Hello guys,

the issue looks to be the REST-Http-Status-Code and it should be 401.

I have checked the code and it looks to be ok.

Here (
https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/radius.pm#L1045)
we return $RADIUS::RLM_MODULE_FAIL who should return a 401 (
https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/radius/rest.pm#L53
)

I have to try to replicate it and i will be back to you.

Regards
Fabrice

Le ven. 28 avr. 2023 à 13:43, IT Mercenary via PacketFence-users <
packetfence-users@lists.sourceforge.net> a écrit :

> Happy Friday!
>
> Using /usr/local/pf/bin/pftest authentication USERNAME  "", I can see that
> the user is matching the deny rule as desired.
>
> [image: image.png]
>
> Here is a screenshot of the authentication.conf file. I think this
> contains the relevant parts but let me know if I should send you the whole
> file.
>
> [image: image.png]
>
> Thanks!
>
> On Fri, Apr 28, 2023 at 5:29 AM Zammit, Ludovic <luza...@akamai.com>
> wrote:
>
>> Hello,
>>
>> You could use the command:
>>
>> /usr/local/pf/bin/pftest authentication USERNAME  ""
>>
>> You will see if you match properly your rule, it should bring
>> Administration right.
>>
>> Could you show me your conf/authentication.conf?
>>
>> Thanks,
>>
>> *Ludovic Zammit*
>> *Product Support Engineer Principal Lead*
>> *Cell:* +1.613.670.8432
>> Akamai Technologies - Inverse
>> 145 Broadway
>> Cambridge, MA 02142
>> Connect with Us: <https://community.akamai.com> <http://blogs.akamai.com>
>> <https://twitter.com/akamai> <http://www.facebook.com/AkamaiTechnologies>
>> <http://www.linkedin.com/company/akamai-technologies>
>> <http://www.youtube.com/user/akamaitechnologies?feature=results_main>
>>
>> On Apr 27, 2023, at 7:41 PM, IT Mercenary <theitmercena...@gmail.com>
>> wrote:
>>
>> Hi All,
>>
>> I'm hoping for some guidance on how to change the Radius Reply for CLI
>> authentication when users are not a member of the specified group. The
>> group is being matched as the RADIUS reply indicates the right
>> administration rule is being matched (catch all).
>>
>> The behavior I was getting:
>>
>> <image.png>
>>
>> <image.png>
>>
>> Compared to what I'm getting now:
>> <image.png>
>>
>> <image.png>
>> Thanks!
>>
>> On Mon, Apr 24, 2023 at 6:45 AM IT Mercenary <theitmercena...@gmail.com>
>> wrote:
>>
>>> Hi Ludovic,
>>>
>>> I've changed the group to use DN and equal, but I'm getting the same
>>> results. Is there a way to customize the behavior when an administrative
>>> user is authenticated but not authorized?
>>>
>>> Thanks!
>>>
>>> On Mon, Apr 24, 2023 at 5:32 AM Zammit, Ludovic <luza...@akamai.com>
>>> wrote:
>>>
>>>> Hello there,
>>>>
>>>> It loos like the match regex operator does not work properly, in order
>>>> to have a good match use the DistinguishName of the group object in the Ad
>>>> in combinaison of the operator equals
>>>>
>>>> Memberof equals CN=MyGroup,OU=domain,OU=com
>>>>
>>>> Thanks,
>>>>
>>>>
>>>>
>>>> *Ludovic Zammit*
>>>> *Product Support Engineer Principal Lead*
>>>> *Cell:* +1.613.670.8432
>>>> Akamai Technologies - Inverse
>>>> 145 Broadway
>>>> Cambridge, MA 02142
>>>> Connect with Us: <https://community.akamai.com/>
>>>> <http://blogs.akamai.com/>
>>>> <https://urldefense.com/v3/__https://twitter.com/akamai__;!!GjvTz_vk!SF63EyrrM4FXLQkheVYp5dyTys9nEA_V0jNmoz16tIaS1t0BE9_KNqNryW2DCqpFdzzV9tBE1M5sU4Cqyf7_AxUp$>
>>>> <https://urldefense.com/v3/__http://www.facebook.com/AkamaiTechnologies__;!!GjvTz_vk!SF63EyrrM4FXLQkheVYp5dyTys9nEA_V0jNmoz16tIaS1t0BE9_KNqNryW2DCqpFdzzV9tBE1M5sU4CqyYr4gXNR$>
>>>> <https://urldefense.com/v3/__http://www.linkedin.com/company/akamai-technologies__;!!GjvTz_vk!SF63EyrrM4FXLQkheVYp5dyTys9nEA_V0jNmoz16tIaS1t0BE9_KNqNryW2DCqpFdzzV9tBE1M5sU4CqyUpLS561$>
>>>> <https://urldefense.com/v3/__http://www.youtube.com/user/akamaitechnologies?feature=results_main__;!!GjvTz_vk!SF63EyrrM4FXLQkheVYp5dyTys9nEA_V0jNmoz16tIaS1t0BE9_KNqNryW2DCqpFdzzV9tBE1M5sU4CqyVsZQVXE$>
>>>>
>>>> On Apr 21, 2023, at 1:45 PM, IT Mercenary via PacketFence-users <
>>>> packetfence-users@lists.sourceforge.net> wrote:
>>>>
>>>> Hello,
>>>>
>>>> I have an administration rule for switch CLI access that is producing
>>>> different results for users that are not a member of an AD group. Both
>>>> switches are in a switch group with type based on the standard Cisco
>>>> template. The desired result is being produced on appliance version 12.1.0
>>>> and the undesired result on v12.2.0.
>>>>
>>>> *Administration Rules*
>>>> <image.png>
>>>>
>>>> *v12.1.0 Results*
>>>> <image.png>
>>>> RADIUS Tab:
>>>> <image.png>
>>>>
>>>> *v12.2.0 Results*
>>>> <image.png>
>>>>
>>>> RADIUS Tab:
>>>> <image.png>
>>>>
>>>>
>>>> Thanks!
>>>> _______________________________________________
>>>> PacketFence-users mailing list
>>>> PacketFence-users@lists.sourceforge.net
>>>>
>>>> https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!RJRooQcys6zdEdxUze4ob_Fdoh8f6vc2-IXTbp2iUXgzmcvH-3YEOBQRdtmbI7Lzb_CFnZNayskBCKtC7pOqRsEGTSZZOy4s7Q6HOQ$
>>>>
>>>>
>>>>
>> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to