- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- « Previous
-
- 1
- 2
- Next »
Re: TACACS on Clear Pass -Authentication privilege level mismatch
04-30-2019 09:42 AM
Hi alexsuoy,
Its probably not the right thread, but I didn't have any issues with having a $ in the end of the username.
I could also only find permitted characters for user/pass when binding clearpass to AD. I was not able to find anything obvious that involved LDAP authorizaiton with AD.
I was able to perform a manual ldap query in the AD server, this worked as expected. I could also see the memberOf info.
I have also included TACACS Policy Manager authorization info for the same user account.
You may want to check the LDAP servers to ensure they have the correct data and are syncing. Not sure if you are defining them as FQDN / IP / or domain in the address section for the LDAP server.
I would also recommend try a manual query.
Auth Server => Attributes => "Select" Authentication => "Select" Attributes "tab" => Enter Username.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Alert a Moderator
Re: TACACS on Clear Pass -Authentication privilege level mismatch
05-01-2019 12:54 AM
Thanks for the above. the priv level missmatch seems to have morph'd into a being unable to assign a user role based upon checking for username membership of an AD group . Works for lot of other groups ... works on my dev server .... doesnt work on my prodn one .... Must be something thats staring me in the face but cxanl;t see it at the moment :-(
A
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Alert a Moderator
Re: TACACS on Clear Pass -Authentication privilege level mismatch
05-03-2019 09:20 AM
Your welcome.
I did not have theprivledge level mismatch issue on 6.8.0 with custom admin rights. In the past I had only seen this when you create custom admin privledges, in combination to AD users.
If you had used the default admin privledges and AD users. I never seemed to obtain this error with previous releases.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Alert a Moderator
- « Previous
-
- 1
- 2
- Next »