<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic Access Policy (DAP) - memberof in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-access-policy-dap-memberof/m-p/5345017#M1123408</link>
    <description>&lt;P&gt;Why not use SAML instead for all of this?&lt;/P&gt;</description>
    <pubDate>Thu, 06 Nov 2025 13:52:05 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2025-11-06T13:52:05Z</dc:date>
    <item>
      <title>Dynamic Access Policy (DAP) - memberof</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-policy-dap-memberof/m-p/5344993#M1123407</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;I have Active Directory successfully integrated with FMC.&lt;BR /&gt;My goal is to apply a Dynamic Access Policy (DAP) to my FTD, where the DAP should match a specific Active Directory group and apply a corresponding access policy (for example, ACLs or restrictions).&lt;/P&gt;&lt;P&gt;For example:&lt;BR /&gt;If a user belongs to the AD group “DEPARTMENT LOGISTICS”, the DAP should trigger and apply a specific access-list or banner.&lt;/P&gt;&lt;P&gt;In Active Directory, the username is correctly listed under that group, and the group is visible and synchronized in the FMC realm.&lt;BR /&gt;However, the DAP condition using the LDAP attribute memberOf does not seem to match when the user connects through VPN — the session always falls back to the &lt;EM&gt;Default DAP&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;Has anyone experienced this issue or found a reliable way to make the memberOf (or nested group) condition work correctly in FMC?&lt;BR /&gt;Any guidance on how to make this criterion match or how to debug the LDAP attributes during authentication would be greatly appreciated.&lt;/P&gt;&lt;P&gt;I tried following LDAP Criteria:&amp;nbsp;&lt;SPAN&gt;memberOf, member and also&amp;nbsp;memberOf:1.2.840.113556.1.4.1941&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Albert&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 12:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-policy-dap-memberof/m-p/5344993#M1123407</guid>
      <dc:creator>Albertt</dc:creator>
      <dc:date>2025-11-06T12:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Access Policy (DAP) - memberof</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-policy-dap-memberof/m-p/5345017#M1123408</link>
      <description>&lt;P&gt;Why not use SAML instead for all of this?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 13:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-policy-dap-memberof/m-p/5345017#M1123408</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-11-06T13:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Access Policy (DAP) - memberof</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-policy-dap-memberof/m-p/5345296#M1123417</link>
      <description>&lt;P&gt;Can you share more details?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2025 12:01:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-policy-dap-memberof/m-p/5345296#M1123417</guid>
      <dc:creator>Albertt</dc:creator>
      <dc:date>2025-11-07T12:01:02Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Access Policy (DAP) - memberof</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-policy-dap-memberof/m-p/5345321#M1123418</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;I have successfully integrated Active Directory with FMC. My goal is to implement a Dynamic Access Policy (DAP) on my FTD, where the DAP should match a specific Active Directory group and apply a corresponding access policy, such as ACLs or restrictions.&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If a user belongs to the AD group “DEPARTMENT LOGISTICS”, the DAP should trigger and apply a specific access-list or banner.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;In Active Directory, the username is correctly listed under that group, and the group itself is visible and synchronized in the FMC realm. However, when a user connects through VPN, the DAP condition using the LDAP attribute memberOf does not match. The session always falls back to the Default DAP.&lt;/P&gt;&lt;P&gt;I have tried multiple LDAP criteria, including:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;memberOf&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;member&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;memberOf:1.2.840.113556.1.4.1941 (for nested groups)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Despite this, the policy does not trigger as expected.&lt;/P&gt;&lt;P&gt;Has anyone encountered this issue or found a reliable way to make memberOf (or nested group) conditions work correctly in FMC? Any guidance on how to make this criterion match, or tips on debugging LDAP attributes during authentication, would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;BR /&gt;Albert&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2025 13:30:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-policy-dap-memberof/m-p/5345321#M1123418</guid>
      <dc:creator>jameswood32</dc:creator>
      <dc:date>2025-11-07T13:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Access Policy (DAP) - memberof</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-policy-dap-memberof/m-p/5345616#M1123434</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1534957"&gt;@Albertt&lt;/a&gt;&amp;nbsp;If you enable DAP debugs "debug dap trace 127" from system support diagnostic-cli on the FTD CLI, login as the user and look for the LDAP memberOf attribute in the output and confirm the group.&lt;/P&gt;
&lt;PRE&gt;DAP_TRACE: aaa["ldap"]["memberOf"] = "Group-1"&lt;/PRE&gt;
&lt;P&gt;Is the memberOf value in the debug the same as that has been configured in the DAP policy?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RobIngram_0-1762682485183.png" style="width: 568px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/254935i74962A6BCFC28B22/image-dimensions/568x308?v=v2" width="568" height="308" role="button" title="RobIngram_0-1762682485183.png" alt="RobIngram_0-1762682485183.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Which should be the same in the configured realm&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RobIngram_1-1762682539245.png" style="width: 571px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/254936i0B8ECB89419A206C/image-dimensions/571x331?v=v2" width="571" height="331" role="button" title="RobIngram_1-1762682539245.png" alt="RobIngram_1-1762682539245.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Nov 2025 10:04:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-policy-dap-memberof/m-p/5345616#M1123434</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-11-09T10:04:14Z</dc:date>
    </item>
  </channel>
</rss>

