Home > Cisco > Control System > Cisco Acs 57 User Guide

Cisco Acs 57 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Acs 57 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 584
    							6   
    Managing Users and Identity Stores
    Managing External Identity Stores
    Dial-In Support Attributes
    The user attributes on Active Directory are supported on the following servers:
    Windows Server 2003
    Windows Server 2003 R2
    Windows Server 2008
    Windows Server 2008 R2
    Windows Server 2012
    Windows Server 2012 R2
    ACS does not support Dial-in users on Windows 2000.
    ACS Response
    If you enable the dial-in check on ACS Active Directory and the user's dial-in option is 'Deny Access' on Active Directory, the 
    authentication request is rejected with a message in the log, indicating that dial-in access is denied. If a user fails an MSCHAP 
    v1/v2 authentication if the dial-in is not enabled, ACS should set on the EAP response a proper error code (NT error = 649).
    In case that the callback options are enabled, the ACS RADIUS response contains the returned Service Type and Callback 
    Number attributes as follows:
    If callback option is Set by Caller or Always Callback To, the service-type attribute should be queried on Active Directory 
    during the user authentication. The service-type can be the following:
    —3 = Callback Login
    —4 = Callback Framed
    —9 = Callback NAS Prompt
    This attribute should be returned to the device on Service-type RADIUS attribute. If ACS is already configured to return 
    service-type attribute on the RADIUS response, the service-type value queried for the user on Active Directory replaces it.
    If the Callback option is Always Callback To, the callback number should also be queried on the Active Directory user. This 
    value is set on the RADIUS response on the Cisco-AV-Pair attribute with the following values:
    —cisco-av-pair=lcp:callback-dialstring=[callback number value]
    —cisco-av-pair=Shell:callback-dialstring=[callback number value]
    —cisco-av-pair=Slip:callback-dialstring=[callback number value]
    —cisco-av-pair=Arap:callback-dialstring=[callback number value]
    The callback number value is also returned on the RADIUS response, using the RADIUS attribute CallbackNumber (#19).
    If callback option is Set by Caller, the RADIUS response contains the following attributes with no value:
    —cisco-av-pair=lcp:callback-dialstring=
    —cisco-av-pair=Shell:callback-dialstring=
    —cisco-av-pair=Slip:callback-dialstring=
    —cisco-av-pair=Arap:callback-dialstring= 
    						
    							6
    Managing Users and Identity Stores
     
    Managing External Identity Stores
    Joining ACS to an AD Domain
    In ACS 5.7, you can join the ACS nodes from same deployment to different AD domains. However, each node can be joined to 
    a single AD domain. The policy definitions of those ACS nodes are not changed and that uses the same AD identity store. 
    For information on how to configure an AD identity store, see Configuring an AD Identity Store, page 62. 
    Note: The Windows AD account, which joins ACS to the AD domain, can be placed in its own organizational unit (OU). It resides 
    in its own OU either when the account is created or later on, with a restriction that the appliance name must match the name of 
    the AD account. 
    Note: ACS does not support user authentication in AD when a user name is supplied with an alternative UPN suffix configured 
    in OU level. The authentication works fine if the UPN suffix is configured in domain level. 
    Related Topics
    Machine Authentication, page 31
    Configuring an AD Identity Store
    The AD settings are not displayed by default, and they are not joined to an AD domain when you first install ACS. When you 
    open the AD configuration page, you can see the list of all ACS nodes in the distributed deployment. 
    When you configure an AD identity store, ACS also creates the following:
    A new dictionary for that store with two attributes: the ExternalGroup attribute and another attribute for any attribute that is 
    retrieved from the Directory Attributes page.
    A new attribute, IdentityAccessRestricted. You can manually create a custom condition for this attribute.
    A custom condition for group mapping from the ExternalGroup attribute—the custom condition name is 
    AD1:ExternalGroups—and another custom condition for each attribute that is selected in the Directory Attributes page (for 
    example, AD1:cn).
    You can edit the predefined condition name, and you can create a custom condition from the Custom condition page. See 
    Creating, Duplicating, and Editing a Custom Session Condition, page 5.
    Note: When you upgrade ACS to ACS 5.7 version using the Reimaging and Upgrading an ACS Server method, if you restore a 
    configuration in which the AD is defined, you need to join ACS manually to the AD domain. See Installation and Upgrade Guide 
    for Cisco Secure Access Control System for more information on upgrade methods. 
    Note: When you upgrade ACS to ACS 5.7 using the Upgrading an ACS Server Using Application Upgrade Bundle method, if you 
    have ACS joined to AD already, ACS remains connected to AD after the application upgrade.
    To authenticate users and join ACS with an AD domain:
    1.Choose Users and Identity Stores > External Identity Stores > Active Directory.
    The Active Directory page appears.
    The AD configuration page acts as a central AD management tool for all ACS nodes. You can perform the join and test 
    connection operations against a single ACS node or multiple ACS nodes on this page. You can also view the join results of 
    all ACS nodes in the deployment at a single glance. 
    2.Modify the fields in the General tab as described in Table 50 on page 63. 
    						
    							6   
    Managing Users and Identity Stores
    Managing External Identity Stores
    3.Click:
    Save Changes to save the configuration.
    Discard Changes to discard all changes.
    If AD is already configured and you want to delete it, click Clear Configuration after you verify the following: 
    —There are no policy rules that use custom conditions based on the AD dictionary.
    —The AD is not chosen as the identity source in any of the available access services.
    —There are no identity store sequences with the AD.
    The Active Directory configuration is saved. The Active Directory page appears with the new configuration.
    Note: The Centrify configuration is affected (and sometimes gets disconnected) when there is a slow response from the server 
    while you test the ACS connection with the AD domain. However the configuration works fine with the other applications. 
    Note: Due to NETBIOS limitations, ACS hostnames must contain less than or equal to 15 characters. 
    Joining Nodes to an AD Domain 
    To join a single node or multiple nodes to an AD Domain, complete the following steps:
    1.Choose Users and Identity Stores > External Identity Stores > Active Directory. 
    The Active Directory page appears.
    Table 50 Active Directory: General Page
    Option Description
    Connection Details
    Join/Test Connection Click to join or test the ACS connection with the AD domain for the given user, domain, and 
    password entered. See Joining Nodes to an AD Domain, page 63.
    Leave Click to disconnect a single node or multiple nodes from the AD domain for the given user, 
    domain, and password entered. See Disconnecting Nodes from the AD Domain, page 64
    End User Authentication Settings
    Enable password change Click to allow the password to be changed.
    Enable machine 
    authenticationClick to allow machine authentication.
    Enable dial-in check Click to examine the user’s dial-in permissions during authentication or query. The result of 
    the check can cause a reject of the authentication in case the dial-in permission is denied.
    The result is not stored on the AD dictionary.
    Enable callback check for 
    dial-in clientsClick to examine the user’s callback option during authentication or query. The result of the 
    check is returned to the device on the RADIUS response. 
    The result is not stored on the AD dictionary.
    Connectivity Status
    Joined to Domain (Display only.) Displays the domain name with which ACS is joined. 
    Connectivity Status (Display only.) Displays the connection status of the domain name with which ACS is joined.  
    						
    							6
    Managing Users and Identity Stores
     
    Managing External Identity Stores
    2.Select a single node or multiple nodes and click Join/Test Connection.
    The Join/Test Connection page appears.
    3.Complete the fields in the Join/Test Connection page as described in Table 51 on page 64.
    4.Click:
    Join to join the selected nodes to the AD domain. The status of the nodes are changed according to the join results. 
    Test Connection to test the connection to ensure that the entered credentials are correct and the AD domain is reachable. 
    A message appears informing you whether the AD server is routable within the network and also authenticating the given 
    AD username and password. The Test Connection results are displayed in a separate dialog box as a table. 
    Cancel to cancel the connection. 
    Disconnecting Nodes from the AD Domain 
    To disconnect a single node or multiple nodes from an AD Domain, complete the following steps:
    1.Choose Users and Identity Stores > External Identity Stores > Active Directory.
    The Active Directory page appears.
    2.Select a single node or multiple nodes and click Leave.
    The Leave Connection page appears.
    3.Complete the fields in the Leave Connection page as described in Table 52 on page 65
    Table 51 Join/Test Connection Page
    Option Description
    Active Directory Domain 
    NameName of the AD domain to which you want to join ACS.
    Username Enter the username of a predefined AD user. An AD account which is required for the domain 
    access in ACS, should have either of the following:
    Add workstations to the domain user in the corresponding domain.
    Create Computer Objects or Delete Computer Objects permission on corresponding 
    computers container where ACS machine's account is precreated (created before joining 
    ACS machine to the domain).
    Cisco recommends that you disable the lockout policy for the ACS account and configure the 
    AD infrastructure to send alerts to the administrator if a wrong password is used for that 
    account. This is because, if you enter a wrong password, ACS will not create or modify its 
    machine account when it is necessary and therefore possibly deny all authentications.
    Password Enter the user password. The password should have a minimum of 8 characters, using a 
    combination of at least one lower case letter, one upper case letter, one numeral, and one 
    special character. All special characters are supported.  
    						
    							6   
    Managing Users and Identity Stores
    Managing External Identity Stores
    4.Click:
    Leave to disconnect the selected nodes from AD domain. 
    Cancel to cancel the operation. 
    Note: Administrators can perform operations like join, leave, or test connection from the secondary server. When you perform 
    these operations from the secondary server, it affects only the secondary server. 
    Related Topics
    Selecting an AD Group, page 65
    Configuring AD Attributes, page 66
    Configuring Machine Access Restrictions, page 68
    Selecting an AD Group
    Use this page to select groups that can then be available for policy conditions.
    Note: To select groups and attributes from an AD, ACS must be connected to that AD.
    1.Choose Users and Identity Stores > External Identity Stores > Active Directory, then click the Directory Groups tab.
    The Groups page appears. The Selected Directory Groups field lists the AD groups you selected and saved. The AD groups 
    you selected in the External User Groups page are listed and can be available as options in group mapping conditions in 
    rule tables.
    Table 52 Leave Connection Page
    Option Description
    Username Enter the username of a predefined AD user. An AD account which is required for the domain 
    access in ACS, should have either of the following:
    Add workstations to the domain user in the corresponding domain.
    Create Computer Objects or Delete Computer Objects permission on corresponding 
    computers container where ACS machine's account is precreated (created before joining 
    ACS machine to the domain).
    Cisco recommends that you disable the lockout policy for the ACS account and configure the 
    AD infrastructure to send alerts to the administrator if a wrong password is used for that 
    account. This is because, if you enter a wrong password, ACS will not create or modify its 
    machine account when it is necessary and therefore possibly deny all authentications.
    Password Enter the user password.
    Do not try to remove 
    machine accountCheck this check box to disconnect the selected nodes from the AD domain, when you do not 
    know the credentials or have any DNS issues. 
    This operation disconnects the node from the AD domain and leaves an entry for this node in 
    the database. Only administrators can remove this node entry from the database.  
    						
    							6
    Managing Users and Identity Stores
     
    Managing External Identity Stores
    If you have more groups in other trusted domains or forests that are not displayed, you can use the search filter to narrow 
    down your search results. You can also add a new AD group using the Add button.
    Note: ACS 5.7 does not retrieve domain local groups. It is not recommended to use domain local groups in ACS policies. 
    The reason is that the membership evaluation in domain local groups can be time consuming. So, by default, the domain 
    local groups are not evaluated.
    2.Click Select to see the available AD groups on the domain (and other trusted domains in the same forest).
    The External User Groups dialog box appears displaying a list of AD groups in the domain, as well as other trusted domains 
    in the same forest.
    If you have more groups that are not displayed, use the search filter to refine your search and click Go.
    3.Enter the AD groups or select them from the list, then click OK.
    To remove an AD group from the list, click an AD group, then click Deselect. 
    4.Click:
    Save Changes to save the configuration.
    Discard Changes to discard all changes.
    If AD is already configured and you want to delete it, click Clear Configuration after you verify that there are no policy rules 
    that use custom conditions based on the AD dictionary. 
    Note: When configuring the AD Identity Store on ACS 5.x, the security groups defined on Active Directory are enumerated and 
    can be used, but distribution groups are not shown. Active Directory Distribution groups are not security-enabled and can only 
    be used with e-mail applications to send e-mail to collections of users. Please refer to Microsoft documentation for more 
    information on distribution groups.
    Note: Logon authentication may fail on Active Directory when ACS tries to authenticate users who belong to more than 1015 
    groups in external identity stores. This is due to the Local Security Authentication (LSA) limitations in Active Directory.
    Configuring AD Attributes
    Use this page to select attributes that can then be available for policy conditions. 
    1.Choose Users and Identity Stores > External Identity Stores > Active Directory, then click the Directory Attributes tab. 
    2.Complete the fields in the Active Directory: Attributes page as described in Table 53 on page 67: 
    						
    							6   
    Managing Users and Identity Stores
    Managing External Identity Stores
    Table 53 Active Directory: Attributes Page
    Option Description
    Name of example Subject to 
    Select AttributesEnter the name of a user or computer found on the joined domain. You can enter the user’s or 
    the computer’s CN or distinguished name.
    The set of attributes that are displayed belong to the subject that you specify. The set of 
    attributes are different for a user and a computer.
    Select Click to access the Attributes secondary window, which displays the attributes of the name 
    you entered in the previous field. 
    Attribute Name List—Displays the attributes you have selected in the secondary Selected Attributes window. You can select 
    multiple attributes together and submit them. 
    Attribute NameDo one of the following:
    —Enter the name of the attribute.
    —You can also select an attribute from the list, then click Edit to edit the attribute.
    Click Add to add an attribute to the Attribute Name list.
    Type Attribute types associated with the attribute names. Valid options are:
    String
    Integer 64
    IP Address—This can be either an IPv4 or IPv6 address.
    Unsigned Integer 32
    Boolean
    Default Specified attribute default value for the selected attribute:
    String—Name of the attribute.
    Integer 64—0
    Unsigned Integer 64—0.
    IP Address—No default set.
    Boolean—No default set.
    Policy Condition Name Enter the custom condition name for this attribute. For example, if the custom condition name 
    is AAA, enter AAA in this field and not AD1:att_name.
    Select Attributes Secondary 
    WindowAvailable from the Attributes secondary window only.
    Search Filter Specify a user or machine name. 
    For user names, you can specify distinguished name, SAM, NetBios, or UPN format. 
    For machine names, you can specify one of the following formats: MACHINE$, 
    NETBiosDomain\MACHINE$, host/MACHINE, or host/machine.domain. You can specify 
    non-English letters for user and machine names.  
    						
    							6
    Managing Users and Identity Stores
     
    Managing External Identity Stores
    3.Do one of the following:
    Click Save Changes to save the configuration.
    Click Discard Changes to discard all changes.
    If AD is already configured and you want to delete it, click Clear Configuration after you verify that there are no policy rules 
    that use custom conditions based on the AD dictionary. 
    Configuring Machine Access Restrictions
    To configure the Machine Access Restrictions, complete the following steps:
    1.Choose Users and Identity Stores > External Identity Stores > Active Directory, then click the Machine Access 
    Restrictions tab.
    2.Complete the fields in the Active Directory: Machine Access Restrictions page as described in Table 54 on page 68.
    3.Do one of the following:
    Click Save Changes to save the configuration. Attribute Name The name of an attribute of the user or machine name you entered in the previous field.
    Attribute Type The type of attribute.
    Attribute Value The value of an attribute for the specified user or machine.
    Table 54 Active Directory: Machine Access Restrictions Page
    Option Description
    Enable Machine Access 
    RestrictionsCheck this check box to enable the Machine Access Restrictions controls in the web interface. 
    This ensures that the machine authentication results are tied to user authentication and 
    authorization. If you enable this feature, you must set the Aging time. 
    Aging time (hours) Time after a machine was authenticated that a user can be authenticated from that machine. 
    If this time elapses, user authentication fails. The default value is 6 hours. The valid range is 
    from 1 to 8760 hours.
    MAR Cache Distribution
    Cache entry replication 
    timeoutEnter the time in seconds after which the cache entry replication gets timed out. The default 
    value is 5 seconds. The valid range is from 1 to 10. 
    Cache entry replication 
    attemptsEnter the number of times ACS has to perform MAR cache entry replication. The default value 
    is 2. The valid range is from 0 to 5.
    Cache entry query timeout  Enter the time in seconds after which the cache entry query gets timed out. The default value 
    is 2 seconds. The valid range is from 1 to 10. 
    Cache entry query attempts Enter the number of times that ACS has to perform the cache entry query. The default value 
    is 1. The valid range is from 0 to 5.
    Node Lists all the nodes that are connected to this AD domain. 
    Cache Distribution Group Enter the Cache Distribution Group of the selected node. This accepts any text string to a 
    maximum of 64 characters. The Cache Distribution Group does not allow the special 
    characters “(” and “)”.
    Table 53 Active Directory: Attributes Page (continued)
    Option Description 
    						
    							6   
    Managing Users and Identity Stores
    Managing External Identity Stores
    Click Discard Changes to discard all changes.
    If AD is already configured and you want to delete it, click Clear Configuration after you verify that there are no policy rules 
    that use custom conditions based on the AD dictionary. 
    AD Deployment with Users Belonging to Large Number of Groups
    In ACS, when you move between AD domains, the user authentications show a timeout error if the user belongs to a large 
    number of groups (more than 50 groups). But, the subsequent authentication of the same user or another user belongs to the 
    same group works properly. This is due to the adclient.get.builtin.membership parameter in ACS AD agent configuration. This 
    parameter, when set as true, performs a lot of additional requests and takes a lot of time for the users who belong to large 
    number of groups. You can observe that the AD built-in groups are not available for usage in ACS policies after the 
    adclient.get.builin.membership parameter is set as true. So, to overcome this issue, you should set the 
    adclient.get.builtin.membership parameter as false. 
    To  s e t  adclient.get.builin.membership parameter, perform the following steps in ACS CLI:
    1.Log in to ACS CLI in configuration mode.
    2.Enter the following commands: 
    acs-config
    ad-agent-configuration adclient.get. builtin.membership false {local/distribute}
    Note: The first authentication of a user belongs to the large number of groups may fail with a timeout error. But, the subsequent 
    authentications of the same user or another user belongs to the same group works properly. 
    Joining ACS to Domain Controllers
    When ACS needs to connect to a domain controller or a global catalog, it sends SRV requests to the configured DNS servers 
    to find out the available list of domain controllers for a domain and the global catalogs for a forest. 
    If the Active Directory configuration on ACS machine is assigned to a subnet, which in turn is assigned to a site, then ACS sends 
    the DNS queries scoped to the site. That is the DNS server is supposed to return the domain controllers and the global catalogs 
    serving that particular site to which the subnet is assigned to. 
    If the ACS machine is not assigned to a site, then ACS does not send the DNS queries scoped to the site. That is the DNS server 
    is supposed to return all available domain controllers and global catalogs with no regard to the sites. 
    ACS iterates the available list of domain controllers or global catalogs and tries to establish the connection according to the 
    order of the domain controllers or the global catalogs in the DNS response received from the DNS server. 
    RSA SecurID Server
    ACS supports the RSA SecurID server as an external database. RSA SecurID two-factor authentication consists of the user’s 
    personal identification number (PIN) and an individually registered RSA SecurID token that generates single-use token codes 
    based on a time code algorithm. 
    A different token code is generated at fixed intervals (usually each at 30 or 60 seconds). The RSA SecurID server validates this 
    dynamic authentication code. Each RSA SecurID token is unique, and it is not possible to predict the value of a future token 
    based on past tokens. 
    Thus when a correct token code is supplied together with a PIN, there is a high degree of certainty that the person is a valid 
    user. Therefore, RSA SecurID servers provide a more reliable authentication mechanism than conventional reusable passwords.
    You can integrate with RSA SecurID authentication technology in any one of the following ways: 
    						
    							7
    Managing Users and Identity Stores
     
    Managing External Identity Stores
    Using the RSA SecurID agent—Users are authenticated with username and passcode through the RSA’s native protocol.
    Using the RADIUS protocol—Users are authenticated with username and passcode through the RADIUS protocol.
    RSA SecurID token server in ACS 5.7 integrates with the RSA SecurID authentication technology by using the RSA SecurID 
    Agent.
    Configuring RSA SecurID Agents
    The RSA SecurID Server administrator can do the following:
    Create an Agent Record (sdconf.rec), page 70
    Reset the Node Secret (SecurID), page 70
    Override Automatic Load Balancing, page 70
    Manually Intervene to Remove a Down RSA SecurID Server, page 70
    Passcode Caching, page 70
    Create an Agent Record (sdconf.rec)
    To configure an RSA SecurID token server in ACS 5.7, the ACS administrator requires the sdconf.rec file. The sdconf.rec file is 
    a configuration record file that specifies how the RSA agent communicates with the RSA SecurID server realm. 
    In order to create the sdconf.rec file, the RSA SecurID server administrator should add the ACS host as an Agent host on the 
    RSA SecurID server and generate a configuration file for this agent host.
    Note: The sdconf.rec file is unique in a deployment. However, Cisco Secure ACS replicates the sdconf.rec file from the primary 
    server to the secondary server while joining the secondary server with the primary server.
    Reset the Node Secret (SecurID)
    After the agent initially communicates with the RSA SecurID server, the server provides the agent with a node secret file called 
    SecurID. Subsequent communication between the server and the agent relies on exchanging the node secret to verify the 
    other’s authenticity. 
    At times, you might have to reset the node secret. To reset the node secret:
    The RSA SecurID server administrator must uncheck the Node Secret Created check box on the Agent Host record in the 
    RSA SecurID server.
    The ACS administrator must remove the SecurID file from ACS.
    Override Automatic Load Balancing
    RSA SecurID Agent automatically balances the requested loads on the RSA SecurID servers in the realm. However, you do have 
    the option to manually balance the load. You can specify which server each of the agent hosts must use and assign a priority to 
    each server so that the agent host directs authentication requests to some servers more frequently than others. 
    You must specify the priority settings in a text file and save it as sdopts.rec, which you can then upload to ACS.
    Manually Intervene to Remove a Down RSA SecurID Server
    When an RSA SecurID server is down, the automatic exclusion mechanism does not always work quickly. To speed up this 
    process, you can remove the sdstatus.12 file from ACS.
    Passcode Caching
    Passcode caching enables the user to perform more than one authentication with an RSA SecurID server using the same 
    passcode. 
    						
    All Cisco manuals Comments (0)