04-24-2013 09:30 AM - edited 03-01-2019 11:00 AM
I am looking to configure my New UCS with Active Directory.
I know I need to create teh CiscoAVPair attribute in the AD Schema, but where?
Can I do it on the group that my UCS Admins reside? We have several UCS deployements running older verions of UCSM that predated this requirement. Can I just add the CiscoAVPair Attribute to the admin groups?
Better yet can I create a group "UCS Access" with this setting and nest that group into "UCS Admins" and "UCS KVM" groups?
04-24-2013 09:56 AM
You no longer need to modify the AD scheme as of 1.4 or later. There's plenty of guides on how to design/configure it including:
Regards,
Robert
04-24-2013 11:11 AM
Sir, no disrespect but I am seeing the exact opposite of what you are saying.
I have my UCS configured with Group Maping ubt when a admin connects they are also given read-only access, which what I have found indicates that CiscoAVPair is not set correctly?
04-24-2013 11:32 AM
Which version are you running?
In short, you create AD Groups on your DC, then add your AD users to the Group
Ex.
UCSadmin
User1
UCSaaa
User2
User3
UCSnetwork
User4
Then in UCSM, you setup your Authentication profile, LDAP providers, and the Group map which create the bind between the UCS role and AD user Group
AD Group UCSadmin >>>> UCS Admin role
AD Group UCSaaa >>> UCS aaa role
AD Group UCSnetwork >>>> UCS network role
This allows any AD authenticated users to be assigned the approrpiate UCS role.
If you're running 2.0 or later you definately don't need to touch the schema.
Robert
04-24-2013 11:40 AM
Please review/watch this video. It should walk you through the process.
https://supportforums.cisco.com/videos/1720
Regards,
Robert
04-24-2013 12:54 PM
I have authentication working. This is the 3rd UCS I have deployed (first with 2.1 installed though).
I can authenticate, but when I connect it shows I have admin and read-only rights.
04-24-2013 01:26 PM
That's fine. Any users who successfully authenticates to UCSM gets read-only. It's the lowest privelidge. Since you also have the "admin" role that will superceed the read-only privilege.
Regards,
Robert
04-26-2013 07:20 AM
Thank you for this information, it indeed put me down the right path!
Turned out the person who put in the CN for the group mapping had a typo in the admin mapping, while the admin user (me) was also a member of the KVM group that has read-only privilages. So what I did was delete the KVM group map and then was unable to authenticate any longer, then I figured out the typo in the admin mapping.
So my new question would be, is there a more graceful way to validate group maps?
04-26-2013 01:12 AM
Could I hijack this discussion and ask how we get ldap auth to also work when accessing the CLI?
04-26-2013 04:38 AM
04-26-2013 07:11 AM
Thanks again!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide