Configure LDAP or Active Directory for Authorization

When you want to configure remote access VPN with LDAP or Active Directory (AD) server for authorization, you must configure an attribute map using a FlexConfig object as the attribute map is not supported directly on Cisco Defense Orchestrator web interface.

Before you begin

Ensure that you have created a Realm object for LDAP or AD.

Procedure


Step 1

On your Cisco Defense Orchestrator web interface, choose Devices > VPN > Remote Access.

Step 2

Create a remote access VPN policy with LDAP or AD realm object as the authentication server. Or edit an existing remote access VPN configuration and select LDAP or AD realm as the authentication server.

Step 3

Choose Objects > Object Management > FlexConfig > FlexConfig Object.

Step 4

Create a FlexConfig policy and create and assign the following two FlexConfig objects in the append section:

  1. Create the FlexConfig Object for LDAP Attribute Map with Deployment type: Once and Type: Append.

    Enter the following in the object body:
    lda attribute-map <LDAP_Map_for_VPN_Access>
              map-name  memberOf Group-Policy
              map-value memberOf CN=APP-SSL-VPN Managers,CN=Users,OU=stbu,DC=cisco,DC=com LabAdminAccessGroupPolicy
              map-value memberOf CN=cisco-Eng,CN=Users,OU=stbu,DC=cisco,DC=com VPNAccessGroupPolicy
    
  2. Create a FlexConfig Object associating the LDAP attribute map to the LDAP AAA-server, with Deployment type: Everytime and Type: Append.

    Note

    This mapping is required to reinstate the LDAP-attribute-map association because it is negated by Cisco Defense Orchestrator.

    Enter the following in the object body area:

    aaa-server <LDAP/AD_Realm_name> host <AD Server IP>
              ldap-attribute-map <LDAP_Map_for_VPN_Access>
              exit
    

    Use the same aaa-server same as the LDAP realm name used in the AAA server settings of the connection profile that you have added to the remote access VPN policy configuration.

For more information, see Configure FlexConfig Text Objects.

  1. Click Save.

Make sure the order of the FlexConfig objects in the FlexConfig Policy is the LDAP Attribute Map FlexConfig object followed by the AAA-server object.

This will configure the LDAP attribute map and associate it with the LDAP server configuration on the Firepower Threat Defense device.