<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity and passcode cache for External Radius Token Identity Source in ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/identity-and-passcode-cache-for-external-radius-token-identity/m-p/4012702#M454653</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;It was my bad, it is working now. Somehow my terminal client messed up everything. With Putty, it is working totally fine.&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;Norbert&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jan 2020 14:27:53 GMT</pubDate>
    <dc:creator>SzantaiNorbert</dc:creator>
    <dc:date>2020-01-16T14:27:53Z</dc:date>
    <item>
      <title>Identity and passcode cache for External Radius Token Identity Source in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-and-passcode-cache-for-external-radius-token-identity/m-p/4009457#M454589</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We successfully integrated an External Radius Token Identity Source to our ISE, but we would like to use the passcode and identity cache function, so the users could re-use their OTP for a short period of time.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even if i click the checkboxes to use them, i can see in the captures that ISE is sending a Access-Request to the RADIUS server every time, and - of course - the RADIUS server answer is an Access-Reject, because the OTP is invalid.&lt;/P&gt;&lt;P&gt;Do i misunderstood the password cache function? How should it work? Shouldnt ISE store the password somehow, and re-use it for a second or third time?&lt;/P&gt;&lt;P&gt;If thats not how it works, do you have any recommandation have to accomplish that?&lt;/P&gt;&lt;P&gt;Currently we are using ISE 2.4 with patch 8.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Norbert&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 10:16:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-and-passcode-cache-for-external-radius-token-identity/m-p/4009457#M454589</guid>
      <dc:creator>SzantaiNorbert</dc:creator>
      <dc:date>2020-01-13T10:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: Identity and passcode cache for External Radius Token Identity Source in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-and-passcode-cache-for-external-radius-token-identity/m-p/4010891#M454595</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_0100101.html#ID1666" target="_blank" rel="nofollow noopener noreferrer"&gt;Configure Authentication Control Options for RSA Identity Source&lt;/A&gt;&amp;nbsp;--&amp;gt; OTP Token Caching&lt;/P&gt;
&lt;P&gt;Enable Identity Caching is added in ISE 2.4 Patch 6. See&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/release_notes/b_ise_24_rn.html#id_104813" target="_blank" rel="noopener"&gt;New Features in Cisco ISE Release 2.4.0.357 - Cumulative Patch 6&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Please clarify how you are setting them to and how application/device is using the OTP. If the OTP server is configured for RADIUS challenges, I do not think it would work with OTP token caching.&lt;/P&gt;
&lt;P&gt;Also, the authentications need stay on the same PSN as the cache is not replicated to another.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 02:05:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-and-passcode-cache-for-external-radius-token-identity/m-p/4010891#M454595</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-01-14T02:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: Identity and passcode cache for External Radius Token Identity Source in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-and-passcode-cache-for-external-radius-token-identity/m-p/4011080#M454652</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The document you linked is using RSA Identity Source. We are using a RADIUS Token Server.&lt;/P&gt;&lt;P&gt;And in the RADIUS Token Server settings i just clicked on the "Enable passcode caching for 30 sec" and "Enable Identity cachhing for 120 min".&amp;nbsp; These are the default settings.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We want to use the OTP for TACACS+. In the Device Admin Policy we changed the external identity source to use the OTP server. In the captures i can see that every time when we log in, ISE send a RADIUS Access-Request to the OTP Server, and it repsonds only with an Access-Accept. But if we want to re-use the same OTP, ISE send another Access-Request to the OTP server which answer with an Access-Reject.&amp;nbsp;&lt;/P&gt;&lt;P&gt;And we have only 1 PSN in this scenario, because it is just a test deployment.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Norbert&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 10:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-and-passcode-cache-for-external-radius-token-identity/m-p/4011080#M454652</guid>
      <dc:creator>SzantaiNorbert</dc:creator>
      <dc:date>2020-01-14T10:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: Identity and passcode cache for External Radius Token Identity Source in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-and-passcode-cache-for-external-radius-token-identity/m-p/4012702#M454653</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;It was my bad, it is working now. Somehow my terminal client messed up everything. With Putty, it is working totally fine.&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;Norbert&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2020 14:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-and-passcode-cache-for-external-radius-token-identity/m-p/4012702#M454653</guid>
      <dc:creator>SzantaiNorbert</dc:creator>
      <dc:date>2020-01-16T14:27:53Z</dc:date>
    </item>
  </channel>
</rss>

