Forum Discussion
Multiple AAA authetication groups to TACACS
- May 25, 2014
You need to use remote role with your TACACS+ server. Essentially this involves setting up remote roles and eliminating local user accounts. There have been several threads lately about remote authentication via TACACS+ lately. Here's one:
https://devcentral.f5.com/questions/how-to-configure-tacacs-on-cisco-acs-53-for-authenticate-administrative-users-on-ltm-1120
Also, here is some info regarding remote role:
http://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/tmos-implementations-11-1-0/16.html
You need to use remote role with your TACACS+ server. Essentially this involves setting up remote roles and eliminating local user accounts. There have been several threads lately about remote authentication via TACACS+ lately. Here's one:
https://devcentral.f5.com/questions/how-to-configure-tacacs-on-cisco-acs-53-for-authenticate-administrative-users-on-ltm-1120
Also, here is some info regarding remote role:
http://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/tmos-implementations-11-1-0/16.html
- getnyce_157084May 27, 2014NimbostratusCory, The F5 configuration seems straight forward. Unfortunately is the ACS side of things i'm struggling with. I'm running 5.3 ACS, can you point me to any doc's that show me step by step out to configure the ACS side of the house for remote role. I have been searching the net but I seem to find only 4.2 docs.
- Cory_50405May 27, 2014NoctilucentThe first link in my comment contains some screenshots of ACS 5.3. I don't know of any walk-through documents, but the process is involves creating a shell profile where you set the custom attribute that you defined on the remote role configuration. Then you would apply that shell profile to an ACS user group (Access Policies > Access Services > Default Device Admin > Authorization, then click on the group to modify. Towards the bottom, there'll be a field to specify a shell profile).
- getnyce_157084Jun 09, 2014NimbostratusThis has been tough for me to get configured. I have it configured appropriately in f5. However in ACS I'm having a tough time. TACACS is using an External AD group to do the authentication. The authorization policy that is correctly allowing me into the F5 is working. However when i add the F5 attribute ot the shell profile associated with the authorization policy it isn't making me an admit. I have read alot on here about the role map name matching the group name verbatim on the ACS. But the ACS does't have a group, it's just using AD.
- Cory_50405Jun 09, 2014NoctilucentOur ACS server also uses AD on the back end, but from the perspective of getting auth working between BIG-IP and ACS, it's not relevant. As long as the authorization policy you build correctly links the desired identity group with the appropriate network device name/group and applies the shell profile you created, then it should work. Are you seeing passed or failed log entries within ACS?
- getnyce_157084Jun 09, 2014NimbostratusI definitely see the correct Authorization policy get used because every time I try I see the hit count of the policy increment. But its just a catch-all that matches anything and allows you access as long as you are parent of the external AD group "net" . We don't specify a specific identity group.
- Cory_50405Jun 09, 2014NoctilucentYou may not need to reference any identity groups. Your authorization policy can just reference your BIG-IP hostnames (compound condition) and you should be able to apply the shell profile based on that.
- getnyce_157084Jun 09, 2014NimbostratusI'm sorry, I feel really dumb cause I feel as if I should picking this up. The only thing defined in my authorization policy is the policy name under the column name. that the external groups under AD1:ExternalGroups which has the "contain any (companyname/user/net). When I click on that policy I then have my Shell profile "NET_ACCESS" that has my costume attributes. I dont konw where I would put the BIGIP hostnames
- Cory_50405Jun 09, 2014NoctilucentThe more I think about this, identity groups are going to be needed. The remote role name is going to need an identity group name to match against. You may need to create at least one identity group to get this to work.
- getnyce_157084Jun 09, 2014NimbostratusYou conculsion matches up with many others online how have run into this issue. name of the remote role map must match the identity group, how ever it seem that in ACS 5.4 you no longer need identity group. http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-4/migration/guide/migration_guide/Migration_Configure.htmlwp1053328 From what I have read on that site I would only use the identity group. If i'm read this cisco doc correctly I would need to add usesr to the identity group which in my perspective defeats the external group from AD.
- Cory_50405Jun 09, 2014NoctilucentYou may be able to create just one identity group and specify all users, but then everyone would have access to your BIG-IP appliances. You're the first I've heard of using ACS 5.4+. We're going to be testing out ACS 5.5 in the coming weeks. Maybe I'll get a chance to test this out myself in the near future. Would authenticating directly to AD from your BIG-IP be an option?
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com