我正在尝试使用 ASDM 为 Cisco ASA 5585 8.2(5) 版上的特定安全组设置 Microsoft LDAP 身份验证,仅适用于 SSH。查找和身份验证正在工作,但是无论安全组成员身份如何,所有用户都经过身份验证。
AAA 配置:
aaa-server LDAP_mybusinessda (web) host 10.100.21.6
server-port 636
ldap-base-dn OU=Staff Users,OU=mybusiness,DC=mybusinessda,DC=org
ldap-naming-attribute sAMAccountName
ldap-login-password *****
ldap-login-dn CN=LDAPLookup,CN=Users,DC=mybusinessda,DC=org
ldap-over-ssl enable
ldap-attribute-map LDAP_memberOf_ServiceType
aaa authentication enable console LDAP_mybusinessda LOCAL
aaa authentication ssh console LDAP_mybusinessda LOCAL
ldap attribute-map LDAP_memberOf_ServiceType
map-name memberOf IETF-Radius-Service-Type
map-value memberOf CN=CiscoASAManagement,OU=Security,OU=Groups,OU=mybusiness,DC=mybusinessda,DC=org 6
当我与作为组成员的用户连接时,LDAP 调试显示(仅粘贴相关部分:
[3185] Creating LDAP context with uri=ldaps://10.100.21.6:636
[3185] Connect to LDAP server: ldaps://10.100.21.6:636, status = Successful
[3185] supportedLDAPVersion: value = 3
[3185] supportedLDAPVersion: value = 2
[3185] Binding as LDAPLookup
[3185] Performing Simple authentication for LDAPLookup to 10.100.21.6
[3185] LDAP Search:
Base DN = [OU=Staff Users,OU=mybusiness,DC=mybusinessda,DC=org]
Filter = [sAMAccountName=test_allowed_user]
Scope = [ONE LEVEL]
[3185] User DN = [CN=TestAllowedUser,OU=Staff Users,OU=mybusiness,DC=mybusinessda,DC=org]
[3185] Talking to Active Directory server 10.100.21.6
[3185] Binding as test_allowed_user
[3185] Performing Simple authentication for test_allowed_user to 10.100.21.6
[3185] Processing LDAP response for user test_allowed_user
[3185] Message (test_allowed_user):
[3185] Authentication successful for test_allowed_user to 10.100.21.6
[3185] Retrieved User Attributes:
[3185] memberOf: value = CN=CiscoASAManagement,OU=Security,OU=Groups,OU=mybusiness,DC=mybusinessda,DC=org
[3185] mapped to IETF-Radius-Service-Type: value = 6
即使我删除了ldap-attribute-map从aaa-server,所有的用户都通过身份认证,并且调试根本不显示mapped to IETF-Radius-Service-Type。这里有什么问题?
此外,由于我的代表,我无法标记此 LDAP。不幸的。
编辑:
我最终可能会使用 RADIUS 执行此操作,因为其余的 Cisco 设备都支持 RADIUS 身份验证,并且它将统一我所有的 Cisco 设备。看来这种 LDAP 身份验证方法也可能仅适用于 VPN。