<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD groups / LDAP for remote access user authorization in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224239#M958952</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct.  I'm not really sure how to tell the ASA what it should be looking for.  It seems like the LDAP attribute map options for IETF-Radius-Class are only for matching AD groups to VPN groups.  I've been using Tunneling-Protocols, which does ensure the user connects with the proper method, but doesn't have a true/false option.  Any suggestions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 Feb 2009 15:55:57 GMT</pubDate>
    <dc:creator>jgolson</dc:creator>
    <dc:date>2009-02-03T15:55:57Z</dc:date>
    <item>
      <title>AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224233#M958921</link>
      <description>&lt;P&gt;I'm trying to configure an ASA5540 to use LDAP for remote access user authorization.  I am using certificates for authentication, and using the userPrincipalName field from the certificate for authorization purposes.  I am trying to set up a LDAP attirbute map which will only allow a user to connect to VPN if he/she is a member of a specific group.  I haven't been able to get this working.  The problem I have run into is that even if a user isn't a member of the group I have defined in the LDAP attribute map, the user will be authorized because the user account exists in AD.  Any help would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:15:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224233#M958921</guid>
      <dc:creator>jgolson</dc:creator>
      <dc:date>2020-02-21T11:15:29Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224234#M958929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post your ldap configuration and your ldap attribute map configuraiton? You need to map the memberOf value to the Radius-IETF-Class which will map to the desired group policy, when there is no match they should fall within the DefaultGroupPolicy (not the exact name) that then will not allow them to connect. please post your config and I will tell you what you are missing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 01:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224234#M958929</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-02-03T01:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224235#M958937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm actually not trying to use the LDAP map to put users into a group policy, I am using group urls and the users know which url to use.  All I want the LDAP map to do is verify that the user is a member of the group they are trying to VPN with, and deny them access if they aren't.  What I've noticed is that even if a user is not a member of the correct group, they will pass authorization.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 13:59:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224235#M958937</guid>
      <dc:creator>jgolson</dc:creator>
      <dc:date>2009-02-03T13:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224236#M958938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How are you authenticating?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 15:13:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224236#M958938</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-02-03T15:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224237#M958946</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Authentication is done by requiring client certificates and using OCSP responders to check for certificate revocation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 15:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224237#M958946</guid>
      <dc:creator>jgolson</dc:creator>
      <dc:date>2009-02-03T15:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224238#M958947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, So basically you only have authorization required on the tunnel group, but you have not told the device what would be a non authorized state right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 15:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224238#M958947</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-02-03T15:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224239#M958952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct.  I'm not really sure how to tell the ASA what it should be looking for.  It seems like the LDAP attribute map options for IETF-Radius-Class are only for matching AD groups to VPN groups.  I've been using Tunneling-Protocols, which does ensure the user connects with the proper method, but doesn't have a true/false option.  Any suggestions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 15:55:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224239#M958952</guid>
      <dc:creator>jgolson</dc:creator>
      <dc:date>2009-02-03T15:55:57Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224240#M958955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When using the ldap map, you can map the memberOf for example to either a tunnel protocol, which is allowed and one which is not, or you can map that to a specific group policy which will have or not a permission to connect, I have made this several times and this is the most viable solution for me in your kind of setup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 16:03:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224240#M958955</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-02-03T16:03:04Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224241#M958957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using the memberOf attribute and tying it to the Tunneling-Protocols Cisco Name.  Up until now, it seems like the ASA would accept the user even if they weren't a member of the AD group I am pointing it to.  In my testing today though, if you aren't a member of the group it will take you to a "Goodbye" page.  What gets returned to the ASA when it uses the LDAP attribute map?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 16:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224241#M958957</guid>
      <dc:creator>jgolson</dc:creator>
      <dc:date>2009-02-03T16:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224242#M958959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This should give you an idea of what I am talking about:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008089149d.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008089149d.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/asdm60/selected_topics/enforce_AD.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/asdm60/selected_topics/enforce_AD.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 16:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224242#M958959</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-02-03T16:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224243#M958961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help.  After looking through those, I think I am going to have to change some AD settings to get this to work as I envisioned.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 17:20:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224243#M958961</guid>
      <dc:creator>jgolson</dc:creator>
      <dc:date>2009-02-03T17:20:52Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224244#M958962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello jgolson,&lt;/P&gt;&lt;P&gt;I'm with the same problem.. i want to allow only the users that are in the VPN group. But.. the ASA seems to allow access for all users not just for that are in the VPN group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I read the links that imartino sends.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you solved this problem? How?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Fabio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Apr 2009 16:36:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224244#M958962</guid>
      <dc:creator>fabiossilva</dc:creator>
      <dc:date>2009-04-28T16:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224245#M958964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the config that you have created to restrict the user? what is your policy to restrict the user are you using group policy tunnel protocol? are you using dial in access?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Apr 2009 16:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224245#M958964</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-04-28T16:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224246#M958966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Imartino...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config of the ASA about the aaa, ldap, and VPN... I don't know what is missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map CISCOMAP&lt;/P&gt;&lt;P&gt;  map-name  memberOf IETF-Radius-Class&lt;/P&gt;&lt;P&gt;  map-value memberOf CN=VPN,DC=domain,DC=local VPNPOLICY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where the VPN is the group that my Users must be to authenticate and have VPN access to the network, If the user isn't in the VPN group of AD the user could not connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server LDAPSERVER protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server LDAPSERVER (inside) host LDAPHOST&lt;/P&gt;&lt;P&gt; ldap-base-dn DC=domain,DC=local&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password 123456&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=asavpn,CN=Users,DC=domain,DC=local&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map CISCOMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where LDAPHOST is the server that have the AD. and the asavpn is the user that have right to authenticate in the AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the tunnel-group conf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group VPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN-POOL&lt;/P&gt;&lt;P&gt; authentication-server-group LDAPSERVER&lt;/P&gt;&lt;P&gt; default-group-policy VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy VPN internal&lt;/P&gt;&lt;P&gt;group-policy VPN attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.4&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some part of the debug of ldap auth process.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;[4288]  displayName: value = Fabio Silva&lt;/P&gt;&lt;P&gt;[4288]  uSNCreated: value = 15114&lt;/P&gt;&lt;P&gt;[4288]  memberOf: value = CN=VPN,DC=domain,DC=local&lt;/P&gt;&lt;P&gt;[4288]          mapped to IETF-Radius-Class: value = VPNPOLICY&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But.. if i remove the user from the VPN group of AD the authentication still success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is not good?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Apr 2009 17:19:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224246#M958966</guid>
      <dc:creator>fabiossilva</dc:creator>
      <dc:date>2009-04-28T17:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224247#M958968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is because the user is assigned to the default group-policy that is configured on the tunnel group it is connecting to. You need to make this default group-policy to somehow avoid the user to connect if they are not mapped to the correct group-policy, what I use to do this is setting the tunnel-protocol to something different than IPSec&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Apr 2009 17:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224247#M958968</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-04-28T17:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: AD groups / LDAP for remote access user authorization</title>
      <link>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224248#M958969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i know thats an old post - but you can try to set the Simultaneous Logins of the DefaultGroup = 0. so nobody who becames the Default Group will be able to login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;konne&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Dec 2009 13:22:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-groups-ldap-for-remote-access-user-authorization/m-p/1224248#M958969</guid>
      <dc:creator>LBS-BZ-HI</dc:creator>
      <dc:date>2009-12-04T13:22:38Z</dc:date>
    </item>
  </channel>
</rss>

