Guides
ProductDeveloperPartnerPersonal
Guides

Connect Active Directory to Umbrella

he Cisco Active Directory (AD) Connector integrates Cisco Umbrella with your instance of Microsoft AD. Before you can provision users and groups from Active Directory, connect your instance of AD to Umbrella by deploying an AD Connector.

This guide describes the steps to install the Cisco AD Connector for LDAP or LDAPS, and provision users and groups from your instance of Microsoft AD to Umbrella.

How to Configure the Setup of the AD Connector

The deployment of the AD Connector has various components. You can configure the Cisco AD Connector to provision users and groups from Microsoft AD using LDAP or LDAPS (domain controller or domain), or LDAP Interchange Format (LDIF) source files.

  1. (Optional) Configure authentication for the AD Connectors in your environment. For more information, see Configure Authentication for AD Connectors and VAs.
  2. Add a domain controller or domain in Umbrella for LDAP or LDAPS deployments.
  3. Download the software package for the AD Connector and install it on your server.
  4. (Optional) Configure the provisioning of users and groups with LDIF source files. For more information, see Deploy LDIF Files for Cisco AD Connector.
  5. Verify that the AD Connector begins to provision users and groups in Umbrella.

Table of Contents

Prerequisites

Register a Domain Controller or Domain in the Umbrella Dashboard

Active Directory integration requires you to register an AD domain controller or AD domain in the Umbrella dashboard. The Connector will perform an LDAP sync against this domain controller or domain to retrieve the user and group identities. The Connector Server must be able to communicate with the domain controller over port 389/636 TCP for LDAP sync or LDAP over SSL.

The Connector can only retrieve user and group identities from a single domain controller. If you register multiple domain controllers on the Umbrella dashboard, the Connector will only attempt to perform an LDAP sync against the first domain controller in the list. Ensure that the domain controller you are registering is not subject to any AD replication delays. Read-only Domain Controller (RODC) registrations are supported for retrieval of user and group identities.

If you need to periodically bring down your domain controller for maintenance or updates or your domain controllers are behind a load balancer that does not support LDAP queries, it is recommended to register the domain instead.

Note: If you have deployed any virtual appliances, you need to register all of your domain controllers that are handling Active Directory authentication. Otherwise, not all users and groups in the Active Directory will be identified.

Register a Domain Controller

  1. Navigate to Deployments > Configuration > Sites and Active Directory and click Add.
1324
  1. Select Domain Controller and click Next.
1000
  1. Confirm that you have provided permissions for the Connector account as specified in Prerequisites and click Next.
1008
  1. Enter the hostname, internal IP address, and the domain of the DC. Select the appropriate Umbrella site for the domain controller and click  Save.
    The Active Directory connector within the chosen Umbrella site will attempt to connect to your newly added domain controller. If all the required permissions have been configured, you should not experience any issues. If there are errors, review Prerequisites or contact Support.
1010

Register a Domain

  1. Navigate to Deployments > Configuration > Sites and Active Directory  and click Add.
  2. Select Domain and click Next.
1000
  1. Enter the Domain, select the appropriate Umbrella Site for the domain and click  Save.
1006

Specify AD Groups of Interest (Optional)

Optionally, you can specify AD Groups of interest for the purpose of policy creation in Umbrella.

  1. Identify the AD groups of interest. Users and computers belonging to these groups will be synchronized to Umbrella.
    For each sub-tree, only the parent group needs to be specified. All AD groups, users, and computers that are part of this parent group will automatically be included.
    Note: If Selective Sync is enabled, AD Users and Computers that are not members of Groups specified in CiscoADGroups.dat or their sub-groups not be synchronized to Umbrella and will be completely exempt from Umbrella Policies and Reporting.
  2. Create a CiscoADGroups.dat file in the C:\ drive of each machine where the connector will be installed.
    The connector will only read the C:\CiscoADGroups.dat file. If the file is incorrectly named or is not present in the C:\ drive, all groups will be imported to Umbrella.
  3. List the AD groups that need to be synchronized in distinguished name (DN) format in this file.

👍

Supported OUs

Not Supported: OU=My OU,OU=Organizational Unit,DC=sample,DC=local
Supported: CN=My Group,OU=Organizational Unit,DC=sample,DC=local

Sample file entries:

  • CN=Engineering,CN=Builtin,DC=ciscoumbrella,DC=com
  • CN=Sales,CN=Builtin,DC=ciscoumbrella,DC=com
  • CN=Marketing,CN=Builtin,DC=ciscoumbrella,DC=com
  1. Ensure that there are no blank lines anywhere in the file.
    Note: If you are running multiple connectors, the file C:\CiscoADGroups.dat should be present on each system running the connector and should be identical on each system.

👍

Total Number of Groups Selected for Synchronization

The total number of groups selected for synchronization—groups specified in the selective sync file and all their sub-groups—should not exceed 15,000. Also, these groups should not be nested within more than five OU levels. Selective synchronization fails in both cases. If either of these requirements cannot be met, the selective sync file should not be used so that a full AD tree synchronization can be done instead.

Install the Connector

  1. On the server that you have configured to deploy the connector, login to the Umbrella dashboard, navigate to  Deployments > Configuration > Sites and Active Directory and click Download.
  2. Click Download for Windows Service (Active Directory Connector).
    Note: You must download the ZIP file to the local machine where you plan to run it or copy it locally from another machine. Issues have been observed attempting to install the connector from networked drives as well as running the setup.msi directly from the compressed file.
868
  1. As an administrator, extract the contents of the CiscoConnector ZIP file that you downloaded from Secure Access to a folder on the server, and then navigate to that folder.
    Note: If you run the AD Connector installer files from the root directory of your server, you may encounter installation errors.
  2. Run setup.msi, and then in the Cisco Connector Setup wizard, click Next.


  1. Choose the directory on the server to install the Cisco AD Connector.
  1. Confirm that you permit your AD Users and Groups to sync to Secure Access from the Cisco AD Connector.
  1. Add your Active Directory credentials. Enter the Username of the Cisco AD Connector user (Cisco_Connector or custom username) and the Password. For more information, see Prerequisites.
  2. Follow the remaining prompts in the setup and when finished, click Close.
  3. Return to the Umbrella dashboard. Verify that the Cisco AD Connector is in the same Umbrella site as the domain controller or domain that it needs to communicate with.

Verify That the Connector Syncs with the Umbrella Dashboard


Configure Updates on AD Connectors < Connect Active Directory to Umbrella > Deploy LDIF Files for AD Connector