I'm currently struggling to get the new 'DynamicAutorization:SessionAction' API call working for me. I would like to pass a client MAC to the API to bounce the given MAC on it's current connected ArubaOS switch port.
In the ClearPass API explorer and 6.9.2 release notes i found following:
The following new features are introduced in ClearPass Policy Manager APIs in the 6.9.2 release:
* A new SessionAction API adds support for performing disconnect or reauthorize actions on active sessions. It includes synchronous or asynchronous action, and enhanced filters for flexibility and improved user experience. The SessionAction API directly handles both disconnect and change of authorization (CoA) actions for endpoints by either MAC address, username, or Framed-IP-Address. This API is available at Guest > Administration > API Explorer > DynamicAuthorization > SessionAction. (CP‑21159, CP‑38971, CP‑31127, CP‑38972)
Source: https://www.arubanetworks.com/techdocs/ClearPass/CP_ReleaseNotes_6.9.2/Content/WhatsNew/NewFeatures_APIs.htm
I'm currently running 6.9.2 on a 8-node cluster and when trying this API call from the API explorer:
POST /session-action/coa/mac/{mac_address}
{
"enforcement_profile": ["[ArubaOS Switching - Bounce Switch Port]"]
}
https://X.X.X.X:443/api/session-action/coa/mac/1234567890ab?async=false
it results in:
Response Body:
{
"action_id": "async_action_1602743463404",
"status": "failed",
"count": 1,
"count_success": 0,
"count_failed": 0,
"count_queue": 0,
"_links": {
"self": {
"href": "https://X.X.X.X/api/session-action/coa%2Fmac%2F0123456789ab"
}
}
}
and no COA is triggerd. A COA triggerd from the Access Tracker for the given client just works perfect (MAC is obfuscated).
Same when using this one:
POST /session-action/disconnect/mac/{mac_address}
Is 'Post-Authv2' required for the new API calls? Big thanks in advance.