Hi Anton,

in fact the role name in AutoRegister scope doesn't really matter, it just have to exist (to return True) If the AutoRegister scope return something then the next step is NodeInfoForAutoReg. In this scope (NodeInfoForAutoReg) packetfence will try to instantiate a portal profile to compute the role.

So if you have no rule that match in NodeInfoForAutoReg then you will have to create a portal profile that will match on specific parameter (like the SSID).

Don't forget that in the NodeInfoForAutoReg scope is the device never registered then there is no node.category.

Regards
Fabrice



Le 2016-05-20 02:24, Anton Dreyer a écrit :

Hi Fabrice

Thanks for taking the time to answer.

This is exactly what I am not sure how to accomplish. I have 2x AD sources in the portal profile. Is It possible to set the 2 roles in the auto register portion? By doing

/[1:normalnetwork]/

/scope = AutoRegister/

/role = admin_wlan/

do you not set everyone to admin_wlan? How do I manage to differentiate between the roles/sources?

Thanks again

Regards

Anton

*From:*Fabrice Durand [mailto:[email protected]]
*Sent:* Thursday, 19 May 2016 4:27 PM
*To:* [email protected]
*Subject:* Re: [PacketFence-users] Auto registration

Hello Anton,

the fact is the role in not yet set in the AutoRegister scope:

[1:normalnetwork&is_staff]

scope = AutoRegister

role = admin_wlan

[2:normalnetwork&is_student]

scope = AutoRegister

role = student_wlan


So do that instead:

[1:normalnetwork]

scope = AutoRegister

role = admin_wlan

And when it will go in the normal flow (NodeInfoForAutoReg after AutoRegister) it will try to instantiate the portal (Filter SSID:ess_pf_Dot1x) and try to match with you AD source. Of course you must have a portal profile with SSID:ess_pf_Dot1x and assign the AD source on it.

Regards
Fabrice

Le 2016-05-19 09:44, Anton Dreyer a écrit :

    Good day

    I was hoping I could get a little assistance regarding auto
    registration on the 802.1x network (skipping the whole portal part)

    The examples for auto registration I have found seem to have a
    single, default role. You guys helped me to put together the top
    part of the filter below a couple of months ago to deregister
    someone connecting to the open network:

    Would it be a terrible ask to help writing a filter to
    autoregister on the secure ssid? I am guessing it would look
    something like this?:

    [regnetwork]

    filter = ssid

    operator = is

    value = ess_pf_MacAuth

    [is_staff]

    filter = node_info.category

    operator = is

    value = admin_wlan

    [is_student]

    filter = node_info.category

    operator = is

    value = student_wlan

    #unregister all staff nodes when connecting to open ssid

    [unregnode:regnetwork&is_staff]

    scope = NormalVlan

    role = registration

    action = deregister_node

    action_param = mac = $mac

    #unregister all student nodes when connecting to open ssid

    [unregnode:regnetwork&is_student]

    scope = NormalVlan

    role = registration

    action = deregister_node

    # ------------ the code above works, new code below
    --------------------

    #autoregister on Dot1x

    [normalnetwork]

    filter = ssid

    operator = is

    value = ess_pf_Dot1x

    [1:normalnetwork&is_staff]

    scope = AutoRegister

    role = admin_wlan

    [2:normalnetwork&is_student]

    scope = AutoRegister

    role = student_wlan

    [autoreg]

    filter = node_info

    attribute = autoreg

    operator = match

    value = yes

    [3:autoreg]

    scope = NormalVlan

    action = register_node

    action_param = mac = $mac

    ---

    Thanks in advance!

    Anton




    
------------------------------------------------------------------------------

    Mobile security can be enabling, not merely restricting. Employees who

    bring their own devices (BYOD) to work are irked by the imposition of MDM

    restrictions. Mobile Device Manager Plus allows you to control only the

    apps on BYO-devices by containerizing them, leaving personal data untouched!

    https://ad.doubleclick.net/ddm/clk/304595813;131938128;j




    _______________________________________________

    PacketFence-users mailing list

    [email protected]
    <mailto:[email protected]>

    https://lists.sourceforge.net/lists/listinfo/packetfence-users



--
Fabrice Durand
[email protected] <mailto:[email protected]>  ::  +1.514.447.4918 (x135) 
::www.inverse.ca <http://www.inverse.ca>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)


------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to