<p dir="ltr">Thanks for the reply.</p>
<p dir="ltr">If I use LDAP bind and PAP would that mean running 'radiusd -X' on the radius server would display users' AD password in plaintext when showing the contents of the Access-Request?</p>
<p dir="ltr">Thanks<br>
-Luke</p>
<div class="gmail_quot<blockquote class=" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
On 27 Jan 2014, at 21:57, Luke Ramsden <<a href="mailto:lukermsdn@gmail.com">lukermsdn@gmail.com</a>> wrote:<br>
<br>
> Hi, I am trying to authenticate SSH logins to my Cisco 3750 switches using RADIUS/Active Directory. I think this means I will need the Cisco switches to send an MSCHAPv2 challenge to the RADIUS server? I am struggling to achieve this and wondered if anyone else had come across this and could offer some advice?<br>
><br>
> Essentially, all I want is to remotely access the switches on my network using Active Directory credentials. Are there any other/better methods if the above is not possible?<br>
<br>
They'll support PAP, in which case you can just use LDAP auth (LDAP Bind) against the AD server. You don't need to use MSCHAPv2.<br>
<br>
-Arran<br>
<br>
Arran Cudbard-Bell <<a href="mailto:a.cudbardb@freeradius.org">a.cudbardb@freeradius.org</a>><br>
FreeRADIUS Development Team<br>
<br>
FD31 3077 42EC 7FCD 32FE 5EE2 56CF 27F9 30A8 CAA2<br>
<br>
<br>-<br>
List info/subscribe/unsubscribe? See <a href="http://www.freeradius.org/list/users.html" target="_blank">http://www.freeradius.org/list/users.html</a><br></div>