06-28-2010 07:05 PM - edited 03-10-2019 05:13 PM
Does anyone have any direction/pointers on how to configure ACS 5.1 to use AD to authenticate and authorize device admin access for Cisco ASA firewalls running 8.2.2? The only way I can seem to get it to work is to tell it to continue if authentication is failed (which means any user/password entered works). The events in the log are:
24408 User authentication against Active Directory failed since user has entered the wrong password
However, I know with 100% certainty that the username and password are good to go (it's the same username and password that works just fine with our old ACS 3.3 system). At this point I feel like I'm missing something really stupid, but for the life of me I can't find it (and the ACS 5.1 user guide leaves a LOT to be desired IMO). Any help is greatly appreciated. We are trying to pilot ACS 5.1 to see if we want to upgrade to it instead of ACS 4.2 but with it failing on what would seem to be such a basic use case, it's not looking promising... TIA.
10-20-2011 05:47 AM
Hello,
Did you ever get this resolved?
We are having the exact same problem and cannot remedy it.
Thanks!
10-21-2011 08:10 AM
Unfortunately we did not. Given other issues with the POC we actually killed the project. It's too bad Cisco doesn't have folks that actively watch and participate in these forums...
04-23-2013 09:05 AM
I had this same issue and found out that my RADIUS keys did not match. I am migrating from ACS 4.2 to ACS version 5.4. I corrected my key on the the 5.4 installation and now access works perfectly. Hope that helps.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide