<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Authenticate with Microsoft LDAP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/authenticate-with-microsoft-ldap/m-p/1969773#M401614</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; By mistake I marked the wrong star forgive me man &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Sep 2012 08:08:32 GMT</pubDate>
    <dc:creator>Reuven Elkabetz</dc:creator>
    <dc:date>2012-09-06T08:08:32Z</dc:date>
    <item>
      <title>Authenticate with Microsoft LDAP</title>
      <link>https://community.cisco.com/t5/network-security/authenticate-with-microsoft-ldap/m-p/1969770#M401611</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running ASA ver. 8.2(2)&amp;nbsp; and all users are configured in the ASA. This ASA is uses as a VPN ASA and we are using it for remote access for external users. When a user is logged in, he gets all parameters that are need to continue working from outside, such as, IP, assigned to special group with special permissions and so on. All the parameters that are needed are configured under&amp;nbsp; user attribute. See example below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;username username1 password xxxxxx == nt-encrypted&lt;/P&gt;&lt;P&gt;username username1 attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy Basic&lt;/P&gt;&lt;P&gt;vpn-access-hours none&lt;/P&gt;&lt;P&gt;vpn-simultaneous-logins 1&lt;/P&gt;&lt;P&gt;vpn-idle-timeout 30&lt;/P&gt;&lt;P&gt;vpn-session-timeout none&lt;/P&gt;&lt;P&gt;vpn-filter value DDD-Basic&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;vpn-framed-ip-address 1.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;password-storage enable&lt;/P&gt;&lt;P&gt;group-lock value Basic&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to live the user attributes as is and to force the users to authenticate via LDAP servers only?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:34:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticate-with-microsoft-ldap/m-p/1969770#M401611</guid>
      <dc:creator>Reuven Elkabetz</dc:creator>
      <dc:date>2019-03-11T23:34:49Z</dc:date>
    </item>
    <item>
      <title>Authenticate with Microsoft LDAP</title>
      <link>https://community.cisco.com/t5/network-security/authenticate-with-microsoft-ldap/m-p/1969771#M401612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Yes, this can be done. Please refer to &lt;A _jive_internal="true" href="https://community.cisco.com/thread/2045265"&gt;https://supportforums.cisco.com/thread/2045265&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: If you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 16:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticate-with-microsoft-ldap/m-p/1969771#M401612</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-26T16:13:23Z</dc:date>
    </item>
    <item>
      <title>Authenticate with Microsoft LDAP</title>
      <link>https://community.cisco.com/t5/network-security/authenticate-with-microsoft-ldap/m-p/1969772#M401613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Ramraj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot to your reply, sorry for the delay, but now I have a chance to verify again the above issue and according to the debug I triggered in ASA (225) , it is getting the right user and recognize it correct. I had no errors. But I am still getting en error from the VPN client. The error I received is "Secure VPN connection terminated locally by the client. Reason 413: User authentication failed." I also tried to get an IP from AD withput success. Any Idea ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, a lot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reuven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 06:39:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticate-with-microsoft-ldap/m-p/1969772#M401613</guid>
      <dc:creator>Reuven Elkabetz</dc:creator>
      <dc:date>2012-09-05T06:39:05Z</dc:date>
    </item>
    <item>
      <title>Authenticate with Microsoft LDAP</title>
      <link>https://community.cisco.com/t5/network-security/authenticate-with-microsoft-ldap/m-p/1969773#M401614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; By mistake I marked the wrong star forgive me man &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Sep 2012 08:08:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticate-with-microsoft-ldap/m-p/1969773#M401614</guid>
      <dc:creator>Reuven Elkabetz</dc:creator>
      <dc:date>2012-09-06T08:08:32Z</dc:date>
    </item>
    <item>
      <title>Authenticate with Microsoft LDAP</title>
      <link>https://community.cisco.com/t5/network-security/authenticate-with-microsoft-ldap/m-p/1969774#M401615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Ramraj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the delay, but yesterday I had a chance to check again and to test what I configured accroding to the document that you sent me a while ago (:-)). I triggered the debug on the ASA 5520 and everything looks fine. The LDAP server is sending the right information without any error message. In the VPN client when I am trying to login I am receiving the following error message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Secure VPN connection terminated locally by the client. Reason 413:User authentication failed" . Googled this error message and I found that I need to enable the simultaneous logins to enable. I enabled it but I got the same error message. This configuration is under remote access vpn&amp;gt;group-policies&amp;gt;General&amp;gt;more options.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea what could be the reason?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks alot ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reuven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Oct 2012 05:49:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticate-with-microsoft-ldap/m-p/1969774#M401615</guid>
      <dc:creator>Reuven Elkabetz</dc:creator>
      <dc:date>2012-10-24T05:49:42Z</dc:date>
    </item>
  </channel>
</rss>

