<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC with CAC Authentication and Authorization in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/5545566#M1124952</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1331617"&gt;@elcid98-1a6&lt;/a&gt;,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/152665"&gt;@Eric R. Jones&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/779695"&gt;@Shrimpy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;We're working with TAC on a similar solution. Was this able to be implemented with both the FMC and ISE configured in FIPs mode?&lt;/P&gt;</description>
    <pubDate>Wed, 15 Apr 2026 15:45:46 GMT</pubDate>
    <dc:creator>cepetrosso</dc:creator>
    <dc:date>2026-04-15T15:45:46Z</dc:date>
    <item>
      <title>FMC with CAC Authentication and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553092#M1087466</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to set up FMC to allow users to login with their CAC certificate. I have the same ssl cert for FMC signed by the root CA that signed the client certs. LDAP is configured and using userPrincipleName with the &lt;A href="mailto:%s@mil" target="_blank"&gt;%s@mil&lt;/A&gt; name template. I've follwed the guide to the letter, however when i go to the web gui, it ask for my client cert, then takes me to the login page, i click login which uses my cac cert and it keeps failing. I'm able to use username and password but not dice with using the cac cert. Of course the audit loggin just says invalid user. Is there a way to dig deeper or anything one else have any luck with this??&lt;BR /&gt;&lt;BR /&gt;Guide: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/user_accounts_fmc.html#task_klz_y3p_qcb" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/user_accounts_fmc.html#task_klz_y3p_qcb&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 20:36:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553092#M1087466</guid>
      <dc:creator>Shrimpy</dc:creator>
      <dc:date>2022-02-15T20:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with CAC Authentication and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553105#M1087467</link>
      <description>&lt;P&gt;Hello Shrimpy, you are going to be in for a frustrating ride.&lt;/P&gt;&lt;P&gt;We have ours working but there are many steps we had to go through to get it to work.&lt;/P&gt;&lt;P&gt;1. Are you using tokens along with the CAC/PIV? (e.g. rjones.ctr.na or rjones.civ.sa)&lt;/P&gt;&lt;P&gt;if you do then you will need to create a short regex that searches for the last to positions see attached.&lt;/P&gt;&lt;P&gt;2. Are your using ISE for AAA and RBAC for groups? (e.g. see the attached screen shot)&lt;/P&gt;&lt;P&gt;3. Having CAC/PIV/Token access is great however I have a TAC case open with Cisco because of the somewhat uselessness of how it's configured. If you login today at 0800 and tomorrow at 0810 your account will revert back to whatever your default role is. If like me you set it to a least privilege account then you will log in with read only permissions. You then have to login with username password, raise your privilege level and then login with your CAC or token. There is a way to setup privilege escalation but I haven't gotten that to work as I think it should.&lt;/P&gt;&lt;P&gt;If you find that this is an issue for you, the inability to login with full permissions, please open a TAC case yourself with this observation. Maybe if more people ask about it there will be more attention paid to it.&lt;/P&gt;&lt;P&gt;ej&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 21:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553105#M1087467</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2022-02-15T21:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with CAC Authentication and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553107#M1087468</link>
      <description>I forgot one more item. If you select this option to run and get locked out&lt;BR /&gt;you can do this to turn it off.&lt;BR /&gt;&lt;BR /&gt;Fix a the pki login&lt;BR /&gt;&lt;BR /&gt;/etc/httpd/ssl_certificates.conf and set it back to SSLVerifyClient none or&lt;BR /&gt;optional&lt;BR /&gt;&lt;BR /&gt;Then restart httpsd using pmtool restartbyid httpsd.&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Feb 2022 21:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553107#M1087468</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2022-02-15T21:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with CAC Authentication and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553126#M1087469</link>
      <description>&lt;P&gt;THANK YOU FOR THE INFO.&lt;/P&gt;&lt;P&gt;I was actually thinking it HAD to be something about it not passing the User Principal name. I'll try this first thing tomorrow morning.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 21:45:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553126#M1087469</guid>
      <dc:creator>Shrimpy</dc:creator>
      <dc:date>2022-02-15T21:45:00Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with CAC Authentication and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553128#M1087470</link>
      <description>&lt;P&gt;"Fix a the pki login"&lt;BR /&gt;&lt;BR /&gt;I've been so scared about that!!!! you are amazing! I've been going crazy!&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 21:48:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553128#M1087470</guid>
      <dc:creator>Shrimpy</dc:creator>
      <dc:date>2022-02-15T21:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with CAC Authentication and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553137#M1087471</link>
      <description>&lt;P&gt;I just got an answer from Cisco to my question on whether they are going to complete working this.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;It took a while to hear back, but I finally did get an answer.&lt;/P&gt;&lt;P&gt;For the moment, it looks like this enhancement is not being prioritized.&lt;/P&gt;&lt;P&gt;There has been no steps toward fixing this issue since it was initially filed, which is why you haven’t seen any updates yet.&lt;/P&gt;&lt;P&gt;Current projections are it will be at least a few more months if we start working on it.&lt;/P&gt;&lt;P&gt;Though I have little authority to set bug/enhancement priorities, your account team may have more weight to throw around if you consider this to be a significant issue."&lt;/P&gt;&lt;P&gt;If you can contact your account team this may get more eyes on this issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also your welcome, I hadn't seen anyone else ask about CAC/Token access. Yours is the first post, besides my own, that I have seen on this topic.&lt;/P&gt;&lt;P&gt;ej&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 22:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4553137#M1087471</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2022-02-15T22:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with CAC Authentication and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4577118#M1088573</link>
      <description>&lt;P&gt;Eric, thank you for your help so far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am stuck too.&amp;nbsp; Please post updates to your TAC case here.&amp;nbsp; I'll get our account rep to try to prioritize this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ss&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2022 15:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4577118#M1088573</guid>
      <dc:creator>elcid98-1a6</dc:creator>
      <dc:date>2022-03-23T15:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with CAC Authentication and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4589168#M1089062</link>
      <description>&lt;P&gt;I was able to get CAC authentication working through the FTD.&amp;nbsp; The high level steps are below.&amp;nbsp; TAC was a huge help on this ticket.&amp;nbsp; You must have the proper cert chain which issued the user certificates installed in Devices-Certificates.&amp;nbsp; For example, if user1 has a cert issued by CA3-SubCA50 both certs are required.&amp;nbsp; If user2 has a cert issued by CA3-SubCA51, load the CA51 cert into the store.&amp;nbsp; The full cert chain must be in the store for it to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Create an LDAPS connection from the FTD to the directory (System-Integration-Realms-Add Realm): use the FQDN as the hostname and make sure you have the proper cert selected for the connection from the FTD to the directory.&lt;/LI&gt;&lt;LI&gt;Devices-VPN-Remote Access: Connection Profile-AAA-Authentication Method should be set to Client certificate and the Map Specific field should be set to the field you want to use to identify your users.&amp;nbsp; We used UPN.&lt;/LI&gt;&lt;LI&gt;Devices-VPN-Remote Access: Connection Profile-AAA-Authorization-Authorization Server is the LDAPS server configured in step 1.&amp;nbsp; The attribute map needs to be configured for your unique environment.&amp;nbsp; Ours is using the LDAP Attribute Name: memberOf field to map to Cisco Attribute Name: Group Policy.&amp;nbsp; Then we added value maps to map the AD groups we want the firewall to search to the proper group policy.&amp;nbsp; For example, our LDAP Attribute Map value is&amp;nbsp;CN=VPN_Mgmt,OU=bbb,OU=aaa,OU=zzz,DC=fbu,DC=yyy,DC=xxx and our Cisco Attribute Value is the group policy name.&lt;/LI&gt;&lt;LI&gt;Next we added a separate flex config of deployment: everytime and type: append as follows for each AD server in our environment.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;aaa-server &amp;lt;Realm Name&amp;gt; host &amp;lt;FQDN from Realm Config&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;ldap-naming-attribute&amp;nbsp;UserPrincipalName&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Save and deploy the settings.&amp;nbsp; The TAC engineer also showed us how to debug the connections on the FTD CLI.&amp;nbsp; Below are some commands that proved helpful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;debug vpn-sessiondb&lt;/P&gt;&lt;P&gt;debug aaa shim&lt;/P&gt;&lt;P&gt;debug ldap 255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2022 15:13:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/4589168#M1089062</guid>
      <dc:creator>elcid98-1a6</dc:creator>
      <dc:date>2022-04-08T15:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with CAC Authentication and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/5296642#M1121245</link>
      <description>&lt;P&gt;On the FMC, once the CAC is authenticated, do you have to put in user/pass after that?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 21:19:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/5296642#M1121245</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2025-06-04T21:19:24Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with CAC Authentication and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/5545566#M1124952</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1331617"&gt;@elcid98-1a6&lt;/a&gt;,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/152665"&gt;@Eric R. Jones&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/779695"&gt;@Shrimpy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;We're working with TAC on a similar solution. Was this able to be implemented with both the FMC and ISE configured in FIPs mode?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 15:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-cac-authentication-and-authorization/m-p/5545566#M1124952</guid>
      <dc:creator>cepetrosso</dc:creator>
      <dc:date>2026-04-15T15:45:46Z</dc:date>
    </item>
  </channel>
</rss>

