<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Type of Users created in Cisco ACS!!  in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/type-of-users-created-in-cisco-acs/m-p/1077747#M364603</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not easy to answer. You need to start with what your organisation wants/needs to achieve and then figure out how to implement in ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically customers may have several groups of device administrators - perhaps on geography, BU or similar.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device Command Sets (DCS) can be used to defined the various sets of permissions that any one group should get.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you define your devices in Network Device Groups you can, for any given group, map to different DCS based upon which NDG is being accessed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ie you can implement Role Based Access Control. This allows you to give say full access to Group A when managing device group X and perhaps read only when managing device group Y.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the starting point is what your business needs and not what you can do in ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Jan 2009 09:17:40 GMT</pubDate>
    <dc:creator>darpotter</dc:creator>
    <dc:date>2009-01-08T09:17:40Z</dc:date>
    <item>
      <title>Type of Users created in Cisco ACS!!</title>
      <link>https://community.cisco.com/t5/network-access-control/type-of-users-created-in-cisco-acs/m-p/1077745#M364573</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;   I have just configured Cisco ACS for windows .In that i created two users, GUEST &amp;amp; ADMIN. ADMIN has all the rights but guest can only run "show" commands. Now my Bose is asking me to create different users &amp;amp; provide different priviledges  to them.he asked me to use the best practices followed in industries. &lt;/P&gt;&lt;P&gt; So my query is : commonly what type of &amp;amp; how many users are created in Cisco ACS &amp;amp; what type of different priviledges provided to each? I know this is some thing not technical but still an expert who is familiar with its installations can answer/ show the road map to me!!!&lt;/P&gt;&lt;P&gt;Please its urgent!! i have only 1 day time!!! &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/type-of-users-created-in-cisco-acs/m-p/1077745#M364573</guid>
      <dc:creator>rajeev.payal</dc:creator>
      <dc:date>2019-03-10T23:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: Type of Users created in Cisco ACS!!</title>
      <link>https://community.cisco.com/t5/network-access-control/type-of-users-created-in-cisco-acs/m-p/1077746#M364586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are three types of users. Their significance varies depending on whether the service requested is authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)Known users&lt;/P&gt;&lt;P&gt;2)Unknown users&lt;/P&gt;&lt;P&gt;3)Discovered users&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.0/user/guide/qu.html#wp277143" target="_blank"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.0/user/guide/qu.html#wp277143&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Dec 2008 17:14:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/type-of-users-created-in-cisco-acs/m-p/1077746#M364586</guid>
      <dc:creator>vkapoor5</dc:creator>
      <dc:date>2008-12-09T17:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: Type of Users created in Cisco ACS!!</title>
      <link>https://community.cisco.com/t5/network-access-control/type-of-users-created-in-cisco-acs/m-p/1077747#M364603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not easy to answer. You need to start with what your organisation wants/needs to achieve and then figure out how to implement in ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically customers may have several groups of device administrators - perhaps on geography, BU or similar.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device Command Sets (DCS) can be used to defined the various sets of permissions that any one group should get.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you define your devices in Network Device Groups you can, for any given group, map to different DCS based upon which NDG is being accessed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ie you can implement Role Based Access Control. This allows you to give say full access to Group A when managing device group X and perhaps read only when managing device group Y.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the starting point is what your business needs and not what you can do in ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Jan 2009 09:17:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/type-of-users-created-in-cisco-acs/m-p/1077747#M364603</guid>
      <dc:creator>darpotter</dc:creator>
      <dc:date>2009-01-08T09:17:40Z</dc:date>
    </item>
  </channel>
</rss>

