<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.1 using Active Directory to manage network device Admin po in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985748#M202262</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you should have user on internal database and on AD too and then select user to check password against any configured database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create an attribute "ACS-RESERVED-Authen-ID-Store" with String type under System Administration &amp;gt; configuration &amp;gt; Dictionaries &amp;gt; Identity&amp;gt; Internal Users". and Set this attribute's corresponding value in the internal user "User1" as AD1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Set the identity store as Internal users in Access Policies. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can then edit the user in the internal databse as per your requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 16 Jun 2012 01:51:21 GMT</pubDate>
    <dc:creator>Jatin Katyal</dc:creator>
    <dc:date>2012-06-16T01:51:21Z</dc:date>
    <item>
      <title>ACS 5.1 using Active Directory to manage network device Admin policy</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985741#M202175</link>
      <description>&lt;P&gt;Hi guys, we've configured an ACS 5.1 and integrated it with active directory Win2K3, we created two groups in the AD for managing network devices one for Administrators and the other for operators (read-only),&amp;nbsp; so we configured a device admin policy and both groups work fine, but now we are facing a little problem any user who exists in the AD can login (user exec mode) in the network devices and we want to restric the login with the policy, but we just don't know how.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Is there a way to get a user be authenticated against external group or internal acs but at user level, just like you can do it in the ACS 4.X?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Oscar&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985741#M202175</guid>
      <dc:creator>ochalmers</dc:creator>
      <dc:date>2019-03-11T02:12:18Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1 using Active Directory to manage network device Admin po</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985742#M202185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Select&lt;STRONG&gt; Policy Elements &amp;gt; Authorization and Permissions&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Device Administration &amp;gt; Shell Profiles&lt;/STRONG&gt; then edit the shell profile and choose Not in use for privilege level there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Submit the changes and try again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 23:42:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985742#M202185</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2012-06-15T23:42:53Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1 using Active Directory to manage network device Admin po</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985743#M202199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Katyal, the normal user (Not Administrators or Operartors) are falling in the permit acces shell profile and i can not modify it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2012 00:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985743#M202199</guid>
      <dc:creator>ochalmers</dc:creator>
      <dc:date>2012-06-16T00:10:47Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1 using Active Directory to manage network device Admin po</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985744#M202211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yeah you cannot edit that, it's a default shell profile. All you need to do create a new one with privilege level "not in use" and select the new shell profile for (Not Administrators or Operartors) under Default Device Admin &amp;gt;&amp;gt; authorization profile &amp;gt;&amp;gt; edit it and make changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2012 00:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985744#M202211</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2012-06-16T00:14:32Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1 using Active Directory to manage network device Admin po</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985745#M202224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Normal users are still falling in&amp;nbsp; permit acces shell profile, i think it is because all user match the "Identity Policy Matched Rule" which matches "protocol tacacs" i've tried to find an attribute to make a difference like the groups that we configured in the AD, but i still haven't found it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now i modified the identity rule and&amp;nbsp; adding a compound condition "system username" and it works, but i have to include every administrator and opertator, do you think there is an easy way to accomplish this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2012 00:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985745#M202224</guid>
      <dc:creator>ochalmers</dc:creator>
      <dc:date>2012-06-16T00:56:11Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1 using Active Directory to manage network device Admin po</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985746#M202241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can categorise using internal groups since devices and protocol are same in both the cases.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jatin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2012 01:15:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985746#M202241</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2012-06-16T01:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1 using Active Directory to manage network device Admi</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985747#M202245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now it's working as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; One last question, is it possible that users from a same group could be authenticated using AD and others using acs internal database, i mean we could choose authentication method at user level?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so much for your help.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Oscar &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2012 01:38:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985747#M202245</guid>
      <dc:creator>ochalmers</dc:creator>
      <dc:date>2012-06-16T01:38:17Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1 using Active Directory to manage network device Admin po</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985748#M202262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you should have user on internal database and on AD too and then select user to check password against any configured database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create an attribute "ACS-RESERVED-Authen-ID-Store" with String type under System Administration &amp;gt; configuration &amp;gt; Dictionaries &amp;gt; Identity&amp;gt; Internal Users". and Set this attribute's corresponding value in the internal user "User1" as AD1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Set the identity store as Internal users in Access Policies. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can then edit the user in the internal databse as per your requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2012 01:51:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985748#M202262</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2012-06-16T01:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1 using Active Directory to manage network device Admi</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985749#M202302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In case you are running acs code below ACS 5.2.0.26 patch 2 then you won't be able to avail this feature. This was an enhancement request which got fixed in ACS 5.2 patch 2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSCtk32683&amp;nbsp;&amp;nbsp;&amp;nbsp; Authenticate internal DB user on external identity store&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2012 02:13:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-using-active-directory-to-manage-network-device-admin/m-p/1985749#M202302</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2012-06-16T02:13:51Z</dc:date>
    </item>
  </channel>
</rss>

