We use Cisco 1232 AP’s with EAP-PEAP-MSCHAPv2 to a Cisco ACS (RADIUS server).

We would like to restrict access to SSIDs based upon Windows group membership.  The

ACS server is not capable of doing this.  I currently have FreeRadius (1.1.2) installed under

FreeBSD with OpenSSL 0.9.7d-p1 17 and Samba 3.0.20b.  If the server is joined to an

Active Directory domain, would it be possible to not just authenticate user/pwd through

Samba, but also to check for Windows group membership based upon the SSID to which

the user is trying to authenticate?  If this is possible, can you suggest the general approach

to implementing this?

 

For instance, if we have SSID’s: ssid1, ssid2 and ssid3 and we want to map

ssid1 -> Windows group “ssid1 users”

ssid2 -> Windows group “ssid2 users”

ssid3 -> Windows group “ssid3 users”

such that if the user is a member of the group and their credentials are valid, FreeRadius

would return Access-Accept.  If they aren’t a member of the group or their credentials

are invalid, it would return Access-Reject.

 

I’ve seen some threads talking about putting a SSID attribute in LDAP.  But, user’s could

be authorized for more than one SSID so it doesn’t seem like that approach would work.

Also, administratively, it’s easier to identify/manage who is authorized for which SSIDs if

it is done via group membership as opposed to a user attribute.

 

Also, does FreeRadius support changing of passwords via MSCHAP to Active Directory when

the password is expired?

 

Thank you in advance for any help/guidance you can provide.

 

Neal

 

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to