<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yes, I am aware of that. I in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/radius-authentication-user-mapping/m-p/3032590#M43219</link>
    <description>&lt;P&gt;Yes, I am aware of that. I was just hoping to get user data on my Apple devices too...&lt;/P&gt;
&lt;P&gt;Maybe there's a way to manipulate or (re-)create the Windows events and trick the FMC into thinking it saw a legit logon...&lt;/P&gt;</description>
    <pubDate>Thu, 26 Jan 2017 12:36:36 GMT</pubDate>
    <dc:creator>ammann9113</dc:creator>
    <dc:date>2017-01-26T12:36:36Z</dc:date>
    <item>
      <title>RADIUS authentication user mapping</title>
      <link>https://community.cisco.com/t5/network-security/radius-authentication-user-mapping/m-p/3032588#M43212</link>
      <description>&lt;P&gt;Hello everyone&lt;/P&gt;
&lt;P&gt;I've set up my WLAN authentication via a Windows NPS server. The NPS server is also a domain controller in my domain, which is monitored by the FirePOWER user agent.&lt;/P&gt;
&lt;P&gt;Now, my goal was to get the user who authenticates to the wireless lan mapped in the FMC. Unfortunately though &amp;nbsp;the authentication does not show up in the FMC at the "user activity"-tab. "Normal" Windows-logons show up just fine.&lt;/P&gt;
&lt;P&gt;So, am I missing something? Or even, is this not supported?&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:45:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-authentication-user-mapping/m-p/3032588#M43212</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2019-03-10T13:45:20Z</dc:date>
    </item>
    <item>
      <title>I don't think this is</title>
      <link>https://community.cisco.com/t5/network-security/radius-authentication-user-mapping/m-p/3032589#M43215</link>
      <description>&lt;P&gt;I don't think this is supported. The user agent watches for user logon/logoff events. &amp;nbsp;NPS wont generate these kinds of events. &amp;nbsp;I don't see how it could work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HOWEVER, once the user is attached to WiFi and attempts to access a Windows resource they should authenticate against AD at that point in time - and Firepower will pick this up.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2017 04:28:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-authentication-user-mapping/m-p/3032589#M43215</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2017-01-21T04:28:35Z</dc:date>
    </item>
    <item>
      <title>Yes, I am aware of that. I</title>
      <link>https://community.cisco.com/t5/network-security/radius-authentication-user-mapping/m-p/3032590#M43219</link>
      <description>&lt;P&gt;Yes, I am aware of that. I was just hoping to get user data on my Apple devices too...&lt;/P&gt;
&lt;P&gt;Maybe there's a way to manipulate or (re-)create the Windows events and trick the FMC into thinking it saw a legit logon...&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2017 12:36:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-authentication-user-mapping/m-p/3032590#M43219</guid>
      <dc:creator>ammann9113</dc:creator>
      <dc:date>2017-01-26T12:36:36Z</dc:date>
    </item>
  </channel>
</rss>

