- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-05-2011 02:56 PM - edited 03-10-2019 06:03 PM
For authentication to our wireless, our ACS server checks to make sure a node is a memeber of a specific computer group. When we disable the computer account, the ACS server continues to pass authentication despite the account being disabled. This is not the only thing that is checked, we also checked for a valid certificate that has been issued from our CA. Regardless, if the computer account is disabled I would like for the ACS server to fail the authentication. Is there a way to map a computer account attribute to a radius attribute? Or simply configure the ACS server to check for a flag on the AD attribute?
Specifically, here is what we see in the steps section for a machine that's account has been disabled:
24475 The user's or host's account is disabled; setting the IdentityAccessRestricted flag to true.
I'd like for it to see that flag "true" and fail the authentication, but it does not. Any suggestions?
Solved! Go to Solution.
- Labels:
-
AAA
Accepted Solutions

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-08-2011 02:18 PM
The IdentityAccessRestricted attribute referenced in the steps is an additional attribute that can be used in authorization conditions
It is set to true if access to the account is disabled, outside of the permitted time for access etc.
This gives flexibility when AD attributes are retrieved to be used in authorization conditions and will allow the request to be denied if the flag is set.
To do this add a new condition in the authorization policy
If (AD1->IdentityAccessRestricted) == TRUE select Deny Access authorization profile as the result
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-05-2011 03:01 PM
I think you just need to enable machine authentication. When it is enabled, ACS will check AD to see if the computer account is a valid.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-05-2011 04:42 PM
That's what I thought also, but apparently not. I have it enabled already. I'm assuming that all it does is check to make sure there is an account and allows you to check it against group membership.
Thanks for the reply.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-05-2011 10:15 PM
what kind of wireless authentication are you using? PEAP, EAP or something else? Did you enable machine authentication on the wireless client as well?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-06-2011 06:28 AM
We are using EAP-TLS for the certificate. We use the Cisco Mobility Client and the NAM module on the client. Machine authentication is enabled on the NAM module. To be honest, I'm not sure how the client is passing along the machines domain credentials.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-06-2011 10:56 AM
Ok, I did not play with NAM yet. But if it is EAP-TLS, both sides must have the certificate. Per your first post, you have checked the certificate already.
Basically, I think you need find out if the issue is on client side or ACS side. You should check your ACS authentication log to see if you see machine authentication request. When doing the machine authentication, the username looks like "host/PC_name". If you don't see this, you might need check log on NAM, If you does see this, you need check your ACS and AD.
By the way, here is a old example for EAP-TLS with machine authentication. It's old but the principle should be the same.

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-08-2011 02:18 PM
The IdentityAccessRestricted attribute referenced in the steps is an additional attribute that can be used in authorization conditions
It is set to true if access to the account is disabled, outside of the permitted time for access etc.
This gives flexibility when AD attributes are retrieved to be used in authorization conditions and will allow the request to be denied if the flag is set.
To do this add a new condition in the authorization policy
If (AD1->IdentityAccessRestricted) == TRUE select Deny Access authorization profile as the result
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-08-2011 04:43 PM
Could you please clarify this?
In ACS5.2, if computer account is disabled or not exist in AD, machine authentication will be failed directly or we have to add the condition which you mentioned to deny the machine authentication.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-09-2011 04:43 AM
@jrabinow - This is the answer I was looking for, Thanks!
