[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Problems with EAP-TLS set up

Posted on 2007-11-21
4
Medium Priority
?
1,216 Views
Last Modified: 2008-08-26
Hi all

I am currently trying to set up a WLAN using EAP-TLS for authentication. I am using Cisco ACS 4.1 authenticationg users with AD.

At the moment I seem to have no problem with Domain users, they log on through the wired network, obtain a certificate and from then on will authenticate and join the WLAN set up.

However when ever a Domain admin tries this it fails. I get the following message in the ACS failure log; "External user not found".

Any help would be greatfully recieved.

PLease feel free to ask questioned as i know this is a little vauge.
0
Comment
Question by:147755
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 5

Expert Comment

by:amac81
ID: 20329085
Are the domain admins in a different container than the regular users in AD?  (usually the case) If so, you'll need to confirm that the authentication is checking not just the users container but the administrators container as well.
0
 
LVL 5

Accepted Solution

by:
amac81 earned 2000 total points
ID: 20329110
Of course, if you have a container which contains the users which are authorized then, that will make it a whole lot easier.
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question