How can I use the RADIUS filter-id attribute to assign users to different RADIUS groups?

Description

This article explains how to make use of the RADIUS filter-id attribute to configure the RADIUS client and server in order to be able to apply different SRA policies (bookmarks, EPC, etc.) to specific AD groups.

In this example we have the following elements:

  • SRA acting as a RADIUS client.
  • Windows Server 2008 R2 with the Network Policy Server and Active Directory Domain Services roles that is acting as the RADIUS server.

Resolution

First of all, create different Security Groups in AD. In this example, we created 2 groups named Internal  and  External.

Image

We also created 2 users in AD (testing and testext) and assigned both to the “Internal” and “External” Security groups respectively.

 

Configuration of the RADIUS server

The following example shows how to configure the Windows Server 2008 R2 with the Network Policy Server role.

NOTE: This is an example of basic configuration and it can vary from customer to customer, depending on the different requirements.

  1. Add a new RADIUS client by right-clicking on RADIUS Clients | New.
    Image

  2. Configure the IP address of the RADIUS Client (SRA) and the Shared secret and make sure this one matches the one you configured in the SRA. Also, ensure that the option Enable this RADIUS client is selected.
    Image

  3. From the Advanced tab, select RADIUS Standard, from the Vendor name drop-down list.
    Image

  4. Create a new Network Policy by right-clicking on Network Policies| New
    Image

  5. Type in the Policy name (in this case we called it “SRA Internal”) and choose Unspecified from the Type of network access server.
    Image

  6. In the next screen, click Add to add a new condition and select Windows Groups.
    Image

  7. Click  Add Groups and search for the corresponding Active Directory group (in our case Internal).
    Image
    Image

  8. In the next screen specify the Access Permission. In our case Access granted.
    Image

  9. In the next screen select the authentication method you will use for the SRA authentication. 
    Image

  10. The next dialog window will ask you to configure the constraints for connection from the SRA. In this case we did not configure any additional constraint.
    Image

  11. In the next screen, under RADIUS Attributes, select “Standard” and click Add.
    Image

  12. Search for Filter-Id and add a new Filter-id String attribute. This must match the Filter-id configured on the SRA (in our case we called it Internal).
    Image
    Image

  13. Click Next to finish the configuration of the policy.
    Image

  14. Repeat the same steps as above for the other group External, adding the filter-id attribute External.
  15. At the end, we will have 2 policies: SRA Internal and SRA External.
     Image



 

Configuration of the RADIUS client (SRA)

  1. Ensure the checkboxes Use Filter-ID  For RADIUS Groups and Auto-assign groups at login are selected like in the image below.
    Image
    Image

  2. Navigate to Users| Local Groups, create 2 new groups for the RADIUS domain (in our case Internal and External) and select the option Associate with RADIUS filter-id .
    Image
    Image

  3. You can test this by creating 2 different bookmarks and assigning each of them to the Internal and External groups.

    EXAMPLE: Image below.

    Image

  4. Try to log in to the portal using the test users we created in AD (testint and testext) and you will observe that they are assigned different bookmarks depending on the AD group (Internal or External) they are members of.
     Image
    Image

Related Articles

  • SMA100 End of Support No-Charge Replacement FAQ
    Read More
  • SMA1000: Post upgrade to 12.5.0 on AWS and Azure, we show the error Could not retrieve the DNS settings once we log in to AMC/CMS console
    Read More
  • Firmware version required to upgrade to version 12.5.0.
    Read More
not finding your answers?