03-02-2016 06:12 AM - edited 03-10-2019 11:32 PM
I am setting up a new installation of ACS v5.8 from scratch to replace our ACS4.1 solution.
I have got to the point where I have the new ACS server authenticating device admin access using an internal identity store user just fine. I then connected it successfully to our AD domain. I have selected an AD group to query under the Directory Groups tab of the External Identity Store/Active Directory and have tried to create appropriate device admin identity and authorization policies to reference the AD group using a condition.
Login attempts from device admins are failing. When I check the ACS logs and policy hit counts, its clear that my AD-based device admin identity/auth policies are not being matched. Obviously I have done something wrong or not completely and I'm looking for some guidance.
Thanks,
John
03-02-2016 06:20 AM
John,
On the authentication report page, click on the magnifying glass for a test authentication to get the details, then scroll down to see what attributes were retrieved from AD for that user, and see if you can determine why the intended authorization policy was not matched.
Javier Henderson
Cisco Systems
03-02-2016 06:32 AM
03-02-2016 07:03 AM
Javier,
I was able to get it to work by changing the Identity source in my Rule-1 ID policy from internal users (only) to an id sequence Internal-AD.
Not exactly sue why this worked, however... I would have thought that Rule-2 would have matched.
Oh well.
Thanks for your help.
John
03-02-2016 07:06 AM
The list is evaluated top to bottom, and exits on the first match. In this case, it matched Rule-1 and it stopped there.
Javier Henderson
Cisco Systems
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide