cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
149
Views
0
Helpful
3
Replies

Dynamic Access Policy (DAP) - memberof

Albertt
Level 1
Level 1

Hello Community,

I have Active Directory successfully integrated with FMC.
My goal is to apply a Dynamic Access Policy (DAP) to my FTD, where the DAP should match a specific Active Directory group and apply a corresponding access policy (for example, ACLs or restrictions).

For example:
If a user belongs to the AD group “DEPARTMENT LOGISTICS”, the DAP should trigger and apply a specific access-list or banner.

In Active Directory, the username is correctly listed under that group, and the group is visible and synchronized in the FMC realm.
However, the DAP condition using the LDAP attribute memberOf does not seem to match when the user connects through VPN — the session always falls back to the Default DAP.

Has anyone experienced this issue or found a reliable way to make the memberOf (or nested group) condition work correctly in FMC?
Any guidance on how to make this criterion match or how to debug the LDAP attributes during authentication would be greatly appreciated.

I tried following LDAP Criteria: memberOf, member and also memberOf:1.2.840.113556.1.4.1941

Thanks in advance,


Albert

 

3 Replies 3

Why not use SAML instead for all of this?

Can you share more details?

jameswood32
Level 1
Level 1

Hello Community,

I have successfully integrated Active Directory with FMC. My goal is to implement a Dynamic Access Policy (DAP) on my FTD, where the DAP should match a specific Active Directory group and apply a corresponding access policy, such as ACLs or restrictions.

For example:

  • If a user belongs to the AD group “DEPARTMENT LOGISTICS”, the DAP should trigger and apply a specific access-list or banner.

In Active Directory, the username is correctly listed under that group, and the group itself is visible and synchronized in the FMC realm. However, when a user connects through VPN, the DAP condition using the LDAP attribute memberOf does not match. The session always falls back to the Default DAP.

I have tried multiple LDAP criteria, including:

  • memberOf

  • member

  • memberOf:1.2.840.113556.1.4.1941 (for nested groups)

Despite this, the policy does not trigger as expected.

Has anyone encountered this issue or found a reliable way to make memberOf (or nested group) conditions work correctly in FMC? Any guidance on how to make this criterion match, or tips on debugging LDAP attributes during authentication, would be greatly appreciated.

Thanks in advance,
Albert

Review Cisco Networking for a $25 gift card