Security

last person joined: 8 hours ago 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

Python RADIUS CoA issue

This thread has been viewed 0 times
  • 1.  Python RADIUS CoA issue

    Posted Jan 29, 2019 08:45 AM

    o.k 

    Downloaded

    https://github.com/aruba/clearpass-examples-only/tree/master/atm18/disconnect-compromised-device

    onto my mac

     

    Downloaded python3 onto my macOS system
    configured ( I think) as appropriate.
    tried to run 
     
    python3 disconnect_compromised.py C8:3C:85:60:B8:8D
     
    and get
     
    So where am I supposed to see any logs for this. 
    Whats the min operator profile I need . for this to work? I'm using Super Admin at the moment
     
    Things must be working as I'm getteing past the following

    check_config(clearpass_fqdn, oauth_grant_type, oauth_client_id, oauth_client_secret, oauth_username, oauth_password)

     

    access_token = get_access_token(clearpass_fqdn, oauth_grant_type, oauth_client_id, oauth_client_secret, oauth_username, oauth_password)

     

    mac_addr = normalize_mac(raw_mac)

     

    stage.

     
    Think I'm as far as calling mark_compromised.....


  • 2.  RE: Python RADIUS CoA issue

    EMPLOYEE
    Posted Jan 30, 2019 05:24 AM

    Super Admin should provide enough rights. Logs on API access appear in the Guest module under Administration » Support » Application Log.

     

    Please note that for API calls, the authorization is managed by the (Guest) Operator Profiles (Administration » Operator Logins » Profiles) where the Super Admin is mapped (by default) to the IT Administrators Operators Profile in an Operator Login Translation Rule. 



  • 3.  RE: Python RADIUS CoA issue

    Posted Jan 30, 2019 06:34 AM

    Many thanks for the reply. Got everythnig working , was finger trouble at my end.

    Rgds

    Alex