Guest

Cisco NAC Appliance (Clean Access)

Configuration of Active Directory Single Sign-On for NAC Guest Server

Cisco - Configuration Active Directory SSO for NAC Guest Server

Document ID: 109602

Updated: Feb 23, 2009

   Print

Introduction

The Active Directory Single Sign-On (AD SSO) feature uses Kerberos between the web browser of the client and the Cisco NAC Guest Server in order to automatically authenticate a guest against an Active Directory Domain Controller.

Note: For the purpose of this document, the NTP and DNS servers are also on the DC, but this is possibly not the case in your environment.

Prerequisites

Requirements

Ensure that you meet these requirements before you attempt this configuration:

  • DNS must be configured and work on the Cisco NAC Guest Server.

  • DNS must be configured and work on the Domain Controller.

  • The DNS entries for the Cisco NAC Guest Server must be defined:

    • A record

    • PTR record

  • The DNS entries for the Domain Controller must be defined:

    • A record

    • PTR record

  • Cisco NAC Guest Server time settings must be synchronized with the Active Directory Domain.

Components Used

The information in this document is based on these software and hardware versions:

  • NAC Guest Server 2.0

  • Microsoft Windows XP with Internet Explorer 6.0

  • Windows Server 2003

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Conventions

Refer to the Cisco Technical Tips Conventions for more information on document conventions.

Configure

In this section, you are presented with the information to configure the features described in this document.

Note: Use the Command Lookup Tool (registered customers only) to obtain more information on the commands used in this section.

Network Diagram

This document uses this network setup:

config-ad-sso-nac-01.gif

Configurations

This document uses these IP addresses:

  • Domain Controller—172.23.117.46 (w2k3-server.cca.cisco.com)

  • NAC Guest Server—172.23.117.42 (ngs.cca.cisco.com)

  • Sponsor Machine—172.23.117.45

Complete these steps:

  1. Access the NGS Admin Interface. From the browser, go to http://172.23.117.42/admin

    config-ad-sso-nac-02.gif

  2. NGS Network Configuration

    Choose Server > Network Settings.

    1. Hostname—ngs

    2. Domain—cca.cisco.com

    3. Primary DNS—172.23.117.46

  3. NTP Setup

    In Server > Date/Time, configure the NTP server to DC IP 172.23.117.46 .

    config-ad-sso-nac-03.gif

  4. AD SSO Setup

    Before you configure the SSO section, make sure the A and PTR records exist for the domain controller and NAC guest server.

    In the AuthServer > Auth SSO section, configure this:

    config-ad-sso-nac-04.gif

    If the configuration is successful, you should see a success message.

    config-ad-sso-nac-05.gif

  5. Validate the SSO feature

    From the user machine, log into the domain. In this example, this machine is part of the cca domain. Only Internet Explorer is supported for the SSO feature. You need to make sure that the NAC Guest Server is part of local intranet and auto-login is turned on.

    Note: Use the FQDN for the guest server in order to test SSO from the browser. For example, the IP address does not work.

    1. Verify the web browser settings:

      config-ad-sso-nac-06.gif

      config-ad-sso-nac-07.gif

    2. From the web browser, go to http://ngs.cca.cisco.com. You should be automatically logged in to the ngs with the domain credentials.

      Note: The link http://ngs.cca.cisco.com will only work if you have configured NAC in admin mode with the user credentials.

      config-ad-sso-nac-08.gif

      Under the NAC Guest Server Audit Logs, you can see the user Niall logged into the default group:

      config-ad-sso-nac-09.gif

  6. User Group Mapping with AD SSO (Optional)

    In this section you will learn to map the SSO user to a specific group other than the default group.

    To map the user group with ADSSO, you need to configure the Active Directory Server as Auth Server and then map the AD group with Sponsor User Group.

    1. Choose NGS (http://172.23.117.42/admin) Authentications > Sponsors > Active Directory Servers. Add a new domain controller.

      config-ad-sso-nac-10.gif

      The test connection option has been introduced in NGS 2.0 for ease of troubleshooting. It tells you whether you have configured the DC correctly.

    2. Configure the User Group

      Add a new user group name—tme. In this example, you choose NO in order to bulk account creation. This way you know immediately whether the user has been placed to the tme group or the default group.

      config-ad-sso-nac-11.gif

      In Active Directory Mapping, the test user niall is already part of Domain Admins.

      config-ad-sso-nac-12.gif

Verify

Use this section to confirm that your configuration works properly.

The Output Interpreter Tool (registered customers only) (OIT) supports certain show commands. Use the OIT to view an analysis of show command output.

Verify ADSSO User Group Mapping

In order to access the Sponsor machine, open a new browser and go to http://ngs.cca.cisco.com.

Niall should be placed in tme group with no access to bulk account creation.

config-ad-sso-nac-13.gif

If you look at the audit logs, you can verify that the Sponsor is placed into the correct Role.

config-ad-sso-nac-14.gif

Troubleshoot

This section provides information you can use to troubleshoot your configuration.

These are error messages in the logs. Kerberos errors results in one of these errors:

  • Domain format incorrect / Domain Controller must be a FQDN, not an IP address

    The domain has not been entered in a correct format (should be of the form CCA.CISCO.COM).

  • Hostname must be a FQDN, not an IP address

    The hostname of the NAC Guest server cannot be an IP address it must be a Fully-Qualified Domain Name e.g. nac.cca.cisco.com.

  • Cannot determine IP address for Domain Controller

    There is a DNS configuration issue.

  • Cannot get DNS A record for Domain Controller

    There is a DNS configuration issue.

  • Cannot get DNS A record for hostname

    There is a DNS configuration issue.

  • Cannot get DNS PTR record for Domain Controller IP address

    There is a DNS configuration issue.

  • Cannot get DNS PTR record for hostname IP address

    There is a DNS configuration issue.

  • Failed to create computer account for this server on the Domain Controller. See application log for details

    . View the application log to see the full details of the error.

  • Invalid username/password

    The administrator username/password is incorrect.

  • Invalid Domain or cannot resolve network address for DC

    There is a DNS problem on the AD server.

  • Domain Controller time does not match this server's time

    Ensure the server times match, it is recommended you use NTP to synchronise server times.

  • The DC cannot determine the hostname for the Guest server by reverse lookup. There may be an issue with your DNS confiugration.

    There is a DNS configuration issue on your AD server.

Related Information

Updated: Feb 23, 2009
Document ID: 109602