<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This is the error I am seeing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635139#M197451</link>
    <description>&lt;P&gt;This is the error I am seeing when running debugging:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[109349] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [CN=BBUsers,OU=Domain,OU=BB Groups,OU=BB,DC=us,DC=test,DC=jet]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=venosr]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[109349] User venosr not found&lt;BR /&gt;[109349] Fiber exit Tx=376 bytes Rx=611 bytes, status=-1&lt;BR /&gt;[109349] Session End&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know for a fact he is in the group because I can see it as a memberof attribute when he can connect.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Mar 2015 18:37:19 GMT</pubDate>
    <dc:creator>Benjamin Saito</dc:creator>
    <dc:date>2015-03-16T18:37:19Z</dc:date>
    <item>
      <title>cisco asa ldap auth</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635134#M197446</link>
      <description>&lt;P&gt;I have a cisco asa 5515, and the user is very specific on how he wants is set up. He has an admin group and a enduser group created on his AD server. I created 2 connection profiles on the ASA for the ssl vpn for each group he created. I was able to set it up, using attribute maps, so that the admin group could only log into the admin connection profile and the enduser group could only log into the enduser connection profile. The only problem is he has users in the default "domain users" group on his server that can log into both connection profiles. From what I understand you can't use the memberOf attribute for the domain users group, so I can't restrict that group the same way I restricted the other groups. Anyone have any idea on how I can set this up? Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635134#M197446</guid>
      <dc:creator>Benjamin Saito</dc:creator>
      <dc:date>2019-03-12T05:25:33Z</dc:date>
    </item>
    <item>
      <title>if you create two LDAP server</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635135#M197447</link>
      <description>&lt;P&gt;if you create two LDAP server aaa groups and set the BASE DN to the OU your looking to match to the SSL VPN group so that each SSL VPN has a different authentication server (even if it points to the same Active Directory DC IP)&lt;/P&gt;&lt;P&gt;Now, can the "domain users" login to these groups? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a few ideas - just going for the low hanging fruit first before i fire up the security&amp;nbsp;lab ASA's &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jan 2015 06:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635135#M197447</guid>
      <dc:creator>joe19366</dc:creator>
      <dc:date>2015-01-31T06:34:04Z</dc:date>
    </item>
    <item>
      <title>that solution worked for me</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635136#M197448</link>
      <description>&lt;P&gt;That solution worked for me!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;username: michael = in active directory base group (CN=Users,DC=carolco,DC=int)&lt;/P&gt;&lt;P&gt;username: jennifer = in active directory OU carolco-Users&lt;/P&gt;&lt;P&gt;Michael could NOT login &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa-server LAB_LDAP_GRP protocol ldap&lt;BR /&gt;aaa-server LAB_LDAP_GRP (inside) host 10.30.10.50&lt;BR /&gt;&amp;nbsp;ldap-base-dn OU=carolco-Users,DC=carolco,DC=int&lt;BR /&gt;&amp;nbsp;ldap-scope subtree&lt;BR /&gt;&amp;nbsp;ldap-naming-attribute sAMAccountName&lt;BR /&gt;&amp;nbsp;ldap-login-password *****&lt;BR /&gt;&amp;nbsp;ldap-login-dn CN=ciscoasa,CN=Users,DC=carolco,DC=int&lt;BR /&gt;&amp;nbsp;server-type auto-detect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Coresite-nj-fw-01# test aaa-server authentication LAB_LDAP_GRP host 10.30.10.50 username jennifer password g00dlogin&lt;BR /&gt;INFO: Attempting Authentication test to IP address &amp;lt;10.30.10.50&amp;gt; (timeout: 12 seconds)&lt;BR /&gt;INFO: Authentication Successful&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Coresite-nj-fw-01# test aaa-server authentication LAB_LDAP_GRP host 10.30.10.50 username michael password g00dlogin&lt;BR /&gt;INFO: Attempting Authentication test to IP address &amp;lt;10.30.10.50&amp;gt; (timeout: 12 seconds)&lt;BR /&gt;ERROR: Authentication Rejected: Unspecified&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;just make 2 aaa-server groups; one for each ssl vpn group to use set to the BASE DN that should contain ONLY the allowed users &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jan 2015 06:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635136#M197448</guid>
      <dc:creator>joe19366</dc:creator>
      <dc:date>2015-01-31T06:45:01Z</dc:date>
    </item>
    <item>
      <title>Thanks for the help Joe, that</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635137#M197449</link>
      <description>&lt;P&gt;Thanks for the help Joe, that worked for me. What we did was move all the vpn users in one big group and changed the base dn on the asa to use the new OU. The attribute map controls who is allowed to log into which connection profile.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Feb 2015 19:23:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635137#M197449</guid>
      <dc:creator>Benjamin Saito</dc:creator>
      <dc:date>2015-02-03T19:23:54Z</dc:date>
    </item>
    <item>
      <title>Well I have the exact same</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635138#M197450</link>
      <description>&lt;P&gt;Well I have the exact same issue again, but this time this solution isn't working. The reason being is the customer, who manages their own AD server, has a space in the base dn path. I have read in the documentation that spaces aren't allowed, but I see in the "Login DN" path that there are spaces in that and it works. Unfortunately I didn't set this up originally and I do not know who did, so I do not know how they set it up. This is what the login DN path looks like: CN=LDAP\, VPN,OU=BB Service Accounts,OU=BB,DC=us,DC=jet,DC=asad. Right now I have it set up so they can log in, but users that aren't supposed to have access can log in because the base dn isn't set correctly right now.&lt;/P&gt;&lt;P&gt;I can't seem to find any documentation on how to get this working with that space included in the base dn. Any help would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2015 17:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635138#M197450</guid>
      <dc:creator>Benjamin Saito</dc:creator>
      <dc:date>2015-03-16T17:06:24Z</dc:date>
    </item>
    <item>
      <title>This is the error I am seeing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635139#M197451</link>
      <description>&lt;P&gt;This is the error I am seeing when running debugging:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[109349] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [CN=BBUsers,OU=Domain,OU=BB Groups,OU=BB,DC=us,DC=test,DC=jet]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=venosr]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[109349] User venosr not found&lt;BR /&gt;[109349] Fiber exit Tx=376 bytes Rx=611 bytes, status=-1&lt;BR /&gt;[109349] Session End&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know for a fact he is in the group because I can see it as a memberof attribute when he can connect.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2015 18:37:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ldap-auth/m-p/2635139#M197451</guid>
      <dc:creator>Benjamin Saito</dc:creator>
      <dc:date>2015-03-16T18:37:19Z</dc:date>
    </item>
  </channel>
</rss>

