<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Default mapping explained with example for Admin logon using AAA in vSZ in RUCKUS Self-Help</title>
    <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/Default-mapping-explained-with-example-for-Admin-logon-using-AAA/m-p/60938#M161</link>
    <description>&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;U&gt;Default mapping explained with example for Admin logon using AAA in vSZ&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Question- When should I use default mapping with SZ admin login using RADIUS and how does it work.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;As we know that RADIUS Vendor-specific attribute "Ruckus-WSG-User" is used to map the AD user to a locally created admin-user on SZ and that AD user is given the same role (access-level) as the local admin-user on SZ.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;The “default-mapping” option is used when &lt;STRONG&gt;no&lt;/STRONG&gt; “Ruckus-WSG-User” attribute is returned by RADIUS server during successful authentication, but we would still want that AD user to be assigned a specific role/access-level on SZ which is defined by mapping to an Admin "user-group" on SZ. Default-mapping was introduced from SZ 5.1.2 version onwards.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;One of the most common use-cases of Default mapping for SZ admin using RADIUS/AAA is when you have users from different Groups on AD and you want to maintain a difference in SZ access-level between users of two different groups on AD :-&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;OL&gt;&lt;LI&gt;For example, I have some admin users on AD (say admin1 and admin2) and I have made them a member of AD group “szadmin_fullaccess”. I want these AD users to be authenticated using RADIUS and get Super Admin access.&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;On the other hand, I also have other domain users on AD ( say Bob, Alice etc.) who I just need to provide Read_only access to SZ and they are a member of “domain users” group on AD. Now, I am going to show how we can achieve this using default-mapping. I am going to use SZ ( any version 5.1.2 &amp;amp; above), Windows Server as NPS and AD.&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;U&gt;Configuration on AD side&lt;/U&gt;&lt;/STRONG&gt; :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;1. Created AD user “Bob” and added it to security group “Domain Users”&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_18-1686945383529.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6969iB80BD90EF6724CD1/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_18-1686945383529.png" alt="Dilshad_Zafar_18-1686945383529.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;2. Create an AD User “admin1” and move it to an AD group ““szadmin_fullaccess”.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_19-1686945383543.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6968iB31C9B599F1BCAAF/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_19-1686945383543.png" alt="Dilshad_Zafar_19-1686945383543.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;U&gt;Configuration on vSZ side&lt;/U&gt;&lt;/STRONG&gt; :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;1. Now, we move to vSZ and create a local admin user “admin_full_access” and give it a random password. Note that this local password would not be utilized if the authentication is happening using AAA.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_20-1686945383547.png" style="width: 456px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6967i53D5368980DE4857/image-dimensions/456x228/is-moderation-mode/true?v=v2" width="456" height="228" role="button" title="Dilshad_Zafar_20-1686945383547.png" alt="Dilshad_Zafar_20-1686945383547.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;2. Now, we go to Groups under Administrator and inside the already existing user-group “Super Admin Group”, we include our newly created local admin “admin_full_access” to assign this user super-admin privileges.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_21-1686945383556.png" style="width: 428px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6970i1D656EA62DA460AB/image-dimensions/428x278/is-moderation-mode/true?v=v2" width="428" height="278" role="button" title="Dilshad_Zafar_21-1686945383556.png" alt="Dilshad_Zafar_21-1686945383556.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;3. Next, we would create another admin User-Group called “read_only_access” and give it “Read-Only Network admin” permission and we would not map any local admin to this. This is because we would like SZ to automatically generate a local user into this group by leveraging “default-mapping”.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_22-1686945383561.png" style="width: 453px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6971i09BF7CE957035421/image-dimensions/453x231/is-moderation-mode/true?v=v2" width="453" height="231" role="button" title="Dilshad_Zafar_22-1686945383561.png" alt="Dilshad_Zafar_22-1686945383561.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;4. Then, we configure the NPS details under Administration &amp;gt; Admin &amp;amp; Roles &amp;gt; AAA &amp;gt; Create. Realm needs to be same as the domain name. Select PAP as the protocol. As per our requirement explained earlier, we need to enable “default mapping” and select user group as “read_only_access” and select “auto-generate” under administrator option. This config ensures that if the authentication is successful but RADIUS server does "not" return the Ruckus-WSG-User VSA attribute, then that AD user will be mapped to this user-group (read_only_access) and SZ will auto-generate a local admin user on SZ corresponding to it.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_23-1686945383574.png" style="width: 483px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6972i0BC13ED9CEF272F3/image-dimensions/483x272/is-moderation-mode/true?v=v2" width="483" height="272" role="button" title="Dilshad_Zafar_23-1686945383574.png" alt="Dilshad_Zafar_23-1686945383574.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_24-1686945383583.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6973iDAB798597C707DE5/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_24-1686945383583.png" alt="Dilshad_Zafar_24-1686945383583.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;U&gt;Configuration on NPS side&lt;/U&gt;&lt;/STRONG&gt; :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;1. Now we move to NPS side and add the vSZ IP as a RADIUS client. This portion is pretty-straightforward so skipping for the sake of brevity.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;2. Go to Network Policies under Policy section on the NPS and create a new policy say “szadmin_full_access” and select “unspecified” as type of network access server and click Next to add the conditions.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_25-1686945383617.png" style="width: 514px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6975i216FD4FE7228E732/image-dimensions/514x237/is-moderation-mode/true?v=v2" width="514" height="237" role="button" title="Dilshad_Zafar_25-1686945383617.png" alt="Dilshad_Zafar_25-1686945383617.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;3. In the specify conditions, click “add” and select “Windows Groups”. Click “add” again and select the AD group ” szadmin_fullaccess”. Click OK &amp;gt; Click Next and then select “Access Granted” and click “Next”.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_26-1686945383636.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6974iB6C6E184CC2F62CE/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_26-1686945383636.png" alt="Dilshad_Zafar_26-1686945383636.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_27-1686945383647.png" style="width: 430px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6976iF67ACB31C41E337B/image-dimensions/430x261/is-moderation-mode/true?v=v2" width="430" height="261" role="button" title="Dilshad_Zafar_27-1686945383647.png" alt="Dilshad_Zafar_27-1686945383647.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;4. Now, we get the option of selecting the authentication methods, we must select PAP as one of the auth methods for SZ admin logon to support. Now, select “Next” and click No if a warning about unsecure auth appears to proceed further.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_28-1686945383674.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6977i04ED7E1A5387C163/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_28-1686945383674.png" alt="Dilshad_Zafar_28-1686945383674.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;5. Select “Next” and go the “Configure Settings” page and select “Vendor specific” from the Radius Attributes. Click on “Add”. Scroll to the BOTTOM of this window and select “Vendor-Specific” and click on Add.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_29-1686945383692.png" style="width: 471px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6978i1D5FFCB09FBFD617/image-dimensions/471x213/is-moderation-mode/true?v=v2" width="471" height="213" role="button" title="Dilshad_Zafar_29-1686945383692.png" alt="Dilshad_Zafar_29-1686945383692.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;6. Click on “Add” again. Select “Enter Vendor Code” to modify the Vendor Code and enter in the value 25053. Click on “Yes. it does conform”.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_30-1686945383697.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6979iD91359454580FCD8/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_30-1686945383697.png" alt="Dilshad_Zafar_30-1686945383697.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;7. Now select “configure attribute”. Modify the “Vendor-Assigned attribute number” to 10. Change the “Attribute format” to String from Hexadecimal. Change the “Attribute value” to the local SZ admin which we want our AD admins to mapped to. In our case it would be the value “admin_full_access”.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_31-1686945383703.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6980iB473FFC1FC83164E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_31-1686945383703.png" alt="Dilshad_Zafar_31-1686945383703.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;8. Now click “OK” and review your settings and the click “Finish” to complete the network policy settings.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_32-1686945383721.png" style="width: 499px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6981i591EC29C02E62736/image-dimensions/499x197/is-moderation-mode/true?v=v2" width="499" height="197" role="button" title="Dilshad_Zafar_32-1686945383721.png" alt="Dilshad_Zafar_32-1686945383721.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;9. Note that the above rule was to authenticate the users from the specified AD group and then return the Vendor-specific attribute to match the local user created on SZ. Now, we need to create another rule for Domain Users who would just end up with Read only access and will not return any vendor-specific attribute on authentication and therefore SZ will map them using the settings specified under “Default Mapping”. The steps for this rule are same as above except : &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;A&lt;/STRONG&gt;. Under Windows Groups, choose “Domain Users”.&amp;nbsp; &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;B&lt;/STRONG&gt;. Skip the Vendor specific attributes configuration.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;10. We would call the second rule as “sz_read_only_policy” and have given it a processing order 2 so that this rule is checked after the first rule “szadmin_full_access” is not matched :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_33-1686945383740.png" style="width: 484px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6984i3F305A0D1C8124AE/image-dimensions/484x202/is-moderation-mode/true?v=v2" width="484" height="202" role="button" title="Dilshad_Zafar_33-1686945383740.png" alt="Dilshad_Zafar_33-1686945383740.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;11. Now we are done in terms of configuration on all sides and it’s time to test it.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;U&gt;Testing and Validation&lt;/U&gt;&lt;/STRONG&gt; :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;1. Go to “Test AAA” section and first we would test our AD user “admin1” which is supposed to get Super Admin access as per the policy configured. We can see it got mapped to the local user “admin_full_access” which is a member of Super Admin user group on SZ. (Make sure to add the realm/domain in the user name) :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_34-1686945383747.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6982i88082A4FACC7004F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_34-1686945383747.png" alt="Dilshad_Zafar_34-1686945383747.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;2. Now, we would test “Bob” who is regular Domain user and is supposed to get only Read_only access of SZ. We can see that Bob has been mapped to the default role and SZ has auto-generated a user “user-4246746” under user-group “read_only_access” confirming Bob will only have read_only access to it.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_35-1686945383755.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6983iE59E1C80F8DB3986/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_35-1686945383755.png" alt="Dilshad_Zafar_35-1686945383755.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Feb 2024 00:04:07 GMT</pubDate>
    <dc:creator>Dilshad_Zafar</dc:creator>
    <dc:date>2024-02-06T00:04:07Z</dc:date>
    <item>
      <title>Default mapping explained with example for Admin logon using AAA in vSZ</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/Default-mapping-explained-with-example-for-Admin-logon-using-AAA/m-p/60938#M161</link>
      <description>&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;U&gt;Default mapping explained with example for Admin logon using AAA in vSZ&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Question- When should I use default mapping with SZ admin login using RADIUS and how does it work.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;As we know that RADIUS Vendor-specific attribute "Ruckus-WSG-User" is used to map the AD user to a locally created admin-user on SZ and that AD user is given the same role (access-level) as the local admin-user on SZ.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;The “default-mapping” option is used when &lt;STRONG&gt;no&lt;/STRONG&gt; “Ruckus-WSG-User” attribute is returned by RADIUS server during successful authentication, but we would still want that AD user to be assigned a specific role/access-level on SZ which is defined by mapping to an Admin "user-group" on SZ. Default-mapping was introduced from SZ 5.1.2 version onwards.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;One of the most common use-cases of Default mapping for SZ admin using RADIUS/AAA is when you have users from different Groups on AD and you want to maintain a difference in SZ access-level between users of two different groups on AD :-&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;OL&gt;&lt;LI&gt;For example, I have some admin users on AD (say admin1 and admin2) and I have made them a member of AD group “szadmin_fullaccess”. I want these AD users to be authenticated using RADIUS and get Super Admin access.&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;On the other hand, I also have other domain users on AD ( say Bob, Alice etc.) who I just need to provide Read_only access to SZ and they are a member of “domain users” group on AD. Now, I am going to show how we can achieve this using default-mapping. I am going to use SZ ( any version 5.1.2 &amp;amp; above), Windows Server as NPS and AD.&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;U&gt;Configuration on AD side&lt;/U&gt;&lt;/STRONG&gt; :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;1. Created AD user “Bob” and added it to security group “Domain Users”&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_18-1686945383529.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6969iB80BD90EF6724CD1/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_18-1686945383529.png" alt="Dilshad_Zafar_18-1686945383529.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;2. Create an AD User “admin1” and move it to an AD group ““szadmin_fullaccess”.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_19-1686945383543.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6968iB31C9B599F1BCAAF/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_19-1686945383543.png" alt="Dilshad_Zafar_19-1686945383543.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;U&gt;Configuration on vSZ side&lt;/U&gt;&lt;/STRONG&gt; :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;1. Now, we move to vSZ and create a local admin user “admin_full_access” and give it a random password. Note that this local password would not be utilized if the authentication is happening using AAA.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_20-1686945383547.png" style="width: 456px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6967i53D5368980DE4857/image-dimensions/456x228/is-moderation-mode/true?v=v2" width="456" height="228" role="button" title="Dilshad_Zafar_20-1686945383547.png" alt="Dilshad_Zafar_20-1686945383547.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;2. Now, we go to Groups under Administrator and inside the already existing user-group “Super Admin Group”, we include our newly created local admin “admin_full_access” to assign this user super-admin privileges.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_21-1686945383556.png" style="width: 428px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6970i1D656EA62DA460AB/image-dimensions/428x278/is-moderation-mode/true?v=v2" width="428" height="278" role="button" title="Dilshad_Zafar_21-1686945383556.png" alt="Dilshad_Zafar_21-1686945383556.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;3. Next, we would create another admin User-Group called “read_only_access” and give it “Read-Only Network admin” permission and we would not map any local admin to this. This is because we would like SZ to automatically generate a local user into this group by leveraging “default-mapping”.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_22-1686945383561.png" style="width: 453px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6971i09BF7CE957035421/image-dimensions/453x231/is-moderation-mode/true?v=v2" width="453" height="231" role="button" title="Dilshad_Zafar_22-1686945383561.png" alt="Dilshad_Zafar_22-1686945383561.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;4. Then, we configure the NPS details under Administration &amp;gt; Admin &amp;amp; Roles &amp;gt; AAA &amp;gt; Create. Realm needs to be same as the domain name. Select PAP as the protocol. As per our requirement explained earlier, we need to enable “default mapping” and select user group as “read_only_access” and select “auto-generate” under administrator option. This config ensures that if the authentication is successful but RADIUS server does "not" return the Ruckus-WSG-User VSA attribute, then that AD user will be mapped to this user-group (read_only_access) and SZ will auto-generate a local admin user on SZ corresponding to it.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_23-1686945383574.png" style="width: 483px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6972i0BC13ED9CEF272F3/image-dimensions/483x272/is-moderation-mode/true?v=v2" width="483" height="272" role="button" title="Dilshad_Zafar_23-1686945383574.png" alt="Dilshad_Zafar_23-1686945383574.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_24-1686945383583.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6973iDAB798597C707DE5/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_24-1686945383583.png" alt="Dilshad_Zafar_24-1686945383583.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;U&gt;Configuration on NPS side&lt;/U&gt;&lt;/STRONG&gt; :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;1. Now we move to NPS side and add the vSZ IP as a RADIUS client. This portion is pretty-straightforward so skipping for the sake of brevity.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;2. Go to Network Policies under Policy section on the NPS and create a new policy say “szadmin_full_access” and select “unspecified” as type of network access server and click Next to add the conditions.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_25-1686945383617.png" style="width: 514px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6975i216FD4FE7228E732/image-dimensions/514x237/is-moderation-mode/true?v=v2" width="514" height="237" role="button" title="Dilshad_Zafar_25-1686945383617.png" alt="Dilshad_Zafar_25-1686945383617.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;3. In the specify conditions, click “add” and select “Windows Groups”. Click “add” again and select the AD group ” szadmin_fullaccess”. Click OK &amp;gt; Click Next and then select “Access Granted” and click “Next”.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_26-1686945383636.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6974iB6C6E184CC2F62CE/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_26-1686945383636.png" alt="Dilshad_Zafar_26-1686945383636.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_27-1686945383647.png" style="width: 430px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6976iF67ACB31C41E337B/image-dimensions/430x261/is-moderation-mode/true?v=v2" width="430" height="261" role="button" title="Dilshad_Zafar_27-1686945383647.png" alt="Dilshad_Zafar_27-1686945383647.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;4. Now, we get the option of selecting the authentication methods, we must select PAP as one of the auth methods for SZ admin logon to support. Now, select “Next” and click No if a warning about unsecure auth appears to proceed further.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_28-1686945383674.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6977i04ED7E1A5387C163/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_28-1686945383674.png" alt="Dilshad_Zafar_28-1686945383674.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;5. Select “Next” and go the “Configure Settings” page and select “Vendor specific” from the Radius Attributes. Click on “Add”. Scroll to the BOTTOM of this window and select “Vendor-Specific” and click on Add.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_29-1686945383692.png" style="width: 471px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6978i1D5FFCB09FBFD617/image-dimensions/471x213/is-moderation-mode/true?v=v2" width="471" height="213" role="button" title="Dilshad_Zafar_29-1686945383692.png" alt="Dilshad_Zafar_29-1686945383692.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;6. Click on “Add” again. Select “Enter Vendor Code” to modify the Vendor Code and enter in the value 25053. Click on “Yes. it does conform”.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_30-1686945383697.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6979iD91359454580FCD8/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_30-1686945383697.png" alt="Dilshad_Zafar_30-1686945383697.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;7. Now select “configure attribute”. Modify the “Vendor-Assigned attribute number” to 10. Change the “Attribute format” to String from Hexadecimal. Change the “Attribute value” to the local SZ admin which we want our AD admins to mapped to. In our case it would be the value “admin_full_access”.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_31-1686945383703.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6980iB473FFC1FC83164E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_31-1686945383703.png" alt="Dilshad_Zafar_31-1686945383703.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;8. Now click “OK” and review your settings and the click “Finish” to complete the network policy settings.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_32-1686945383721.png" style="width: 499px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6981i591EC29C02E62736/image-dimensions/499x197/is-moderation-mode/true?v=v2" width="499" height="197" role="button" title="Dilshad_Zafar_32-1686945383721.png" alt="Dilshad_Zafar_32-1686945383721.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;9. Note that the above rule was to authenticate the users from the specified AD group and then return the Vendor-specific attribute to match the local user created on SZ. Now, we need to create another rule for Domain Users who would just end up with Read only access and will not return any vendor-specific attribute on authentication and therefore SZ will map them using the settings specified under “Default Mapping”. The steps for this rule are same as above except : &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;A&lt;/STRONG&gt;. Under Windows Groups, choose “Domain Users”.&amp;nbsp; &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;B&lt;/STRONG&gt;. Skip the Vendor specific attributes configuration.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;10. We would call the second rule as “sz_read_only_policy” and have given it a processing order 2 so that this rule is checked after the first rule “szadmin_full_access” is not matched :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_33-1686945383740.png" style="width: 484px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6984i3F305A0D1C8124AE/image-dimensions/484x202/is-moderation-mode/true?v=v2" width="484" height="202" role="button" title="Dilshad_Zafar_33-1686945383740.png" alt="Dilshad_Zafar_33-1686945383740.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;11. Now we are done in terms of configuration on all sides and it’s time to test it.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;U&gt;Testing and Validation&lt;/U&gt;&lt;/STRONG&gt; :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;1. Go to “Test AAA” section and first we would test our AD user “admin1” which is supposed to get Super Admin access as per the policy configured. We can see it got mapped to the local user “admin_full_access” which is a member of Super Admin user group on SZ. (Make sure to add the realm/domain in the user name) :-&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_34-1686945383747.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6982i88082A4FACC7004F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_34-1686945383747.png" alt="Dilshad_Zafar_34-1686945383747.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;2. Now, we would test “Bob” who is regular Domain user and is supposed to get only Read_only access of SZ. We can see that Bob has been mapped to the default role and SZ has auto-generated a user “user-4246746” under user-group “read_only_access” confirming Bob will only have read_only access to it.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dilshad_Zafar_35-1686945383755.png" style="width: 400px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/6983iE59E1C80F8DB3986/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Dilshad_Zafar_35-1686945383755.png" alt="Dilshad_Zafar_35-1686945383755.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2024 00:04:07 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/Default-mapping-explained-with-example-for-Admin-logon-using-AAA/m-p/60938#M161</guid>
      <dc:creator>Dilshad_Zafar</dc:creator>
      <dc:date>2024-02-06T00:04:07Z</dc:date>
    </item>
  </channel>
</rss>

