FTD-TO-AD1.txt but that's ok)&lt;BR /&gt;&lt;BR /&gt;I did the same thing for AD2, and from the FMC I utilized Integrations - Others - Realm - Edit - Directory Settings - Edit each LDAP server and tested the appropriate one for each trace.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Great, actionable data.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Wrong, this just made me more confused. The same root-ca cert is installed the same way and validation usage on both the FMC and the FTD, yet,&lt;BR /&gt;&lt;BR /&gt;My packet capture results summarized:&lt;BR /&gt;FMC to AD1,AD2 are the same&lt;BR /&gt;For the LDAP over SSL test:&lt;BR /&gt;TCP ACK (FMC-&amp;gt;AD), TCP SYN (AD-&amp;gt;FMC), TLSv1.2 Client Hello (FMC-&amp;gt;AD) two more TCP acks, then TLSv1.2 exchange, bobs your uncle great. LDAP bind performs, no plain text credentials flying around.&amp;nbsp;&lt;BR /&gt;For the no encryption test:&lt;BR /&gt;Traffic flying TCP/LDAP protocols, all packets fully readable.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;FTD to AD1,AD2:&lt;BR /&gt;TCP SYN (FTD-&amp;gt;AD), TCP ACK (FTD-&amp;gt;AD not sure why it sends syn and ack to the same spot), SSL 211 Continuation Data with "objectclass0hsupportedLDAPVersionsupportedSASLMechanismsdefaultNamingContextsupportedLDAPPolicies&lt;BR /&gt;vendorName" sitting in the packet.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The unencrypted works exactly the same as the FMC, succesfully bind/authentication etc.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Scratching my head I decided to do a packet capture from FMC GUI - Via Devices - Packet Capture - Select my FTD - run on the inside interface, I tried the diagnostic interface and saw no traffic, protocol TCP, source host my FTD management IP, destination host, AD1 did the same thing and now I can see when it tries to LDAP over SSL that TCP ack, TCP syn, and the SSL continue goes from FTD -&amp;gt; FMC, the ad slaps back a tcp flag 0x014 and resets the connection.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I'm thinking I must have messed up my certificate for the root ca import, but I've done it a thousand different ways. Signing it from the CA, not signing it, importing a fully cooked up pk12 using openssl with subject alternative names, I'm definitely missing something easy here and it's driving me bonkers.&lt;BR /&gt;&lt;BR /&gt;Going to try to remove all of the certificates and leave only the root ca and see how the LDAP over ssl bind goes.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 22:34:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-ad-secure-ldap-ldap-over-ssl-discovered-identity/m-p/4964156#M1106121</guid>
      <dc:creator>NA-School</dc:creator>
      <dc:date>2023-11-21T22:34:44Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - FMC - AD + DUO for Remote Access VPN assistance</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-ad-secure-ldap-ldap-over-ssl-discovered-identity/m-p/4964522#M1106142</link>
      <description>&lt;P&gt;Doing some more investigation;&amp;nbsp;&lt;BR /&gt;FMC - Device - Platform Settings - Syslog - Logging Destinations&lt;BR /&gt;&lt;BR /&gt;Added Console with an event list,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;In the event list tab, created new event list,&amp;nbsp; added CA debugging, and SSL debugging.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Ran a test-aaa server again, below is the relevant output - EE Key too small. The key is rsa 2048, so this is confusing.. going to actually remove all the certificates now and start fresh -&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;[-2147483575] Creating LDAP context with uri=ldaps://172.16.28.100:636 Nov 22 2023 14:40:58 FTD : %FTD-7-725013: SSL server Inside:172.16.254.254/25301 to 172.16.28.100/636 chooses cipher ECDHE-RSA-AES256-GCM-SHA384 Nov 22 2023 14:40:58 FTD : %FTD-6-725005: SSL server Inside:172.16.254.254/25301 to 172.16.28.100/636 requesting our device certificate for authentication Nov 22 2023 14:40:58 FTD : %FTD-7-717025: Validating certificate chain containing 1 certificate(s). Nov 22 2023 14:40:58 FTD : %FTD-7-717029: Identified client certificate within certificate chain. serial number: 48000000035874656DE2EED1D1000000000003, subject name: CN=AD1.mydomain.local. Nov 22 2023 14:40:58 FTD : %FTD-3-717009: Certificate validation failed. EE key is too small, serial number: 48000000035874656DE2EED1D1000000000003, subject name: CN=AD1.mydomain.local. Nov 22 2023 14:40:58 FTD : %FTD-3-717027: Certificate chain failed validation. Generic validation failure occurred. Nov 22&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 15:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-ad-secure-ldap-ldap-over-ssl-discovered-identity/m-p/4964522#M1106142</guid>
      <dc:creator>NA-School</dc:creator>
      <dc:date>2023-11-22T15:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - FMC - AD + DUO for Remote Access VPN assistance</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-ad-secure-ldap-ldap-over-ssl-discovered-identity/m-p/4964569#M1106149</link>
      <description>&lt;P&gt;Needed to add to running-config on ftd&lt;BR /&gt;crypto ca permit-weak-crypto&lt;/P&gt;&lt;P&gt;the DCs were replying with only 1048 rsa key size, d'oh.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 16:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-ad-secure-ldap-ldap-over-ssl-discovered-identity/m-p/4964569#M1106149</guid>
      <dc:creator>NA-School</dc:creator>
      <dc:date>2023-11-22T16:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - FMC - AD -- Secure LDAP / LDAP Over SSL -- Discovered Identi</title>
      <link>https://community.cisco.com/t5/network-security/ftd-fmc-ad-secure-ldap-ldap-over-ssl-discovered-identity/m-p/5305168#M1121589</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1434723"&gt;@NA-School&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Do you have any solution to the other issue with the "&lt;SPAN&gt;Discovered Identity\username".&lt;BR /&gt;My setup uses just LDAP fpr Authorsation and SAML with Azure for Authentication.&amp;nbsp;&lt;BR /&gt;Both are working, but the mapping to the domain won't happen.&lt;BR /&gt;&lt;BR /&gt;Any idea what I could do to fix it?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2025 09:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-fmc-ad-secure-ldap-ldap-over-ssl-discovered-identity/m-p/5305168#M1121589</guid>
      <dc:creator>t1m1</dc:creator>
      <dc:date>2025-07-03T09:44:30Z</dc:date>
    </item>
  </channel>
</rss>

