cancel
Showing results forĀ 
Search instead forĀ 
Did you mean:Ā 

Extreme Control Machine + User authentication fails

Extreme Control Machine + User authentication fails

SDR
New Contributor III

ā€‹
Hi,

This Topic is a a follow up to


 

Although, I hopefully configured everything as advised and discussed in above thread,   

Machine + User authentication fails. (Machine auth ONLY works fine, now!)

Below is a screenshot of  the EvaluationTool result:

 

9b635a8e5ebc40f6a8c66126253d4e30_70302b0d-5609-4778-b310-606ec3098b0f.jpg

 

I donĀ“t see the mistakeā€¦.

1 ACCEPTED SOLUTION

SDR
New Contributor III

Dear all,

today customer tested the solution/correction and it worked.

Below my solution/explanation:

In an earlier mentioned documentation (https://extremeportal.force.com/ExtrArticleDetail?an=000080814)  I primarily followed it was advised to use ā€œcnā€ as Host Search Attibute (within the LDAP-configuration of ā€œDomain usersā€

At least in my environment, this did not work (as shown in above screenshots). The solution was to use ā€œdNSHostNameā€ as Host Search Attibute (which is the default).

Changing this, the configuration worked. Machine AND User-Authentication are passed successfull.

Unfortunately, this solution is already described in https://extremeportal.force.com/ExtrArticleDetail?an=000082479 which I found during my troubleshooting.

 

In addition to this modification of the solution, I changed the advised order of the Rules.

Instead of 

  1. Authenticate and authorise a machine
  2. Authenticate and authorise a machine as a valid domain computer with a valid domain user logged in
  3. Deny a valid user who is on a non-domain (BYOD) computer

In my environment, Rule ā€œ2ā€ never will be verified, after a Machine was successfully authenticated.

So, no user-authentication will ever happen.

For that reason, I switched the order of rule 1 and 2 and afterwards, all variations could be verified and authenticated.

 

Thanks all for your assistance.

View solution in original post

16 REPLIES 16

StephanH
Valued Contributor III

Hello SDR, hello Mig,

I'm a little confused. What are you trying to implement SDR? Based on your ruleset, I assumed you were using the procedure described here:

https://extremeportal.force.com/ExtrArticleDetail?an=000080814&q=nuc%20802.1x%20ldap%20user%20&_ga=2...

Regards Stephan

Miguel-Angel_RO
Valued Contributor II

Hi SDR,

Looking at those screens I see:

  1. From the rules: ā€œMachine and User Authā€ is expecting ā€œEnd-Systems Groups AD machinesā€
  2. From the evaluation tool: ā€œTh Host ...doesnā€™t have LDAP attributes..in this inclusive LDAP Host Group End-Systems Groups AD machinesā€

Looking at the the description of the workflows and scripts from Zdenek we see:

"Add MAC to Domain Computers" is executed when the computer authenticates. The MAC address is added to End-System and the timestamp is created (updated). Consequent User authentication can be combined with the condition of the End-System group. "Clear old End-Systems in the group" checks if the timestamp is older than X hours and old End-Systems are deleted from the group.

From the script description, it means that the HOST (read ā€œEnd-Systemā€) is to be looked into a group of MAC adresses while you defined and LDAP group in the rule for the statement ā€œEnd-System is inā€.

To make it shorter, youā€™ll store (for a defined period of time) all the MAC addresses from the AD computers (having been authenticated) in a group and check if the authenticating user is with a computer having his MAC in this group.

I know that the way this script works is not very intuitive (looking for a MAC to see if a computer belongs to an AD domain) but there are some technical constrains on the authentication steps that implies this solution.

Mig

StephanH
Valued Contributor III

Hello SDR,

your maschine is matching IS NOT in End-System Groups AD machine

and is not matching IS in End-System Groups AD machine

=> Are you 100% sure that the maschine is in the expacted AD group?

Thatā€™s why I ask if you can see if the client is in the group (with the LDAP test tool)

 

 

Regards Stephan

SDR
New Contributor III

See below - as we are still testing, we did not focus on the ā€œactionsā€ (profiles)

d3f2935d00954a8c976cccd2558c297d_77005e7a-6928-4d60-970f-7b384744220f.jpg

 

SDR
New Contributor III

We already did and to my understanding, the tests were sucessfull. 

GTM-P2G8KFN