Hi,
you can check for the device address and assign your readwrite
profile accordingly:
if (member == RO) {
if (device.address == 192.168.1.1)
profile = readwrite
else
profile = readonly
permit
}
Cheers,
Marc
We are currently using tacplus_ng integrated with Active Directory, and everything is working well. We have two AD groups:
RW (ReadWrite)
RO (ReadOnly)
These are mapped to two corresponding profiles:
readwrite
readonly
Our current setup enforces access based on group membership as expected. However, we now have a new requirement:
If a user belongs to the RO group and tries to access the device at 192.168.1.1, they should be granted readwrite access instead of readonly.
Could you please advise how we can implement this exception in tacplus_ng? Is there a way to override the default group-to-profile mapping for a specific device? --
You received this message because you are subscribed to the Google Groups "Event-Driven Servers" group.
To unsubscribe from this group and stop receiving emails from it, send an email to event-driven-ser...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/event-driven-servers/6496f474-9a62-4666-b952-6da06eb8107dn%40googlegroups.com.
Hi,
I've no detail knowledge of FortiGate authentication. I'd likely
start with trying to debug this on the FortiGate first, I think
I've seen a pretty comprehensive TechTip on that on the FortiNet
site some time ago.
Cheers,
Marc
Hi Marc
below is my config cisco devices is working fine for cisco and paloalto devices
But facing issue with Fortigate
readonly users are getting only readonly access. But readwrite group members not getting readwrite access. Please help me to fix this
ruleset {
rule {
script {
# For RW group (common to FortiGate and Cisco)
if (memberof =~ /(?i)^cn=Networkinginfrastructure-RW,ou=static groups/) {
if (device.address == "172.17.12.158") {
# FortiGate
set memberof = "ADMIN-RW"
set admin_prof = "rw_admin"
}
profile = netadmin
permit
# For RO group on FortiGate
} else if (memberof =~ /(?i)^cn=Networkinginfrastructure-RO-SG,ou=static groups/) {
if (device.address == "172.17.12.158") {
set memberof = "ADMIN-RO"
set admin_prof = "soc_admin_readonly"
}
profile = readonly
permit
} else {
deny
}
}
}
}
}
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 evaluating ACL __internal__username_acl__
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 regex: '[]<>/()|=[*"':$]+' <=> 'sujith.sudhakaran1' = 0
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 line 502: [user] regex '[]<>/()|=[*"':$]+' => false
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 line 502: [permit]
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 ACL __internal__username_acl__: match
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 looking for user sujith.sudhakaran1 in MAVIS backend
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 result for user sujith.sudhakaran1 is ACK [32 ms]
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 looking for user sujith.sudhakaran1 realm default
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 user lookup succeded
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 evaluating ACL default#0
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 pcre2: '(?i)^cn=Networkinginfrastructure-RW,ou=static groups' <=> 'CN=Networkinginfrastructure-RW,OU=Static Groups,OU=Domain Groups,DC=envestnetpmc,DC=net' = 1
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 line 112: [memberof] <pcre-regex> '(?i)^cn=Networkinginfrastructure-RW,ou=static groups' => true
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 line 113: [nas] address '172.17.12.158' => true
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 line 115: [set] 'memberof=ADMIN-RW'
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 line 116: [set] 'admin_prof=rw_admin'
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 line 118: [profile] 'netadmin'
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 line 119: [permit]
Jul 08 13:00:29 cilchshrslog01 tac_plus-ng[232972]: 7/01f2f88f: 172.17.12.158 ACL default#0: match
To view this discussion visit https://groups.google.com/d/msgid/event-driven-servers/cac0e9b4-bbab-4fd6-be5a-6ea7042e66d3n%40googlegroups.com.