<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA - Authenticate users of a specific LDAP group in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387309#M718919</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply, unfortunatelly in the website you mentioned there is nothing on LDAP Group but just on LDAP authentication via ASA...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any others?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 Apr 2010 06:33:53 GMT</pubDate>
    <dc:creator>sergio.paganoni</dc:creator>
    <dc:date>2010-04-22T06:33:53Z</dc:date>
    <item>
      <title>Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387305#M718905</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm actually require authentication for users who are coming from the PublicVLAN (the vlan associated with the wireless hotspot) to authenticate themself to the LDAP server via my firewall ASA 5510:&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list PublicVLAN_authentication remark Authenticate user from Hotspot (VLAN3) before allowing HTTP traffic&lt;BR /&gt;access-list PublicVLAN_authentication extended permit tcp 192.168.12.0 255.255.255.0 any eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication match PublicVLAN_authentication PublicVLAN LDAP_HOTSPOT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server LDAP_HOTSPOT protocol ldap&lt;BR /&gt;aaa-server LDAP_HOTSPOT (inside) host XXXXXX&lt;BR /&gt; ldap-base-dn CN=Users, DC=XXXX,DC=XXX&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password xxxx&lt;BR /&gt; ldap-login-dn CN=xxxx,CN=Users,DC=xxxxx,DC=xxxxx&lt;BR /&gt; server-type microsoft&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is working correctly and I can authenticate all users in my domain.&lt;/P&gt;&lt;P&gt;Now I've created a new LDAP Group named http_authorized_users and I've associated users who are permitted to surf the web to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How can I specify to authenticate just users member of a specific LDAP group?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;As you can see in the image I've my group and I've associated the user TestInterno, but how can I modify my LDAP_HOTSPOT to authenticate just user who are member of the http_authorized_users group (in the example below just the user TestInterno is associated to the group)?&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="3747" __jive_id="3747" alt="httpgroup.gif" class="jive-image" src="https://community.cisco.com/httpgroup.gif" /&gt;&lt;/P&gt;&lt;P&gt;If not possible with LDAP, which other solution may I have to do this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Sergio&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:34:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387305#M718905</guid>
      <dc:creator>sergio.paganoni</dc:creator>
      <dc:date>2019-03-11T17:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387306#M718909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sergio, try changing the &lt;EM&gt;&lt;STRONG&gt;ldap-base-dn &lt;/STRONG&gt;&lt;/EM&gt;to the &lt;EM&gt;http_authorized_user&lt;/EM&gt;s group :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;ldap-base-dn CN=http_authorized_users CN=Users, DC=XXXX,DC=XXX&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See if that works.&lt;/P&gt;&lt;P&gt;Dmitry.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Apr 2010 16:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387306#M718909</guid>
      <dc:creator>dtochilovsky</dc:creator>
      <dc:date>2010-04-20T16:23:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387307#M718912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dmitry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It was the first thing I tried, but unfortunately it didnt work, as seen in my configuration I search the username in the attribute sAMAccountName and in the Group the user are part of the member attribute....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also tried to change de Attirbute Name to "member" but it didnt work, probably because he cant search between multiple users inside member, and he also need to "take" the right one and authenticate it...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debugging with&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;debug ldap 255&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;[1879] Session Start&lt;BR /&gt;[1879] New request Session, context 0xd7ec6560, reqType = Authentication&lt;BR /&gt;[1879] Fiber started&lt;BR /&gt;[1879] Creating LDAP context with uri=ldap://192.168.1.70:389&lt;BR /&gt;[1879] Connect to LDAP server: ldap://192.168.1.70:389, status = Successful&lt;BR /&gt;[1879] supportedLDAPVersion: value = 3&lt;BR /&gt;[1879] supportedLDAPVersion: value = 2&lt;BR /&gt;[1879] Binding as FirewallSSL&lt;BR /&gt;[1879] Performing Simple authentication for XXXXXXX to 192.168.1.70&lt;BR /&gt;[1879] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [CN=Users,DC=xxxx,DC=xxx]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=testinterno]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[1879] User DN = [CN=TestInterno,CN=Users,DC=xxxx,DC=xxxx]&lt;BR /&gt;[1879] Talking to Active Directory server 192.168.1.70&lt;BR /&gt;[1879] Reading password policy for testinterno, dn:CN=TestInterno,CN=Users,DC=xxx,DC=xxxx&lt;BR /&gt;[1879] Read bad password count 0&lt;BR /&gt;[1879] Binding as testinterno&lt;BR /&gt;[1879] Performing Simple authentication for testinterno to 192.168.1.70&lt;BR /&gt;[1879] Processing LDAP response for user testinterno&lt;BR /&gt;[1879] Message (testinterno):&lt;BR /&gt;[1879] Authentication successful for testinterno to 192.168.1.70&lt;BR /&gt;[1879] Retrieved User Attributes:&lt;BR /&gt;[1879]&amp;nbsp; objectClass: value = top&lt;BR /&gt;[1879]&amp;nbsp; objectClass: value = person&lt;BR /&gt;[1879]&amp;nbsp; objectClass: value = organizationalPerson&lt;BR /&gt;[1879]&amp;nbsp; objectClass: value = user&lt;BR /&gt;[1879]&amp;nbsp; cn: value = TestInterno&lt;BR /&gt;[1879]&amp;nbsp; description: value = Per test Anyconnect - da cancellare&lt;BR /&gt;[1879]&amp;nbsp; givenName: value = TestInterno&lt;BR /&gt;[1879]&amp;nbsp; distinguishedName: value = CN=TestInterno,CN=Users,DC=xxx,DC=xxx&lt;BR /&gt;[1879]&amp;nbsp; instanceType: value = 4&lt;BR /&gt;[1879]&amp;nbsp; whenCreated: value = 20100413124838.0Z&lt;BR /&gt;[1879]&amp;nbsp; whenChanged: value = 20100413124853.0Z&lt;BR /&gt;[1879]&amp;nbsp; displayName: value = TestInterno&lt;BR /&gt;[1879]&amp;nbsp; uSNCreated: value = 25123467&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;[1879]&amp;nbsp; memberOf: value = CN=http_authorized_users,CN=Users,DC=xxxx,DC=xxxx&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;[1879]&amp;nbsp; memberOf: value = CN=AnyconnectInterni,CN=Users,DC=xxxxx,DC=xxxx&lt;BR /&gt;[1879]&amp;nbsp; uSNChanged: value = 25123477&lt;BR /&gt;[1879]&amp;nbsp; name: value = TestInterno&lt;BR /&gt;[1879]&amp;nbsp; objectGUID: value = .am SVZF..@8.*..&lt;BR /&gt;[1879]&amp;nbsp; userAccountControl: value = 66048&lt;BR /&gt;[1879]&amp;nbsp; badPwdCount: value = 0&lt;BR /&gt;[1879]&amp;nbsp; codePage: value = 0&lt;BR /&gt;[1879]&amp;nbsp; countryCode: value = 0&lt;BR /&gt;[1879]&amp;nbsp; badPasswordTime: value = 129161569854641952&lt;BR /&gt;[1879]&amp;nbsp; lastLogoff: value = 0&lt;BR /&gt;[1879]&amp;nbsp; lastLogon: value = 129161570079951568&lt;BR /&gt;[1879]&amp;nbsp; pwdLastSet: value = 129156365187480989&lt;BR /&gt;[1879]&amp;nbsp; primaryGroupID: value = 513&lt;BR /&gt;[1879]&amp;nbsp; objectSid: value = ............qO.H.!N.........&lt;BR /&gt;[1879]&amp;nbsp; accountExpires: value = 9223372036854775807&lt;BR /&gt;[1879]&amp;nbsp; logonCount: value = 0&lt;BR /&gt;&lt;STRONG&gt;[1879]&amp;nbsp; sAMAccountName: value = TestInterno&lt;/STRONG&gt;&lt;BR /&gt;[1879]&amp;nbsp; sAMAccountType: value = 805306368&lt;BR /&gt;[1879]&amp;nbsp; userPrincipalName: value = TestInterno@xxxxx.xxx&lt;BR /&gt;[1879]&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=xxxx,DC=xxx&lt;BR /&gt;[1879] Fiber exit Tx=542 bytes Rx=2258 bytes, status=1&lt;BR /&gt;[1879] Session End&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see that the LDAP server return all the attributes I should need, but I&amp;nbsp; don't know how to configure it properly!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you see authentication is successfull (for all the users) but what's the way to authenticate just users who are member of http_authorized_users?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 05:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387307#M718912</guid>
      <dc:creator>sergio.paganoni</dc:creator>
      <dc:date>2010-04-21T05:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387308#M718915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found this blog entry that may help things -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.staticnat.com/WP/2007/08/10/asa-ldap-auth-the-nice-and-easy-way/"&gt;http://www.staticnat.com/WP/2007/08/10/asa-ldap-auth-the-nice-and-easy-way/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See if there is any info that may help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 14:56:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387308#M718915</guid>
      <dc:creator>dtochilovsky</dc:creator>
      <dc:date>2010-04-21T14:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387309#M718919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply, unfortunatelly in the website you mentioned there is nothing on LDAP Group but just on LDAP authentication via ASA...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any others?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Apr 2010 06:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387309#M718919</guid>
      <dc:creator>sergio.paganoni</dc:creator>
      <dc:date>2010-04-22T06:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387310#M718923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sergio, try this link -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808d1a7c.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808d1a7c.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It explains how to set up a mapping to a specific LDAP attribute, and deals with users in different groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See if that document helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Apr 2010 14:26:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387310#M718923</guid>
      <dc:creator>dtochilovsky</dc:creator>
      <dc:date>2010-04-22T14:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387311#M718941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I've used this procedure to bind the LDAP group to a specific group policy for the SSL VPN and, as I've understood, this works only for VPN...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I bind a Group Policy to my authentication rule? I think is not possibile, but there are surely other way to do what I need, not?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Apr 2010 14:35:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387311#M718941</guid>
      <dc:creator>sergio.paganoni</dc:creator>
      <dc:date>2010-04-22T14:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387312#M718959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What about RADIUS? You can set up Radius on a MS Windows server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://support.mof.go.th/radius_windows.html"&gt;http://support.mof.go.th/radius_windows.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://technet.microsoft.com/en-us/network/bb643123.aspx"&gt;http://technet.microsoft.com/en-us/network/bb643123.aspx&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Apr 2010 14:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387312#M718959</guid>
      <dc:creator>dtochilovsky</dc:creator>
      <dc:date>2010-04-22T14:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387313#M718964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you ever get a solution to this issue. We are running into a similar situation. We only allow users of a very specific group to come into VPN.Our method so far is as follows. If someone has run across a better method.. Please let me know.. this feels a little.. awkward. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our ipsec policy defaults users to a group policy that does not allow IPSEC, or any tunnel protocols, but during the ipsec auth process we catch the auth with an ldap attribute map. This map changes the group policy of the giving user to a policy that allows ipsec. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In essence users will be denied access unless the ldap attribute matches. This method does work for us, but there has to be a better, cleaner way. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Sep 2010 03:48:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387313#M718964</guid>
      <dc:creator>tthulin</dc:creator>
      <dc:date>2010-09-02T03:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387314#M718975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also use an ldap attribute map.&amp;nbsp; In my case, the ldap attribute map matches to a group policy, and that group policy maps to an assigned address pool.&amp;nbsp; So, if you were a defined user in an undefuned group, you would not receive an IP address from the concentrator.&amp;nbsp; This lets me use a single attribute map for a large number of different groups.&amp;nbsp; Quick example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server user-LDAP (outside) host x.x.x.x&lt;BR /&gt; ldap-attribute-map User2LDAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map User2LDAP&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; ********** IETF-Radius-Class&lt;BR /&gt;&amp;nbsp; map-value ********** "cn=XXXXXXXXXX" ABC_User&lt;BR /&gt;&amp;nbsp; map-value ********** "cn=XXXXXXXXXX" DEF_User&lt;BR /&gt;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; &lt;BR /&gt;group-policy ABC_User internal&lt;BR /&gt;group-policy ABC_User attributes&lt;BR /&gt; address-pools value ABC-User-Pool&lt;BR /&gt; &lt;BR /&gt;group-policy DEF_User internal&lt;BR /&gt;group-policy DEF_User attributes&lt;BR /&gt; address-pools value DEF-User-Pool&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 14:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387314#M718975</guid>
      <dc:creator>brian.dickerson</dc:creator>
      <dc:date>2010-09-14T14:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387315#M718988</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any updates regarding this issue ? i have read several documents about the LDAP Attributes. &lt;SPAN class="content"&gt;Most of them map the AD/LDAP attribute &lt;STRONG&gt;memberOf&lt;/STRONG&gt; to the ASA attribute &lt;STRONG&gt;CVPN3000-Radius-IETF-Class.&lt;/STRONG&gt; However this attribute cannot be found to 8.3, neither the IETF-Radius-Class.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jim.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Sep 2010 11:44:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387315#M718988</guid>
      <dc:creator>trustcisco</dc:creator>
      <dc:date>2010-09-22T11:44:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387316#M718995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although IETF-Radius-Class cannot be found in ASDM, you can use it through CLI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ciscoasa(config)# ldap attribute-map grp_SSL&lt;BR /&gt;ciscoasa(config-ldap-attribute-map)#&amp;nbsp;&amp;nbsp; map-name&amp;nbsp; memberOf ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ldap mode commands/options:&lt;BR /&gt;cisco-attribute-names:&lt;BR /&gt;&amp;nbsp; Access-Hours&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; Allow-Network-Extension-Mode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;...&amp;nbsp; &lt;BR /&gt;&amp;nbsp; IE-Proxy-Method&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; IE-Proxy-Server&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; IETF-Radius-Class&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; IETF-Radius-Filter-Id&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lionel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 15:27:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387316#M718995</guid>
      <dc:creator>liboucher</dc:creator>
      <dc:date>2010-11-23T15:27:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Authenticate users of a specific LDAP group</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387317#M719004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;aaa-server LDAP (inside) host domaincontroller.yourplace.com&lt;BR /&gt; ldap-base-dn DC=yourplace,DC=com&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password *****&lt;BR /&gt; ldap-login-dn &lt;A href="mailto:LDAPaccountname@yourplace.com"&gt;LDAPaccountname@yourplace.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map SSLLoginName&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map SSLLoginName&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; memberOf IETF-Radius-Class&lt;BR /&gt;&amp;nbsp; map-value memberOf CN=VPNGROUPNAME,,OU=level2,OU=Level1,DC=yourplace,DC=com accesspolicyname&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 May 2011 17:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-authenticate-users-of-a-specific-ldap-group/m-p/1387317#M719004</guid>
      <dc:creator>keitho</dc:creator>
      <dc:date>2011-05-31T17:21:06Z</dc:date>
    </item>
  </channel>
</rss>

