11-10-2014 08:02 AM
I am looking to configure one of my SSIDs to use AD as an authentication platform. This will be to provide internal guest access to the internet only (won't allow access to internal resources).
I have configure an SSID to permit access using the internal database (for guests), but was hoping to allow the new SSID to use domain credentials to allow access for internal users.
Does anyone have a configuration document to show how this can be achieved? Is there anything that I need to check / do to AD DS to allow authentication (apart from provide an "admin" account with read permissions)?
Can anyone let me know the maximum number of user accounts within CPPM (Version 6.3.5)
TIA for any assistance / pitfalls that you may be able to help me with
11-10-2014 08:07 AM
Yes, you'll need an AD account in the standard Domain Users group. Create an AD authentication source and define that account. Then add that authentication source to your web login service.
You can then use AD attributes in your role mapping and/or enforcement policy.
11-18-2014 01:24 AM
Does the AD account specified in the config require elevated permissions?
I have tried to connect but this is failing my credentials.
I am going to work with our server team to see if they can find anything in the logs.
Is there a guide on how to configure AD as an authentication source?
11-18-2014 04:03 AM
When you get the error in the captive portal, what shows up in access tracker?