Cisco Acs 57 User Guide
Here you can view all the pages of manual Cisco Acs 57 User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 181
5 Managing Users and Identity Stores Managing External Identity Stores AD uses the “Maximum password age is N days” rule to detect password expiry. All other rules are used during attempts to change a password. ACS supports these AD domains: Windows Server 2003 Windows Server 2003 R2 Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2. ACS machine access restriction (MAR) features use AD to map machine authentication to user authentication and authorization,...
Page 182
5 Managing Users and Identity Stores Managing External Identity Stores If there is a firewall between ACS and AD, certain ports need to be opened in order to allow ACS to communicate with AD. The following are the default ports to be opened: Note: Dial-in users are not supported by AD in ACS. This section contains the following topics: Machine Authentication, page 52 Attribute Retrieval for Authorization, page 53 Group Retrieval for Authorization, page 57 Certificate Retrieval for EAP-TLS...
Page 183
5 Managing Users and Identity Stores Managing External Identity Stores Attribute Retrieval for Authorization You can configure ACS to retrieve Active Directory user or machine attributes to be used in authorization and group-mapping rules. The attributes are mapped to the ACS policy results and determine the authorization level for the user or machine. ACS retrieves the user and Active Directory machine attributes after a successful user or machine authentication; ACS can also retrieve the...
Page 184
5 Managing Users and Identity Stores Managing External Identity Stores Multi-Value Attribute Support in AD or LDAP ACS 5.7 allows you to configure multi-value attributes in AD or the LDAP Directory Attributes page and retrieves multi-value attributes from AD or LDAP during authentication against an AD or LDAP identity store. ACS retrieves the attributes specific to a user who is trying to authenticate against an AD or LDAP identity store. ACS supports the following AD or LDAP attribute types for...
Page 185
5 Managing Users and Identity Stores Managing External Identity Stores Examples Left attribute value = 11 Equals Right attribute value = {22,11,33} Result = True Left attribute value = 11 Equals Right attribute value = {22,44} Result =False Left attribute value = 11 Not Equals Right attribute value = {22,33,44} Result = True Left attribute value = 11 Not Contains Right attribute value = {22,11,33} Result = False Left attribute value = 123 Contains Right attribute value = {12,23} Result = True...
Page 186
5 Managing Users and Identity Stores Managing External Identity Stores Table 48 on page 56 displays the results of the conditions when you use the above operators among the multi-value, single value, and static value attribute operands. Examples Left attribute value = {11,22,33} = Right attribute value = 11 Result = True Left attribute value = {11,22,33} != Right attribute value = 11 Result = False Left attribute value = {11,22,33} > Right attribute value = 11 Result = True Left attribute value =...
Page 187
5 Managing Users and Identity Stores Managing External Identity Stores Group Retrieval for Authorization ACS can retrieve user or machine groups from Active Directory after a successful authentication and also retrieve the user or machine group independent of authentication for authorization and group mapping purposes. You can use the AD group data in authorization and group mapping tables and introduce special conditions to match them against the retrieved groups. Certificate Retrieval for EAP-TLS...
Page 188
5 Managing Users and Identity Stores Managing External Identity Stores As a result of Machine Authentication, the machine's RADIUS Calling-Station-ID attribute (31) is cached as an evidence for later reference. Administrator can configure the time to live (TTL) of the above cache entries in the AD settings page. Administrator can enable or disable MAR from AD settings page. However for MAR to work the following limitations must be taken into account: —Machine authentication must be enabled in...
Page 189
5 Managing Users and Identity Stores Managing External Identity Stores Distributed MAR Cache ACS 5.7 supports the Machine Access Restriction cache per ACS deployment. That is, machine authentication results can be cached among the nodes within a deployment. MAR Cache Distribution Groups ACS 5.7 has the option to group ACS nodes in MAR cache distribution group s. This opti on i s u sed to cont rol the impact of MAR cache distribution operations on ACS performance and memory usage. A text label is...
Page 190
6 Managing Users and Identity Stores Managing External Identity Stores The distributed search option provides a fallback facility when the replication messages for some reason are not delivered. In this case, you can find the MAR cache entry on the ACS node that performs the machine authentication or on any one of the ACS nodes from the same MAR cache distribution group. The distributed search option also provides a fallback facility when the ACS node that performs the machine authentication is...