<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Different privelege level for Active directory users in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978530#M419548</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thaks alot for the link.we are using tacacs only.&lt;/P&gt;&lt;P&gt;Is it possible for a user to be a part of more than one usergroup and client device to be part of more than one Network device group?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 May 2008 07:22:03 GMT</pubDate>
    <dc:creator>anva12345</dc:creator>
    <dc:date>2008-05-20T07:22:03Z</dc:date>
    <item>
      <title>Different privelege level for Active directory users</title>
      <link>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978528#M419545</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have integrated Acs 4.1se with windows active directory.now we need to give certain users full privige to some client devices and only show level privilege to some devices.what is the neccessary steps required in ACS and ACS clients.Also how much time the dynamic users will remain in ACSthanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:51:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978528#M419545</guid>
      <dc:creator>anva12345</dc:creator>
      <dc:date>2019-03-10T22:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: Different privelege level for Active directory users</title>
      <link>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978529#M419546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Command authorization will work  only with TACACS and not with Radius. If you are using tacacs then checkout this link,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to pass only the privilege level then we need to pass via av pair. See the attachment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dynamic user will stay till the time you manually remove it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 May 2008 14:30:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978529#M419546</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2008-05-19T14:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: Different privelege level for Active directory users</title>
      <link>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978530#M419548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thaks alot for the link.we are using tacacs only.&lt;/P&gt;&lt;P&gt;Is it possible for a user to be a part of more than one usergroup and client device to be part of more than one Network device group?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2008 07:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978530#M419548</guid>
      <dc:creator>anva12345</dc:creator>
      <dc:date>2008-05-20T07:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Different privelege level for Active directory users</title>
      <link>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978531#M419550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;I forgot to add one more query&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After configuring neccessary steps in ACS for command authorization ,I am not able to to get into enable mode for Priv level 1 user.(read only access).I set priv level 1 under TACACS+ settings section,Because i want to give only show access(all show commands) to certain devices&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following error recived for enable command in router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command authorization failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For read&amp;amp; write access it is working fine.these r the configuration in router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2008 10:30:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978531#M419550</guid>
      <dc:creator>anva12345</dc:creator>
      <dc:date>2008-05-20T10:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: Different privelege level for Active directory users</title>
      <link>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978532#M419551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If you are using command authorization then privilage doesn't matter. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best way to set it up is to give all user priv lvl 15 and then define what all commands user can execute. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note : Having priv 15 does not mean that user will able to issue all commands. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We will set up command authorization on acs to have control on users. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how your config should look, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local &lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization config-commands &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default start-stop group tacacs+ &lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check out this link&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2008 13:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978532#M419551</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2008-05-20T13:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: Different privelege level for Active directory users</title>
      <link>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978533#M419553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also in acs one user or aaa-client can't be a part of more then one group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2008 13:23:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978533#M419553</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2008-05-20T13:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: Different privelege level for Active directory users</title>
      <link>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978534#M419554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks very much Jgambhir,Now it is working fine&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2008 14:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/different-privelege-level-for-active-directory-users/m-p/978534#M419554</guid>
      <dc:creator>anva12345</dc:creator>
      <dc:date>2008-05-20T14:54:40Z</dc:date>
    </item>
  </channel>
</rss>

