<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ACS AD authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-acs-ad-authentication/m-p/2406443#M119026</link>
    <description>&lt;P&gt;Hi there !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im currently deploying Cisco ACS 5.4 on our netwrok and im looking into some extra measures to secure authentication and authorization to devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to ask if anyone has tips on the following since i may have been confused myself for wanting to do it this way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok users as of now are authenticated from an external identity store (Active Directory). I would liek to know if theres a way to also authenticate these users or authorize them from ACS so that when for example the IT Department adds a user that should not be in a group, but the group is authenticated for a set of devices, that user will nto be able to access the devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A more simple explanation is as follows.&lt;/P&gt;&lt;P&gt;Groups e.t.c are ficitonal &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have group in AD called "Engineers" containing 2 users, user A and user B. &lt;/P&gt;&lt;P&gt;Engineers have a shell profile on ACS that grants them Super-user permissions/privileges on devices.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;However Active Directory is managed by the IT department which might be social engineered to add user C in this group.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;What i need to find out is a way to only allow user A and user B to access the devices while maintaining the shell profile with the AD group "Engineers"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I am aware of compund conditions in authorization profiles/rules. Will that mean i will have to create local users as well and assign them their passwords as well?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Im a bit confused as you can see...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Any help will be greatly appreciated!!!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks! &lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 04:09:01 GMT</pubDate>
    <dc:creator>spyrosandreou</dc:creator>
    <dc:date>2019-03-11T04:09:01Z</dc:date>
    <item>
      <title>Cisco ACS AD authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-ad-authentication/m-p/2406443#M119026</link>
      <description>&lt;P&gt;Hi there !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im currently deploying Cisco ACS 5.4 on our netwrok and im looking into some extra measures to secure authentication and authorization to devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to ask if anyone has tips on the following since i may have been confused myself for wanting to do it this way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok users as of now are authenticated from an external identity store (Active Directory). I would liek to know if theres a way to also authenticate these users or authorize them from ACS so that when for example the IT Department adds a user that should not be in a group, but the group is authenticated for a set of devices, that user will nto be able to access the devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A more simple explanation is as follows.&lt;/P&gt;&lt;P&gt;Groups e.t.c are ficitonal &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have group in AD called "Engineers" containing 2 users, user A and user B. &lt;/P&gt;&lt;P&gt;Engineers have a shell profile on ACS that grants them Super-user permissions/privileges on devices.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;However Active Directory is managed by the IT department which might be social engineered to add user C in this group.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;What i need to find out is a way to only allow user A and user B to access the devices while maintaining the shell profile with the AD group "Engineers"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I am aware of compund conditions in authorization profiles/rules. Will that mean i will have to create local users as well and assign them their passwords as well?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Im a bit confused as you can see...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Any help will be greatly appreciated!!!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks! &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:09:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-ad-authentication/m-p/2406443#M119026</guid>
      <dc:creator>spyrosandreou</dc:creator>
      <dc:date>2019-03-11T04:09:01Z</dc:date>
    </item>
    <item>
      <title>Cisco ACS AD authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-ad-authentication/m-p/2406444#M119033</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since user C would be added to the same group that already contains users A and B, and the authorization rule is configured to grant the super-user access based on users A and B membership on group Engineering, then user C will also be granted that access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS has no way of knowing what users are members of the Engineering group, nor can it detect that user C has been incorrectly added.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to use AD credentials, and at the same time maintain a canonical list of users for ACS to check, you will need to create local users on ACS, as you suggested above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 20:29:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-ad-authentication/m-p/2406444#M119033</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2013-12-03T20:29:55Z</dc:date>
    </item>
    <item>
      <title>Cisco ACS AD authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-ad-authentication/m-p/2406445#M119053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi javier and thanks for repying!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I truly understand what you are saying, whats the point of adding the external store if you will be authenticating users from another local one. I mean the whole point is to get everything from somewhere that is already organised and go from there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, what confused me into believing that this might be possible are the&lt;/P&gt;&lt;P&gt;Compound conditions and if there was some way for the ACS to match a kind of string to the already authenticated user coming from AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In any case i guess thats not possible so ill stop looking for a way to do it!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 22:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-ad-authentication/m-p/2406445#M119053</guid>
      <dc:creator>spyrosandreou</dc:creator>
      <dc:date>2013-12-03T22:18:39Z</dc:date>
    </item>
  </channel>
</rss>

