Configure LDAP or Active Directory for Authorization
When you want to configure remote access VPN with LDAP or Active Directory (AD) server for authorization, you must configure an attribute map using a FlexConfig object as the attribute map is not supported directly on Cisco Defense Orchestrator web interface.
Before you begin
Ensure that you have created a Realm object for LDAP or AD.
Procedure
Step 1 | On your Cisco Defense Orchestrator web interface, choose Devices > VPN > Remote Access. |
Step 2 | Create a remote access VPN policy with LDAP or AD realm object as the authentication server. Or edit an existing remote access VPN configuration and select LDAP or AD realm as the authentication server. |
Step 3 | Choose Objects > Object Management > FlexConfig > FlexConfig Object. |
Step 4 | Create a FlexConfig policy and create and assign the following two FlexConfig objects in the append section: For more information, see Configure FlexConfig Text Objects.
Make sure the order of the FlexConfig objects in the FlexConfig Policy is the LDAP Attribute Map FlexConfig object followed by the AAA-server object. This will configure the LDAP attribute map and associate it with the LDAP server configuration on the Firepower Threat
Defense device. |