Security

 View Only
  • 1.  Multiple "memberOf" AD Attributes

    Posted Sep 22, 2022 06:43 AM
    Hi All,

    I got a case where I need to extract out the memberOf attribute from Microsoft AD to use it as Authorization rule, but when I query the AD, this object has two memberOf's (shown two rows and every row has different value).

    When checked to AD, this object has multiple 'AD group' under the "memberOf" tab, which means it is member of two OU so-called.
    I tried to alias these two memberOf into separate rule, but only one shows up.
    I don't know how or when this memberOf show as the query return, because for example if one object only has one memberOf or none memberOf, one object to another will have different parameter ID of memberOf, right ? (or how is it exactly, not AD expert)

    When the endpoint authenticates, at the Input attribute @ Access Tracker, I can only see one of it.​

    So anyone knows how to query the exact memberOf we wanted ?

    PS: I am not in charge of the AD, and the customer's AD 99.9% won't change (or we can't change), so we need to find a way.

    (Attached some screenshots)


  • 2.  RE: Multiple "memberOf" AD Attributes

    Posted Sep 22, 2022 07:04 AM
    Hi

    It's normal that you have multiple memberOf  rows. If a user is a member of 20 groups you will have 20 of them.
    In the role mapping or enforcement you should use the condition Contains instead of Equals.
    See the attaches screenshot


    ------------------------------
    Best Regards
    Jonas Hammarbäck
    ACCX #1335, ACMP, ACDP, ACNSP, ACEP
    Aranya AB
    ------------------------------



  • 3.  RE: Multiple "memberOf" AD Attributes

    Posted Sep 22, 2022 07:30 AM
    Or even better, use AD:Group EQUALS groupname, instead of memberOf CONTAINS in your role mapping or enforcement.

    AD:Group EQUALS groupname matches if the user is member of that group.

    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your Aruba partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact Aruba TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or Aruba Networks.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 4.  RE: Multiple "memberOf" AD Attributes

    Posted Oct 16, 2022 05:09 PM
    Hi, thanks for the answer it helps me too.


  • 5.  RE: Multiple "memberOf" AD Attributes

    Posted Jan 30, 2025 06:09 AM

    Yes but what if you have multiple AD Groups and you need to match against each of them?

    this is a scenario if a client has multiple ad groups that where the result is to be the same. It's not a problem if you only match this because the role mappings policy can be set to match any, but not the enforcement policy that only can match all. So in a scanarie group selection is a problem if you want to match if a user has a certain role and is member of either of 5 possible groups.




  • 6.  RE: Multiple "memberOf" AD Attributes

    Posted Jan 30, 2025 06:53 AM

    Hello,

    no thats not correct.
    You can set the Enforcement Policy to "Select first match" or "Select all matches".
    A single enforcement policy rule will match all its conditions.
    If you want to fail through, the first rule must be configured more specific than the second rule.
    Like you do it for example with top down firewall rulesets.
    In my opinion, first match is the most common choice at the policy page.

    Possibility one:

    Select first match at role mapping.
    Create two role matching rules.
    Configure the rule to ANY matches, or to ALL if you want to combine conditions to a result.
    Rule 1
    Condition: memberof contains ADGroup1 
    Role: Employee (or whatever)

    Rule 2:
    Condition: memberof contains ADGroup2
    Role: Employee

    The user/device will get the role of the first matching rule.

    Set the enforcement policy to first match and send back the enforcement profile of your choice to the NAD, if the Role Employee matches (Regardless which of the two ADGroups the User/Device belongs to).

    Possibility 2:

    Set the Role Mapping to "Select all matches".
    Create two role matching rules.
    Configure the rule to ANY matches, or to ALL if you want to combine conditions to a result.

    Rule 1
    Condition: memberof contains ADGroup1 
    Role: Employee (or whatever)

    Rule 2:
    Condition: memberof contains ADGroup2
    Role: VIP

    A user with membership to both Groups will get two roles.
    Users with only one Group membership will get one of the two roles.

    Set the enforcement policy to first match.
    First Enforcement Policy Rule:
    Tips:Role EQUALS Employee (or whatever)
    AND Tips:Role EQUALS VIP
    Send back vlan 10, for example, using a corresponding enforcement profile.

    Second Enforcement Policy Rule:

    Tips:Role EQUALS Employee (or whatever)
    Send back vlan 20, for example, using a corresponding enforcement profile.

    Third Enforcement Policy Rule:

    Tips:Role EQUALS VIP
    Send back vlan 30, for example, using a corresponding enforcement profile.

    This are just three common options to combine role mapping conditions.
    And there are endless more.

    Just be careful with the use of "Select all matches" at enforcement policy rule table page.
    Be sure not to send back conflicting enforcement profiles, if more than one rule is matching.

    Have fun!



    ------------------------------
    Best regards, mom
    ------------------------------