11-06-2025 04:42 AM
Hello Community,
I have Active Directory successfully integrated with FMC.
My goal is to apply a Dynamic Access Policy (DAP) to my FTD, where the DAP should match a specific Active Directory group and apply a corresponding access policy (for example, ACLs or restrictions).
For example:
If a user belongs to the AD group “DEPARTMENT LOGISTICS”, the DAP should trigger and apply a specific access-list or banner.
In Active Directory, the username is correctly listed under that group, and the group is visible and synchronized in the FMC realm.
However, the DAP condition using the LDAP attribute memberOf does not seem to match when the user connects through VPN — the session always falls back to the Default DAP.
Has anyone experienced this issue or found a reliable way to make the memberOf (or nested group) condition work correctly in FMC?
Any guidance on how to make this criterion match or how to debug the LDAP attributes during authentication would be greatly appreciated.
I tried following LDAP Criteria: memberOf, member and also memberOf:1.2.840.113556.1.4.1941
Thanks in advance,
Albert
11-06-2025 05:52 AM
Why not use SAML instead for all of this?
11-07-2025 04:01 AM
Can you share more details?
11-07-2025 05:30 AM
Hello Community,
I have successfully integrated Active Directory with FMC. My goal is to implement a Dynamic Access Policy (DAP) on my FTD, where the DAP should match a specific Active Directory group and apply a corresponding access policy, such as ACLs or restrictions.
For example:
If a user belongs to the AD group “DEPARTMENT LOGISTICS”, the DAP should trigger and apply a specific access-list or banner.
In Active Directory, the username is correctly listed under that group, and the group itself is visible and synchronized in the FMC realm. However, when a user connects through VPN, the DAP condition using the LDAP attribute memberOf does not match. The session always falls back to the Default DAP.
I have tried multiple LDAP criteria, including:
memberOf
member
memberOf:1.2.840.113556.1.4.1941 (for nested groups)
Despite this, the policy does not trigger as expected.
Has anyone encountered this issue or found a reliable way to make memberOf (or nested group) conditions work correctly in FMC? Any guidance on how to make this criterion match, or tips on debugging LDAP attributes during authentication, would be greatly appreciated.
Thanks in advance,
Albert
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide