Stripping an user domain with ACS 5.2: In this document we will see how to configure ACS as a proxy to itself to strip a part of the username.
In some cases, it is required to remove the DNS suffix to authenticate the user, and if it’s possible in LDAP configuration, there are no such options in other identity stores, but luckily there’s an option to rewrite the username when you are using ACS as a radius proxy.
Note: this is working only with pure radius request, not with EAP inside Radius.
I will use a catalyst 3560 to test user credentials using the test aaa group command.
Attempting authentication test to server-group radius using radius
User authentication request was rejected by server.
To configure the proxy, we need to understand the process:
• The Switch will send the access-request to the ACS
• The access-request will match the proxy access rule and username will be translated, then ACS will proxy the modified access-request to itself
• The proxied access-request will match another rule which will indicate how to authenticate the user.
So we will need to create a proxy entry, then a rule to send traffic to this proxy, and then other rules to authenticate proxied traffic.
Creating the proxy
Go to network resources, and click external RADIUS servers, then click the Create button (figure 1).
Create proxy with the ACS IP Address as hostname (I used the loopback, but you can use a DNS entry or the interface address, but notice that if you change the IP or that the DNS is down, the proxy configuration will be broke) and choose a shared secret (remember it).
Then go to the “Network Devices and AAA Clients” and create a client with the ACS IP you used in the prior step (loopback or Eth0), and use the same radius shared secret as above.
After that, go to the access policies menu and click on the access services link, then create an access service with ‘User selected service type’ as RADIUS Proxy, select your external radius server (which is, in fact, your ACS) and in the advanced drop down menu, you can choose the strips options you need, and click finish.
Refer to the figure 4.
Now, create a Service Selection Rule to identify the Radius traffic that needs the username to be stripped and select the access rule that you have created which sends traffic to the proxy. I will match the radius traffic from my switch (see figure 6).
Don’t forget to move up the newly created rule so that the traffic does not match another rule before (see figure 7).
Now that we configured the ACS to strip domain name, and send back the authentication request to itself, we must configure it to handle this request.
Start by creating a new Access Service, and set the identity store of your choice (I use local store for testing purpose but you can set active directory or whatever you want).
Then go back to the service selection rule, and create a rule that will match incoming radius traffic from ACS and send it to your Access Service (see figure 9).
The final service section rules should look like figure 10.
And now the final step, test! Normally you would see your stripped username in the ACS monitoring view (in radius authentication – see figure 11)
This document described the Configuration of ACS 5.X to strip a domain name or prefix name from an incoming radius request by proxying to itself. Same features should be available in ACS 4.X. Please note that the proxy feature can't modify the username from an EAP Request as each EAP Method has its own way to exchange the username and it might be ciphered.
User wishes to disable auto complete for username and password on the ACS 5.3 GUI login page.
Try to update to the patch 220.127.116.11.7
Resolved Issues in Cumulative Patch ACS 18.104.22.168.7
CSCub40498 : The password field in ACS 5.3 has the autocomplete operation enabled.
Sometimes it can be the browser issue also as the password has been saved in the browser cache you can clear the browser for history of passwords save.
I have problem with Cisco ASA 5525-X. I can connect only via console port.From the CLI, I see all interfaces are shutdown.But I unable to set command no shutdown. Please help me to find command to enable the interfaces and set IP address to them.The ...
===Goal===Port forward inbound HTTPS requests on TCP-4434 on the outside interface and translate it to TCP-443 as it is sent to a webserver===Issue===When trying to reach the web server using https://[outside IP address]:4434 in Firefox, I am automaticall...
Hi everybody. I´ve configured this lab and an access-list on the firewall but I can´t access the server from outside. I'm trying to figure this out but I can't seem to get it.I´ve attached the lab in zip file if someone ...
Hi everyone ,we are using cisco ISE 2.7 in our network for Guest portal page authentication with self registration for wireless users and everything works fine,Since one week ago we have tested the Ver 3.1 to migrate from 2.7 to Ver 3.1 with same sc...
Hi, Recently, I have faced a strange error while I was trying to access my FMC GUI after 1-2 months! The server returns the following error (Image 1) and nothing stops it. I have tried to restart my virtual FMC and also tried to change GUI passw...