Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Synchronized User ID and username with domain name not working

I have my XG configured with AD authentication using SSO client. Everything works - each domain user gets what she/he is supose to get. Now when I try to use Synchronized User Id I cannot get it to work. What I see in authentication log is following:

- for SSO client - user name is sent as "samAcconuntName@domain name" which is properly matched to users imported from domain

- for Synchornized User Id - user name is sent as "samAccountName" and XG cannot find such user so authentication fails

My questions is following:

- can I force XG somehow to match "samAccountName" request to user "samAccountName@domain name"

- is there a way to force heartbeat to include domain name as well in packet

 

Pawel



This thread was automatically locked due to age.
Parents
  • After some research and reading access_server logs I found issue. In our AD env we are using multiple UPN prefixes for user authentication. When Endpoint is sending heartbeat message it is using UPN defined in AD account tab. If XG doesn't have this prefix configured under any AD server in field "domain name" request is rejected.

    My only complain is fact that in log viewer, XG is showing that user was received without any domain while actually reading acces server logs You can see which domain was attached to username in heartbeat message.

    Pawel 

Reply
  • After some research and reading access_server logs I found issue. In our AD env we are using multiple UPN prefixes for user authentication. When Endpoint is sending heartbeat message it is using UPN defined in AD account tab. If XG doesn't have this prefix configured under any AD server in field "domain name" request is rejected.

    My only complain is fact that in log viewer, XG is showing that user was received without any domain while actually reading acces server logs You can see which domain was attached to username in heartbeat message.

    Pawel 

Children
  • Yes, exactly. My problem was also caused by this.

  • Hello Michal,

    we have found that sAMAccountName have to be identical to UPN to make the login user successful. We have opened for this case a ticket at the Sophos support. In our opinion, this is an implementation error, because sAMAccountName may not always be identical to UPN name.

    You could check it in your MS AD - User Properties - Attribute Editor ( should be enabled Advanced Features in View submenu).

    Regards

    alda

  • (I am no Windows / AD Guru, so please be careful with this knowledge).

    Already mentioned this early, we are using the SAMAccountname for User ID. XG is checking against the SAMAccountname and looking in AD for it. Not the UPN. 

    https://community.sophos.com/products/xg-firewall/f/authentication/109740/v17-5-user-sync-with-sophos-central-edr-eap-no-users-listed-in-live-users-view#pi2151=1

     

     

    And i saw some special customers with this setup, but nobody could explain to me the reason between different UPN to SAMAccountnames in their AD. There was some kind of surname.name@domain.com as UPN but the SAMAccountname was domain\name, which is pretty unique. Seems like this is some "Historical grown environment". 

    https://serverfault.com/questions/928115/user-principal-name-vs-sam-account-name

    https://docs.microsoft.com/de-de/windows/desktop/AD/naming-properties

     

    __________________________________________________________________________________________________________________

  • Hello LuCar,

    we are sadly confronted with the problem with a customer implementation of Synchronize Security ( Security Heartbeat too of course ) with many thousands of users in whose environment. And for many implementation reasons in this environment does not apply that sAMAccountName must be identical to UPN.

    As I mentioned we already have an open support ticket to this problem, so I can send you a ticket number to your PM.

    Regard

    alda

  • Better ping the Case ID to  

    But can you explain to me in more details those implementation reasons? 

    I am just curious, want to expand my knowledge. 

    __________________________________________________________________________________________________________________

  • Hello LuCar,

    I do not know implementation details for this enviroment. We were asked by a customer to implement the Synchronize Security. And for this reason we can not finish our task. In my opinion the problem is not in the XG but in a Central end-point client. This client will accidentally send the UPN name instead of sAMAccountName if these two user attributes are not identical.

    That's all ...

    Regards

    alda

  • You can simply deactivate Synchronized User ID and use an alternative / Pre V17.5 User Authentication until there is a way to work with this feature for this customer. 

    The Point is, Synchronized User ID is not an Security Feature of the Synchronized Security Story. It is just another approach to simplify the authentication. 

    All "Security Features" of Synchronized Security will work without Synchronized User ID. 

    Here is a command "how to deactivate this feature".

    https://community.sophos.com/kb/en-us/133190

    __________________________________________________________________________________________________________________

  • Hi Pawel,

     

    I have same problem: Heartbeat Authentication Failed because of wrong credentials. Your post is the only one that make sense with my tests..

    My configuration is: in Domain Name field on the XG Active directory server definition I've set my local domain (eg: contoso.local)

    Active directory authentication queries for Firewall and VPN are working and, on XG, all Users are created with SAMAccountname + @contoso.local extension (eg: UserA@contoso.local)

    Instead I see that Heartbeat authentication that send to AD SAMAccountname + UPN extention (eg: UserA@contoso.com). That is clear on access_server.log. This is the reason for fails.

     

    Now to solved I've to change the Domain Name field on the XG Active directory server definition to my UPN extentioin (contoso.com). I've done a test about and results are:

    Heartbeat works but ALL VPN clinet connections fails! 

     

    LuCar Tony say: Already mentioned this early, we are using the SAMAccountname for User ID. XG is checking against the SAMAccountname and looking in AD for it. Not the UPN.

     

    I'm really confused and worried about.

    Someone have any Idea how to fix this problem and WHY ALL AUTHENTICATION ARE WORKING WITH SAMAccountname + @contoso.local AND ONLY HEARTBEAT NOT ????

  • Hello,

     

    We had same issue, VPN connections now fail, because the users now need to download their VPN profiles again (because of the certificate change).

    Your user certificate still looks like user@contoso.local, but XG is expecting user@contoso.com. 

    Try to download new VPN profile from the user portal and it should work.

  • Thank You Michael,

     

    Thant is ok for a 10 user vpn Deployment. But I've more than 100 user spread all over the word.

    This is not a solution that make any sense!!!