Hello there,

The registration window is probably not good for the local user. For local 
user, you have to have to be within the registration window and get the right 
password.

Check in the logs/packetfence.log the reason.

Thanks,



Ludovic Zammit
Product Support Engineer Principal Lead

Cell: +1.613.670.8432
Akamai Technologies - Inverse
145 Broadway
Cambridge, MA 02142
Connect with Us:         <https://community.akamai.com/>  
<http://blogs.akamai.com/>  <https://twitter.com/akamai>  
<http://www.facebook.com/AkamaiTechnologies>  
<http://www.linkedin.com/company/akamai-technologies>  
<http://www.youtube.com/user/akamaitechnologies?feature=results_main>

> On Oct 2, 2022, at 9:15 AM, Nikunj Vacchani via PacketFence-users 
> <[email protected]> wrote:
> 
> Dear Sir,
>  
> This output for LDAP user
>  
> root@RRUNAC:/usr/local/pf/bin# cd
> root@RRUNAC:~# /usr/local/pf/bin/pftest authentication allot India08@123
> Testing authentication for "allot"
>  
> Authenticating against 'local' in context 'admin'
>   Authentication FAILED against local (Invalid login or password)
>   Matched against local for 'authentication' rule default
>     set_access_duration : 2D
>     set_role : lab01
>     set_tenant_id : 1
>   Matched against local for 'administration' rule default
>     set_access_duration : 2D
>     set_role : lab01
>     set_tenant_id : 1
>  
> Authenticating against 'local' in context 'portal'
>   Authentication FAILED against local (Invalid login or password)
>   Matched against local for 'authentication' rule default
>     set_access_duration : 2D
>     set_role : lab01
>     set_tenant_id : 1
>   Matched against local for 'administration' rule default
>     set_access_duration : 2D
>     set_role : lab01
>     set_tenant_id : 1
>  
> Authenticating against 'file1' in context 'admin'
>   Authentication FAILED against file1 (Invalid login or password)
>   Did not match against file1 for 'authentication' rules
>   Did not match against file1 for 'administration' rules
>  
> Authenticating against 'file1' in context 'portal'
>   Authentication FAILED against file1 (Invalid login or password)
>   Did not match against file1 for 'authentication' rules
>   Did not match against file1 for 'administration' rules
>  
> Authenticating against 'sms' in context 'admin'
>   Authentication FAILED against sms (Invalid login or password)
>   Matched against sms for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against sms for 'administration' rules
>  
> Authenticating against 'sms' in context 'portal'
>   Authentication FAILED against sms (Invalid login or password)
>   Matched against sms for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against sms for 'administration' rules
>  
> Authenticating against 'email' in context 'admin'
>   Authentication SUCCEEDED against email ()
>   Matched against email for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against email for 'administration' rules
>  
> Authenticating against 'email' in context 'portal'
>   Authentication SUCCEEDED against email ()
>   Matched against email for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against email for 'administration' rules
>  
> Authenticating against 'sponsor' in context 'admin'
>   Authentication SUCCEEDED against sponsor ()
>   Matched against sponsor for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against sponsor for 'administration' rules
>  
> Authenticating against 'sponsor' in context 'portal'
>   Authentication SUCCEEDED against sponsor ()
>   Matched against sponsor for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against sponsor for 'administration' rules
>  
> Authenticating against 'null' in context 'admin'
>   Authentication SUCCEEDED against null ()
>   Matched against null for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against null for 'administration' rules
>  
> Authenticating against 'null' in context 'portal'
>   Authentication SUCCEEDED against null ()
>   Matched against null for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against null for 'administration' rules
>  
> Authenticating against 'ldap' in context 'admin'
>   Authentication FAILED against ldap (Invalid login or password)
>   Did not match against ldap for 'authentication' rules
>   Did not match against ldap for 'administration' rules
>  
> Authenticating against 'ldap' in context 'portal'
>   Authentication FAILED against ldap (Invalid login or password)
>   Did not match against ldap for 'authentication' rules
>   Did not match against ldap for 'administration' rules
>  
>  
> This output for local user
>  
> root@RRUNAC:~#
> root@RRUNAC:~# /usr/local/pf/bin/pftest authentication allot abc@1234
> Testing authentication for "allot"
>  
> Authenticating against 'local' in context 'admin'
>   Authentication FAILED against local (Invalid login or password)
>   Matched against local for 'authentication' rule default
>     set_access_duration : 2D
>     set_role : lab01
>     set_tenant_id : 1
>   Matched against local for 'administration' rule default
>     set_access_duration : 2D
>     set_role : lab01
>     set_tenant_id : 1
>  
> Authenticating against 'local' in context 'portal'
>   Authentication FAILED against local (Invalid login or password)
>   Matched against local for 'authentication' rule default
>     set_access_duration : 2D
>     set_role : lab01
>     set_tenant_id : 1
>   Matched against local for 'administration' rule default
>     set_access_duration : 2D
>     set_role : lab01
>     set_tenant_id : 1
>  
> Authenticating against 'file1' in context 'admin'
>   Authentication FAILED against file1 (Invalid login or password)
>   Did not match against file1 for 'authentication' rules
>   Did not match against file1 for 'administration' rules
>  
> Authenticating against 'file1' in context 'portal'
>   Authentication FAILED against file1 (Invalid login or password)
>   Did not match against file1 for 'authentication' rules
>   Did not match against file1 for 'administration' rules
>  
> Authenticating against 'sms' in context 'admin'
>   Authentication FAILED against sms (Invalid login or password)
>   Matched against sms for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against sms for 'administration' rules
>  
> Authenticating against 'sms' in context 'portal'
>   Authentication FAILED against sms (Invalid login or password)
>   Matched against sms for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against sms for 'administration' rules
>  
> Authenticating against 'email' in context 'admin'
>   Authentication SUCCEEDED against email ()
>   Matched against email for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against email for 'administration' rules
>  
> Authenticating against 'email' in context 'portal'
>   Authentication SUCCEEDED against email ()
>   Matched against email for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against email for 'administration' rules
>  
> Authenticating against 'sponsor' in context 'admin'
>   Authentication SUCCEEDED against sponsor ()
>   Matched against sponsor for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against sponsor for 'administration' rules
>  
> Authenticating against 'sponsor' in context 'portal'
>   Authentication SUCCEEDED against sponsor ()
>   Matched against sponsor for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against sponsor for 'administration' rules
>  
> Authenticating against 'null' in context 'admin'
>   Authentication SUCCEEDED against null ()
>   Matched against null for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against null for 'administration' rules
>  
> Authenticating against 'null' in context 'portal'
>   Authentication SUCCEEDED against null ()
>   Matched against null for 'authentication' rule catchall
>     set_role : guest
>     set_access_duration : 1D
>   Did not match against null for 'administration' rules
>  
> Authenticating against 'ldap' in context 'admin'
>   Authentication FAILED against ldap (Invalid login or password)
>   Did not match against ldap for 'authentication' rules
>   Did not match against ldap for 'administration' rules
>  
> Authenticating against 'ldap' in context 'portal'
>   Authentication FAILED against ldap (Invalid login or password)
>   Did not match against ldap for 'authentication' rules
>  Did not match against ldap for 'administration' rules
>  
> root@RRUNAC:~#
>  
>  
> Thanks & Regards,
> Nikunj Vachhani.
> Network Engineer.
> 99091 10490
>  
> From: P.Thirunavukkarasu via PacketFence-users 
> <[email protected] 
> <mailto:[email protected]>> 
> Sent: 30 September 2022 06:19 PM
> To: Diego Garcia del Rio <[email protected] <mailto:[email protected]>>
> Cc: P.Thirunavukkarasu <[email protected] 
> <mailto:[email protected]>>; [email protected] 
> <mailto:[email protected]>
> Subject: Re: [PacketFence-users] Authentication FAILED against 
> Google_Workspace (Invalid login or password)
>  
> CAUTION: This email originated from outside of the organization. Do not click 
> links or open attachments unless you recognize the sender and know the 
> content is safe.
>  
> Hi Diego, 
> Thank you
> Yes. It is working fine, but while checking with the following command it 
> shows like that..
> /usr/local/pf/bin/pftest authentication [username] [password]
> The realm configured and regarding the stripping the following is the config
> Strip on the portal: Disabled
> Strip on the admin: Disabled
> Strip in RADIUS authorization: Disabled
> Regards, 
> Thirunavukkarasu
>  
> On Thu, Sep 29, 2022 at 10:49 PM Diego Garcia del Rio <[email protected] 
> <mailto:[email protected]>> wrote:
> does the "test" button on the ldap google source work? 
>  
> did you have the proper realm configured as well? (Is it stripping / adding 
> the correct value?)
>  
> I use the google workspace ldap source in several installations and it works 
> fine
>  
>  
>  
> On Thu, Sep 29, 2022 at 9:58 AM P.Thirunavukkarasu via PacketFence-users 
> <[email protected] 
> <mailto:[email protected]>> wrote:
> Hi Team, 
> Greetings to all of you
> Configured the packetfence with Google Workspace LDAP 
> Roles and Rules are configured in the NAC and Switches. 
>  
> While running the following command the following output I received 
> /usr/local/pf/bin/pftest authentication [username] [password]
>  
> Authenticating against 'Google_Workspace' in context 'admin'
>   Authentication FAILED against Google_Workspace (Invalid login or password)
>   Did not match against Google_Workspace for 'authentication' rules
>   Did not match against Google_Workspace for 'administration' rules
> 
> Authenticating against 'Google_Workspace' in context 'portal'
>   Authentication FAILED against Google_Workspace (Invalid login or password)
>   Did not match against Google_Workspace for 'authentication' rules
>   Did not match against Google_Workspace for 'administration' rules
>  
> Can anyone please help me to resolve the issue?
>  
> Best,
> Thirunavukkarasu
> _______________________________________________
> PacketFence-users mailing list
> [email protected] 
> <mailto:[email protected]>
> https://lists.sourceforge.net/lists/listinfo/packetfence-users 
> <https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!X1viFxUxxstfQAVzLi30NQqGrX9dPetsRmXMNSuW-_pFliVmVpnafTGJj_vWgxvhXXdmvCDzPmmJiZymOsEiJvMXP2Pj87qqqO-7Rg$>
>  
> DISCLAIMER : The content of this email is confidential and intended for the 
> recipient specified in message only. It is strictly forbidden to share any 
> part of this message with any third party, without a written consent of the 
> sender. If you received this message by mistake, please reply to this message 
> and follow with its deletion, so that we can ensure such a mistake does not 
> occur in the future._______________________________________________
> PacketFence-users mailing list
> [email protected] 
> <mailto:[email protected]>
> https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!X1viFxUxxstfQAVzLi30NQqGrX9dPetsRmXMNSuW-_pFliVmVpnafTGJj_vWgxvhXXdmvCDzPmmJiZymOsEiJvMXP2Pj87qqqO-7Rg$
>  
> <https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!X1viFxUxxstfQAVzLi30NQqGrX9dPetsRmXMNSuW-_pFliVmVpnafTGJj_vWgxvhXXdmvCDzPmmJiZymOsEiJvMXP2Pj87qqqO-7Rg$>
>   

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to