This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

AD synchronisation user multiple user group memberships

Is it correct that XG only supports one AD group membership? So no real AD integration?

Fred



This thread was automatically locked due to age.
Parents
  • Not Really. 

    It is kinda complicated. 

    XG has a "Primary Group". This group is displayed in XG as Primary Group and is used by the GUI etc. 

    But XG "knows" all groups, which are created in XG itself (imported).

    So basically if you have a User (called Bob) in two groups (Admin & User). 

    First Match will match the Primary Group in the Group tab. 1. Admin 2. User.

    Bob will be shown as a Admin in XG.

    If you create a Firewall policy (first match) with User Group in it, it will match to Bob aswell. 

    Unfortunately, there is a bug in XG right now in Policy Tester. Policy Tester will only show matching Group (Primary Group) while XG will use the "real" group. 

    You can easily test this with the example above. 

    But do not forget, this will get "REALLY" messy afterwards, if you setup a complex ruleset with multiple groups.

    Even Nested Groups work, if you create them. 

  • OK than I have to look further for the reason VPN access firewall rules based on AD user groups are not Working. in XG you don’t see the members of a AD group. Log viewer also does not give me the destination IP and reason for blocking.

    Everything works with with a general VPN rule allow  LAN and any Services and all AD groups thrown together.

    However when having three separate more  specific firewall rules for:

    1 allow RDP, Outlook - specific hosts - VPN users,

    2 = allow  1 + SharePoint, Fileserver, ERP  - specific hosts - VPN Power users

    3= Allow 1 + 2 + server access for VPN administrators,

    Than I can’t reach the RDP host anymore for RDP. Log viewer does not give the destination IP or my user as being blocked.

    I can Ping the host but it won’t work. Log viewer does not tell me anything I need. It will work again when I enable the general allow all destination on LAN and any services again.

    Fred

  • Keep in Mind, Policy Tester does not use the Backend Group system. So basically, if you have such a setup, it display not the correct / true value. 

     

    Another point is, you have to use First match in Firewall rule set.

    So the basic setup is, XG search for Source IP, Destination IP and Service. You can replace Source IP with a User. That is the authentication Daemon. 

     

    Did you import all VPN Groups? 

    You have to regroup the Firewall rules. From most specific to less specific. 

     

Reply
  • Keep in Mind, Policy Tester does not use the Backend Group system. So basically, if you have such a setup, it display not the correct / true value. 

     

    Another point is, you have to use First match in Firewall rule set.

    So the basic setup is, XG search for Source IP, Destination IP and Service. You can replace Source IP with a User. That is the authentication Daemon. 

     

    Did you import all VPN Groups? 

    You have to regroup the Firewall rules. From most specific to less specific. 

     

Children
No Data