![]() 2016 installed python-vipaccess and have generated the Symantec VIP Access ID. #Symantec vip access review how toWe were able to find some information on how to extract the attributes and use traffic policies however not very sure how to use those. Provides with a better internet on all devices to access websites. LDAP policies are configured to use samaccountname currently. Is there a way we can extract mail attribute for the users during the first authentication which is LDAP and once it is successful, NetScaler should send the mail attribute to Azure using NPS as RADIUS only. The 2FA works well if the samaccountname matches the mail attribute of the user and it matches the one in azure as well. Since NPS recieved samaccountname from Netscaler and not mail attribute, Azure errors out stating the user name does not exist or not found. User when provide samaccountname as primary ldap authentication, Netscaler verifies the same and pass on the same user details to NPS server which in turn communicates to Azure. the samaccountname does not match to the mail attribute synced to Azure. The scenario we have currently is for the users who have samaccountname as "test" and mail atribute synced to azure as test.n i.e. access a free security e-token by downloading the Symantec VIP Access app. ![]() In the cloud, where a traditional enterprise perimeter doesn't exist, this solution fills the gap. This resolves my half of the problem.I tested 2nd factor using NPS and it is working fine only for the user whose samaccountname matches the mail attribute which is synced to Azure AD. Internet banking gives you convenient, secure access to your banking at a time. Symantec VIP Access Manager solves cloud security problems using identity and/or context-based access control across multiple cloud applications. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |