cancel
Showing results for 
Search instead for 
Did you mean: 

Extreme Control Machine + User authentication fails

Extreme Control Machine + User authentication fails

SDR
New Contributor III


Hi,

This Topic is a a follow up to


 

Although, I hopefully configured everything as advised and discussed in above thread,   

Machine + User authentication fails. (Machine auth ONLY works fine, now!)

Below is a screenshot of  the EvaluationTool result:

 

9b635a8e5ebc40f6a8c66126253d4e30_70302b0d-5609-4778-b310-606ec3098b0f.jpg

 

I don´t see the mistake….

1 ACCEPTED SOLUTION

SDR
New Contributor III

Dear all,

today customer tested the solution/correction and it worked.

Below my solution/explanation:

In an earlier mentioned documentation (https://extremeportal.force.com/ExtrArticleDetail?an=000080814)  I primarily followed it was advised to use “cn” as Host Search Attibute (within the LDAP-configuration of “Domain users”

At least in my environment, this did not work (as shown in above screenshots). The solution was to use “dNSHostName” as Host Search Attibute (which is the default).

Changing this, the configuration worked. Machine AND User-Authentication are passed successfull.

Unfortunately, this solution is already described in https://extremeportal.force.com/ExtrArticleDetail?an=000082479 which I found during my troubleshooting.

 

In addition to this modification of the solution, I changed the advised order of the Rules.

Instead of 

  1. Authenticate and authorise a machine
  2. Authenticate and authorise a machine as a valid domain computer with a valid domain user logged in
  3. Deny a valid user who is on a non-domain (BYOD) computer

In my environment, Rule “2” never will be verified, after a Machine was successfully authenticated.

So, no user-authentication will ever happen.

For that reason, I switched the order of rule 1 and 2 and afterwards, all variations could be verified and authenticated.

 

Thanks all for your assistance.

View solution in original post

16 REPLIES 16

StephanH
Valued Contributor III

Hello SDR, hello Mig,

I'm a little confused. What are you trying to implement SDR? Based on your ruleset, I assumed you were using the procedure described here:

https://extremeportal.force.com/ExtrArticleDetail?an=000080814&q=nuc%20802.1x%20ldap%20user%20&_ga=2...

Regards Stephan

Miguel-Angel_RO
Valued Contributor II

Hi SDR,

Looking at those screens I see:

  1. From the rules: “Machine and User Auth” is expecting “End-Systems Groups AD machines”
  2. From the evaluation tool: “Th Host ...doesn’t have LDAP attributes..in this inclusive LDAP Host Group End-Systems Groups AD machines”

Looking at the the description of the workflows and scripts from Zdenek we see:

"Add MAC to Domain Computers" is executed when the computer authenticates. The MAC address is added to End-System and the timestamp is created (updated). Consequent User authentication can be combined with the condition of the End-System group. "Clear old End-Systems in the group" checks if the timestamp is older than X hours and old End-Systems are deleted from the group.

From the script description, it means that the HOST (read “End-System”) is to be looked into a group of MAC adresses while you defined and LDAP group in the rule for the statement “End-System is in”.

To make it shorter, you’ll store (for a defined period of time) all the MAC addresses from the AD computers (having been authenticated) in a group and check if the authenticating user is with a computer having his MAC in this group.

I know that the way this script works is not very intuitive (looking for a MAC to see if a computer belongs to an AD domain) but there are some technical constrains on the authentication steps that implies this solution.

Mig

StephanH
Valued Contributor III

Hello SDR,

your maschine is matching IS NOT in End-System Groups AD machine

and is not matching IS in End-System Groups AD machine

=> Are you 100% sure that the maschine is in the expacted AD group?

That’s why I ask if you can see if the client is in the group (with the LDAP test tool)

 

 

Regards Stephan

SDR
New Contributor III

See below - as we are still testing, we did not focus on the “actions” (profiles)

d3f2935d00954a8c976cccd2558c297d_77005e7a-6928-4d60-970f-7b384744220f.jpg

 

SDR
New Contributor III

We already did and to my understanding, the tests were sucessfull. 

GTM-P2G8KFN