01-02-2024 09:11 PM
Hello everyone i want to configure identity policy on FMC with Active Directory Kerberos, on guide written The Realm you select must be configured with an AD Join Username and AD Join Password to perform Kerberos captive portal active authentication. but when i testing AD Join there is error. AD Join test failed credintials are same with LDAP Realms, Group and User sync works.
01-02-2024 10:33 PM - edited 01-02-2024 10:51 PM
System->Integration
then add realm and directory
MHM
01-03-2024 01:25 AM
Realm already added, screenshots higher are settings of exsisting realm
01-03-2024 01:37 AM
Can you from AD ping FMC mgmt IP?
I think it reachability issue
MHM
01-03-2024 01:47 AM
No problem with access rule i can load groups and users
01-03-2024 01:52 AM
The first step of AD joint test is resolved the AD fqdn to IP.
So check this step
MHM
01-03-2024 10:39 PM - edited 01-03-2024 10:40 PM
if i ping AD fqdn from CLI FMC hostname resolving and ping is success
01-03-2024 03:07 AM
Keep in mind that the username on the Realm Configuration page is not LDAP, it is Kerberos. Be sure that tcp/udp 88 and 464 is permitted.
Other things to consider are from the following output of the 7.2.x administration guide:
AD Join Username and AD Join Password
(Available on the Realm Configuration tab page when you edit a realm.)
For Microsoft Active Directory realms intended for Kerberos captive portal active authentication, the distinguished username and password of any Active Directory user with appropriate rights to create a Domain Computer account in the Active Directory domain.
Keep the following in mind:
DNS must be able to resolve the domain name to an Active Directory domain controller's IP address.
The user you specify must be able to join computers to the Active Directory domain.
The user name must be fully qualified (for example, administrator@mydomain.com, not administrator).
If you choose Kerberos (or HTTP Negotiate, if you want Kerberos as an option) as the Authentication Protocol in an identity rule, the Realm you select must be configured with an AD Join Username and AD Join Password to perform Kerberos captive portal active authentication.
01-03-2024 10:36 PM
1. DNS resloving domain name. Pinging domain name from CLI FMC
2. User have super-administrator role
3. Username FQDN
01-03-2024 01:31 AM
Are the AD server and FMC on the same subnet? If not make sure that access rule allows the connection between FMC and AD.
01-03-2024 01:46 AM
No problem with access rule i can load groups and users
05-02-2024 06:59 AM
Were you able to resolve this issue? I have the same problem. I think the last change I made that broke this was to disable some older cipher suite (3DES) on our Windows DC. Not sure it is related but authenticated via Kerberos for Remote Storage doesn't work either. I opened a TAC on that one and they said feature doesn't exist in 7.2.
06-01-2024 02:16 AM
haven't resolved yet
06-25-2024 07:21 AM
still not resolved ?
07-11-2024 03:59 AM
still not resolved ?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide