Hello, SA4500 FIPS (remote cluster) Version: 8.0R3:2 (build 30619) When I use an LDAP authentication server type to search AD, my custom expressions to match OU's work just fine (userDN.OU = "whatever"). When I do the same with an AD server type, they do not match. The directory is being searched and the attributes are being returned. I can see them just fine in the trace, but the rolemapping says "no match" for those rules. I configured everything from scratch for the AD auth - All new sign-in policy, auth server, realm, role mapping, expressions, etc. - just to be sure. I tried to match on both forms of the OU name listed in the variables. No luck. Again, this works just fine with LDAP as the auth type... and the logs look identical, except there is a match. Info PTR10305 2014/04/16 10:12:00 - Hostname - [*.*.*.*] - DOMAIN\user(Copy of Portal)[] - Variable userDN.OU = "OU NAME GOES HERE" Info PTR10305 2014/04/16 10:12:00 - Hostname - [*.*.*.*] - DOMAIN\user(Copy of Portal)[] - Variable
[email protected] Active Directory - New.OU = "OU NAME GOES HERE" Info PTR10218 2014/04/16 10:12:00 - Hostname - [*.*.*.*] - DOMAIN\user(Copy of Portal)[] - No match on rule 'userDN.OU = "OU NAME GOES HERE"' Info PTR10218 2014/04/16 10:12:00 - Hostname - [*.*.*.*] - DOMAIN\user(Copy of Portal)[] - No match on rule '{
[email protected] Active Directory - New.OU} = "OU NAME GOES HERE"' Any idea why this is happening?
... View more