You must enable RADIUS Accounting on Security Gateways before they can work as a RADIUS Accounting server.
To enable AD Query for a Security Gateway:
You can configure AD Query to allow only one active account per IP address. When user A logs out before the timeout and user B logs in, the user A session closes automatically and his permissions are canceled. User B is the only active user account and only his permissions are valid. This feature is called Single User Assumption.
Before you activate Single User Assumption, you must exclude all service accounts used by user computers.
Note - Another way to keep these issues to a minimum is to increase the DHCP lease time.
To activate single user assumption:
To deactivate Single User Assumption, clear Assume that only one user is connected per computer.
You can manually exclude service accounts, users, computers and networks from the AD Query scan. You can also configure AD Query to automatically detect and exclude suspected service accounts. Identity Awareness identifies service accounts as user accounts that are logged in to more than a specified number of computers at the same time.
To exclude objects from Active Directory queries:
regexp:<regular expression>
.When automatic exclusion is enabled, Identity Awareness looks for suspected service accounts every 10 minutes. Suspected service accounts are saved to a persistent database that survives reboot. When a new service account is detected, a message shows in Logs & Monitor > Logs.
Use these commands to see and manage the suspected service account database:
To show all suspected service accounts, run:
adlog a control srv_accounts show |
To run the service accounts scan immediately, run:
adlog a control srv_accounts find |
This command is useful before you enable the Assume that only one user is connected option.
To remove an account from the service account database, run:
adlog a control srv_accounts unmark <account name> |
To remove all accounts from the suspected service account database, run:
adlog a control srv_accounts clear |
Important - When you use the adlog a control
command, you must run this command to save the configuration:
adlog a control reconf |
NTLMv2 for AD Query is supported by Identity Awareness Gateway R76 and above. Earlier releases support only NTLM.
By default, NTLMv2 support is disabled.
To enable NTLMv2 support for AD Query:
The Identity Awareness Configuration window that opens.
adlogconfig a
Use NTLMv2
Exit and save
The Identity Awareness Configuration window opens.
Identity Awareness automatically recognizes changes to LDAP group membership and updates identity information, including Access Roles.
When you add, move or remove an LDAP nested group, the system recalculates LDAP group membership for ALL users in ALL Groups. Be very careful when you deactivate user-related notifications.
LDAP Group Update is activated by default. You can manually deactivate LDAP Group Update with the CLI.
Important - Automatic LDAP group update works only with Microsoft Active Directory when AD Query is activated. |
To deactivate automatic LDAP group update:
adlogconfig a
The adlog status screen and menu opens.
LDAP groups update notifications status changes to [ ] (not active). If you enter Turn LDAP groups update on/off when automatic LDAP group update is not active, LDAP groups update notifications status changes to [X] (active).
You can use adlogconfig
to set the time between LDAP change notifications and to send notifications only for user related changes.
To configure LDAP group notification options:
adlogconfig a
The adlog status screen and menu opens.
Be very careful when you deactivate only user-related notifications. This can cause excessive gateway CPU load.
Automatic LDAP Group Update does not occur immediately because Identity Awareness looks for users and groups in the LDAP cache first. The information in the cache does not contain the updated LDAP Groups. By default, the cache contains 1,000 users and cached user information is updated every 15 minutes.
You must deactivate the LDAP cache to get automatic LDAP Group Update assignments immediately. This action can cause Identity Awareness to work slower.
To deactivate the LDAP cache:
An organization Active Directory can have several sites, where each site has its own domain controllers that are protected by a Security Gateway. When all of the domain controllers belong to the same Active Directory, one LDAP Account Unit is created in SmartConsole.
When AD Query is enabled on Security Gateways, you may want to configure each Security Gateway to communicate with only some of the domain controllers.
This is configured in the User Directory page of the Gateway Properties. For each domain controller that is to be ignored, the default priority of the Account Unit must be set to a value higher than 1000.
For example, let us say that the LDAP Account Unit ad.mycompany.com has 5 domain controllers - dc1, dc2, dc3, dc4, and dc5.
On the Identity Awareness Gateway, we want to enable AD Query only for domain controllers dc2 and dc3. This means that priority of all other domain controllers (dc1, dc4 and dc5) must be set to a number greater than 1000 in the Identity Awareness Gateway object properties.
To specify domain controllers for each Identity Awareness Gateway:
You can make sure that the domain controllers are set properly by using the adlog CLI. You can see the domain controllers that the Security Gateway is set to communicate with as well as the domain controllers it ignores.
The CLI command is:
adlog a dc |