<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extreme Control AAA LDAP without AD Domain Join in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-aaa-ldap-without-ad-domain-join/m-p/87210#M9357</link>
    <description>Hello Martin,&lt;BR /&gt;
&lt;BR /&gt;
The process would be exactly the same but you are not required to have elevated privileges for the administrator username for the LDAP account specified. The account would only be used for LDAP lookups in an EAP-TLS environment. &lt;BR /&gt;
&lt;BR /&gt;
The LDAP configuration section of the Extreme Control does double duty in that it not only provides information for the LDAP lookup but in the case that NTLM is enabled the LDAP configuration is used to fill out the smb.conf files for Samba to join the active directory.&lt;BR /&gt;
&lt;BR /&gt;
Since NTLM isn't enabled no SMB.conf files will be generated and no domain join will be attempted. With no join being attempted we don't need a username that requires the necessary permissions to join the domain.&lt;BR /&gt;
&lt;BR /&gt;
As long as the account can perform LDAP lookups that is all that you would need.&lt;BR /&gt;
&lt;BR /&gt;
Thanks&lt;BR /&gt;
-Ryan</description>
    <pubDate>Wed, 09 Oct 2019 21:01:45 GMT</pubDate>
    <dc:creator>Ryan_Yacobucci</dc:creator>
    <dc:date>2019-10-09T21:01:45Z</dc:date>
    <item>
      <title>Extreme Control AAA LDAP without AD Domain Join</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-aaa-ldap-without-ad-domain-join/m-p/87209#M9356</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;When creating AAA LDAP configuration in control the requirements for the account needed are detailed here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://extremeportal.force.com/ExtrArticleDetail?an=000090980" target="_blank" rel="nofollow noreferrer noopener"&gt;https://extremeportal.force.com/ExtrArticleDetail?an=000090980&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I have a couple of circumstances where EAP-TLS is being deployed and the use of NTLM authentication isn't required, just simple certificate authentication and then LDAP lookup for authorisation once in the NAC rule engine.&lt;BR /&gt;&lt;BR /&gt;In that scenario when creating the LDAP configuration any account is capable of doing an AD lookup, so a domain privilege account isn't required, nor is it required for Control to join the domain.&lt;BR /&gt;&lt;BR /&gt;My question is; is there an option to just create the LDAP connector with simple privileges that will do the task?&lt;BR /&gt;&lt;BR /&gt;Maybe there is a specific set way to configured this in XMC, perhaps the process is exactly the same just using the a normal service account as opposed to using a domain privilege account?&lt;BR /&gt;&lt;BR /&gt;Just wanted to validate what is the right way to do it, and that I am not missing anything?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2019 16:15:21 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-aaa-ldap-without-ad-domain-join/m-p/87209#M9356</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2019-10-09T16:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control AAA LDAP without AD Domain Join</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-aaa-ldap-without-ad-domain-join/m-p/87210#M9357</link>
      <description>Hello Martin,&lt;BR /&gt;
&lt;BR /&gt;
The process would be exactly the same but you are not required to have elevated privileges for the administrator username for the LDAP account specified. The account would only be used for LDAP lookups in an EAP-TLS environment. &lt;BR /&gt;
&lt;BR /&gt;
The LDAP configuration section of the Extreme Control does double duty in that it not only provides information for the LDAP lookup but in the case that NTLM is enabled the LDAP configuration is used to fill out the smb.conf files for Samba to join the active directory.&lt;BR /&gt;
&lt;BR /&gt;
Since NTLM isn't enabled no SMB.conf files will be generated and no domain join will be attempted. With no join being attempted we don't need a username that requires the necessary permissions to join the domain.&lt;BR /&gt;
&lt;BR /&gt;
As long as the account can perform LDAP lookups that is all that you would need.&lt;BR /&gt;
&lt;BR /&gt;
Thanks&lt;BR /&gt;
-Ryan</description>
      <pubDate>Wed, 09 Oct 2019 21:01:45 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-aaa-ldap-without-ad-domain-join/m-p/87210#M9357</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2019-10-09T21:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control AAA LDAP without AD Domain Join</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-aaa-ldap-without-ad-domain-join/m-p/87211#M9358</link>
      <description>Brilliant, thanks Ryan. Been wanting to clear up that question for ages &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;
&lt;BR /&gt;
Much appreciated for the quick response.</description>
      <pubDate>Wed, 09 Oct 2019 21:26:42 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-aaa-ldap-without-ad-domain-join/m-p/87211#M9358</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2019-10-09T21:26:42Z</dc:date>
    </item>
  </channel>
</rss>

