06-24-2019 07:39 AM - edited 06-24-2019 07:55 AM
What is the order an identity is checked in identity source sequence when a scope is used with two AD join points? I have added both newAD and oldAD to a scope, so is the order the AD is checked from top to bottom (i.e. newAD first then oldAD), if I have only reference All_Scope in an identity source sequence?
It doesn't look like I can change the order of the join point in scope mode, is that correct? Basically if I have a duplicate user in both the newAD and oldAD, so will it only take the match on the newAD only - meaning any authorization rules with condition for AD group from the oldAD will never get matched?
It looks like going through a radius live log session output, ISE checked the account against both join points in the scope, I see:
"Search for matching accounts at join point - oldAD", and
"Search for matching accounts at join point - newAD", then
"User authentication against Active Directory succeeded - All_Scope".
However in the authentication details section, ISE has picked Authentication Identity Store as "newAD". I can see the radius messages:
"Looking up user in Active Directory - newAD" and
"User's Groups retrieval from Active Directory succeeded - newAD"
Why did ISE pick newAD instead of oldAD? The issue is we are migrating from oldAD to newAD and our authz policies conditions are still AD groups under oldAD, so because ISE decided to use newAD, none of the authz policies were being hit except for the default policy.
Solved! Go to Solution.
06-29-2019 12:46 AM - edited 06-29-2019 01:22 AM
In general with AD authentication when there are multiple user accounts with same username with same password, the authentication will fail. But I am not sure what will happen when user exists in a separate join point as you noted. I will try to find the answer for this. However, as others have noted I also suggest crafting policy so as not to go through both join points if possible. Referencing external ID source is taxing in terms of time and best to simplify the flow if possible. You can achieve this by creating two separate authentication rule. Craft one rule that reads if username domain suffix ends with abc.com then use abc.com join point. Create another rule that uses other join point which will also match when the username doesn't include and domain suffix (I.E. using short username format).
06-24-2019 08:38 AM
06-24-2019 05:54 PM
I was thinking about this, but I am not sure if it will work. The way the authc policies work if conditions match one authc policy then it won't match another to use a different identity source sequence. Example an authc policy has condition wireless and SSID, radius session will only ever match the top policy. How would I differentiate my existing users to use the existing policies and new test users to use the new global / authc policies?
06-25-2019 05:08 AM
06-24-2019 06:10 PM
Is anyone able to confirm the order the join points are picked in a scope which contains two join points if user exist in both join points?
06-29-2019 12:46 AM - edited 06-29-2019 01:22 AM
In general with AD authentication when there are multiple user accounts with same username with same password, the authentication will fail. But I am not sure what will happen when user exists in a separate join point as you noted. I will try to find the answer for this. However, as others have noted I also suggest crafting policy so as not to go through both join points if possible. Referencing external ID source is taxing in terms of time and best to simplify the flow if possible. You can achieve this by creating two separate authentication rule. Craft one rule that reads if username domain suffix ends with abc.com then use abc.com join point. Create another rule that uses other join point which will also match when the username doesn't include and domain suffix (I.E. using short username format).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide