Troubleshooting Issues with User Identity Sources
License: Any
See the following sections for information about troubleshooting issues with your identity sources.
User Agent
If you experience issues with the User Agent connection, see the Firepower User Agent Configuration Guide .
If you experience issues with user data reported by the User Agent, note the following:
-
After the system detects activity from a User Agent user whose data is not yet in the database, the system retrieves information about them from the server. In some cases, the system requires up to 60 minutes to successfully retrieve this information from Active Directory servers. Until the data retrieval succeeds, activity seen by the User Agent user is handled by access control rules, and is not displayed in the web interface.
ISE/ISE-PIC
If you experience issues with the ISE/ISE-PIC connection, check the following:
-
The pxGrid Identity Mapping feature within ISE must be enabled before you can successfully integrate ISE with the Firepower System.
-
All ISE system certificates and Firepower Management Center certificates must include the serverAuth and clientAuth extended key usage values.
-
The time on your ISE device must be synchronized with the time on the Firepower Management Center. If the appliances are not synchronized, the system may perform user timeouts at unexpected intervals.
-
If your deployment includes a primary and a secondary pxGrid node, the certificates for both nodes must be signed by the same certificate authority.
-
If your deployment includes a primary and a secondary MNT node, the certificates for both nodes must be signed by the same certificate authority.
If you experience issues with user data reported by ISE/ISE-PIC, note the following:
-
After the system detects activity from an ISE user whose data is not yet in the database, the system retrieves information about them from the server. In some cases, the system requires up to 60 minutes to successfully retrieve this information from Active Directory servers. Until the data retrieval succeeds, activity seen by the ISE user is handled by access control rules, and is not displayed in the web interface.
-
You cannot perform user control on ISE users who were authenticated by an LDAP, RADIUS, or RSA domain controller.
-
The ASA FirePOWER module does not receive user data for ISE Guest Services users.
-
Your ISE version and configuration impact how you can use ISE in the Firepower System. For more information, see The ISE/ISE-PIC Identity Source.
-
ISE-PIC does not provide ISE attribute data.
Captive Portal
If you experience issues with captive portal authentication, note the following:
-
The time on your captive portal server must be synchronized with the time on the ASA FirePOWER module.
-
If you have DNS resolution configured and you create an identity rule to perform Kerberos (or HTTP Negotiate, if you want Kerberos as an option) captive portal, you must configure your DNS server to resolve the fully qualified domain name (FQDN) of the captive portal device. The FQDN must match the hostname you provided when configuring DNS.
For ASA with FirePOWER Services devices, the FQDN must resolve to the IP address of the routed interface used for captive portal.
-
If you select Kerberos (or HTTP Negotiate, if you want Kerberos as an option) as the Authentication Type in an identity rule, the Realm you select must be configured with an AD Join Username and AD Join Password in order to perform Kerberos captive portal active authentication.
-
If you select HTTP Basic as the Authentication Type in an identity rule, users on your network may not notice their sessions time out. Most web browsers cache the credentials from HTTP Basic logins and use the credentials to seamlessly begin a new session after an old session times out.
-
If the device you want to use for captive portal contains both inline and routed interfaces, you must configure a zone condition in your captive portal identity rules to target only the routed interfaces on the captive portal device.