05-20-2024 06:04 AM
Hello, community!
I am using Enable Failed Authentication Protection for radius ravpn in ISE to prevent Active Directory User Lockout. The maximum password less than the maximum bad password attempts configured as the value of the badPwdCount attribute in the Active Directory and for Authentication Policy use the specific Active Directory join point (not scope mode) but it doesn't work correctly. User gets locked out even when the lockout prevention for Active Directory is enabled.
I cannot understand what the reason could be. What needs to be configured or checked for a solution?
05-20-2024 10:59 AM
Use certificate or SAML auth instead. How are you enabling MFA on your RAVPN solution?
05-20-2024 08:33 PM
Thanks for answer, ahollifield
05-20-2024 11:08 PM
05-20-2024 11:24 PM
The reason why Prevent Active Directory account lockout didn't work. Currently NAS-Port-Type value in access-request from cisco asa = virtual and Prevent Active Directory account lockout feature in ISE doesn't work with NAS-Port-Type=virtual so i have question is it possible to override value NAS-Port-Type attribute using asa or maybe cisco ISE?
05-21-2024 12:06 AM
05-21-2024 02:04 AM
"What is the use/case for simple username/password?" - what does it mean
MFA is used
Prevent Active Directory account lockout is good solution which does not affect users
05-21-2024 03:07 AM
05-21-2024 06:13 AM
AD(first) + OTP scheme
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide