<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.3 - TACACS+ - Returning a different Username to Juniper Device in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-returning-a-different-username-to-juniper-device/m-p/3816756#M24900</link>
    <description>The only way I have seen this was back in the ACS days with shadow accounts on Juniper.  You configure local accounts mapped to the permissions you want, and then from ACS/ISE you send back the user.  You leverage a custom attribute like local-user-name to accomplish this.  Pretty sure that's what you are trying to avoid.  &lt;BR /&gt;&lt;BR /&gt;On juniper you would create a RO and super user accounts, set up for the roles you want.  ISE authentication still takes place as it would, creating authorization rules based on the AD accounts.  Then with the result you send back RO account with "local-user-name" if they match RO only access, and super if they match super.  Worked good.&lt;BR /&gt;&lt;BR /&gt;Juniper has their short list of attributes documented.  Have you considered the allow-configuration and deny-configuration, would it accomplish what you need? &lt;BR /&gt;&lt;A href="https://www.juniper.net/documentation/en_US/src4.7/topics/reference/general/tacas-radius-authentication-attributes.html" target="_blank"&gt;https://www.juniper.net/documentation/en_US/src4.7/topics/reference/general/tacas-radius-authentication-attributes.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Sat, 09 Mar 2019 12:56:32 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2019-03-09T12:56:32Z</dc:date>
    <item>
      <title>ISE 2.3 - TACACS+ - Returning a different Username to Juniper Device</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-returning-a-different-username-to-juniper-device/m-p/3814464#M24899</link>
      <description>&lt;P&gt;I am running ISE 2.3 as a tacacs+ server.&amp;nbsp; I have it working well with my Cisco devices.&amp;nbsp; It is integrated with AD as an external identity source.&amp;nbsp; I am using a default authentication policy that checks against AD.&amp;nbsp; I also have a couple different authorization policies: one that grants shell access with full access, and one that grants shell access with only access to "show" commands.&amp;nbsp; Those work great on all my Cisco devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My problem is that I have a bunch of Juniper firewalls.&amp;nbsp; They are configured so that user "remote" has operator level privilege, and the user "remote-su" has super-user privilege.&amp;nbsp; When any users authentication with ISE, they are brought in as "remote" and are only given "operator" privilege.&amp;nbsp; I am looking for a way to come back to the Juniper with the user name "remote" or "remote-su".&amp;nbsp; Something like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Case 1:&lt;/P&gt;
&lt;P&gt;User jsmith logs in&lt;/P&gt;
&lt;P&gt;hits ISE &amp;gt; he is a network admin&lt;/P&gt;
&lt;P&gt;return "remote-su" username to Juniper&lt;/P&gt;
&lt;P&gt;he is given super-user privilege&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Case 2:&lt;/P&gt;
&lt;P&gt;User ajones logs in&lt;/P&gt;
&lt;P&gt;hits ISE &amp;gt; he is a helpdesk tech&lt;/P&gt;
&lt;P&gt;returns "remote" username to Juniper&lt;/P&gt;
&lt;P&gt;he is given operator privilege&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've been doing lots of reading, and haven't come up with a way to accomplish this specific task.&amp;nbsp; Does anyone know of a way to do this?&amp;nbsp; If there is a better way to do it that doesn't involve passing the usernames remote/remote-su back to the Juniper, I'm all ears as well.&amp;nbsp; It just seemed like one possible solution.&amp;nbsp; I know I can go into each Juniper and specify permissions for jsmith and ajones, but that defeats the purpose of using ISE.&amp;nbsp; I want everything to be configured in AD and ISE, as far as user accounts and permissions go.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 19:15:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-returning-a-different-username-to-juniper-device/m-p/3814464#M24899</guid>
      <dc:creator>jake.pratt@rate.com</dc:creator>
      <dc:date>2019-03-05T19:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 - TACACS+ - Returning a different Username to Juniper Device</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-returning-a-different-username-to-juniper-device/m-p/3816756#M24900</link>
      <description>The only way I have seen this was back in the ACS days with shadow accounts on Juniper.  You configure local accounts mapped to the permissions you want, and then from ACS/ISE you send back the user.  You leverage a custom attribute like local-user-name to accomplish this.  Pretty sure that's what you are trying to avoid.  &lt;BR /&gt;&lt;BR /&gt;On juniper you would create a RO and super user accounts, set up for the roles you want.  ISE authentication still takes place as it would, creating authorization rules based on the AD accounts.  Then with the result you send back RO account with "local-user-name" if they match RO only access, and super if they match super.  Worked good.&lt;BR /&gt;&lt;BR /&gt;Juniper has their short list of attributes documented.  Have you considered the allow-configuration and deny-configuration, would it accomplish what you need? &lt;BR /&gt;&lt;A href="https://www.juniper.net/documentation/en_US/src4.7/topics/reference/general/tacas-radius-authentication-attributes.html" target="_blank"&gt;https://www.juniper.net/documentation/en_US/src4.7/topics/reference/general/tacas-radius-authentication-attributes.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 09 Mar 2019 12:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-returning-a-different-username-to-juniper-device/m-p/3816756#M24900</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-03-09T12:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 - TACACS+ - Returning a different Username to Juniper Device</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-returning-a-different-username-to-juniper-device/m-p/3817410#M24901</link>
      <description>&lt;P&gt;Thank you for your reply Damien!&amp;nbsp; What you're describing is exactly what I'm trying to do.&amp;nbsp; However, I'm not sure exactly how to pass the "local-user-name" back to Juniper.&amp;nbsp; Any help on how to do that?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:10:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-tacacs-returning-a-different-username-to-juniper-device/m-p/3817410#M24901</guid>
      <dc:creator>jake.pratt@rate.com</dc:creator>
      <dc:date>2019-03-11T14:10:39Z</dc:date>
    </item>
  </channel>
</rss>

