<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configure VPN profile to use Active Directory Security Group for authorisation on ASA firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/is-this-possible-multi-factor-authentication-through-a/m-p/3727474#M11962</link>
    <description>&lt;P&gt;Hi Mohammed,&lt;/P&gt;
&lt;P&gt;Thanks for your response. My only main concern is whether the information retrieved about the user once RSA authenticates, would be able to accurately mapped to what LDAP can accept in order to provide authorisation for that user ?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Oct 2018 22:40:09 GMT</pubDate>
    <dc:creator>damode</dc:creator>
    <dc:date>2018-10-17T22:40:09Z</dc:date>
    <item>
      <title>Is this possible ? Multi-factor authentication through a combination of RSA token and Active Directory user account and authorisation using LDAP Security Group member check for remote access VPN in ASA firewalls</title>
      <link>https://community.cisco.com/t5/network-security/is-this-possible-multi-factor-authentication-through-a/m-p/3717005#M11959</link>
      <description>&lt;P&gt;I am currently working on a POC to achieve&amp;nbsp;Authentication and Authorisation for remote access VPN on ASA firewalls whereby RSA server and AD user account is used for authentication, and the LDAP - Security Group (SG) member check is used for authorisation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can someone please advise&amp;nbsp;if the above solution is possible to achieve ? If yes, please direct to the right documentation for this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-possible-multi-factor-authentication-through-a/m-p/3717005#M11959</guid>
      <dc:creator>damode</dc:creator>
      <dc:date>2020-02-21T16:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: Configure VPN profile to use Active Directory Security Group for authorisation on ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/is-this-possible-multi-factor-authentication-through-a/m-p/3726788#M11961</link>
      <description>You need to use DAPs to apply security rules such as ACLs based on memberOf&lt;BR /&gt;attribute. This is after successful authentication against LDAP/RSA which&lt;BR /&gt;you can do by configuring LDAP aaa-server&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Oct 2018 06:17:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-possible-multi-factor-authentication-through-a/m-p/3726788#M11961</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-10-17T06:17:00Z</dc:date>
    </item>
    <item>
      <title>Re: Configure VPN profile to use Active Directory Security Group for authorisation on ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/is-this-possible-multi-factor-authentication-through-a/m-p/3727474#M11962</link>
      <description>&lt;P&gt;Hi Mohammed,&lt;/P&gt;
&lt;P&gt;Thanks for your response. My only main concern is whether the information retrieved about the user once RSA authenticates, would be able to accurately mapped to what LDAP can accept in order to provide authorisation for that user ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 22:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-possible-multi-factor-authentication-through-a/m-p/3727474#M11962</guid>
      <dc:creator>damode</dc:creator>
      <dc:date>2018-10-17T22:40:09Z</dc:date>
    </item>
  </channel>
</rss>

