<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Continuing on to next Identity Source upon AuthN failure from first Identity Source in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898406#M471039</link>
    <description>I wouldn’t count this as a limitation as such since it makes logical sense to reject a user if an authentication fails. For example, if a user is only present in the external store and fails authentication, it would simply be unnecessary to look at the user in another store. If authentication fails in one store and passes in another, how should that be counted? A failure or a success ?&lt;BR /&gt;</description>
    <pubDate>Fri, 26 Jul 2019 15:29:53 GMT</pubDate>
    <dc:creator>Surendra</dc:creator>
    <dc:date>2019-07-26T15:29:53Z</dc:date>
    <item>
      <title>Continuing on to next Identity Source upon AuthN failure from first Identity Source</title>
      <link>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898175#M471032</link>
      <description>&lt;P&gt;I'm extracting this issue out of another post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For CWA, I have an Identity Source Sequence setup with&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Guests&amp;nbsp;&lt;/EM&gt;&lt;SPAN&gt;first&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;and an &lt;EM&gt;Ext. ID Source&amp;nbsp;&lt;/EM&gt;&lt;SPAN&gt;second. In some cases a user will have an account in each of the identity sources -&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Guests&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;and the&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Ext. ID Source.&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;If the user uses their Ext. ID Source login they will fail to authenticate in the&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Guests&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;source but not continue trying to authenticate by the Ext. ID Source. I thought configuring the Authentication Policy to&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;If Auth fail = CONTINUE&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;would fix this issue however this option appears to be made for continuing to AuthZ, NOT continuing to the next identity source. If I reverse the order within the ISS, I will have the same problem but in reverse. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The&amp;nbsp;&lt;EM&gt;Advanced Search List Settings&lt;/EM&gt; option of&amp;nbsp;&lt;EM&gt;Treat as if the user was not found and proceed to the next store in the sequence&lt;/EM&gt; is not relevant here as this is NOT a case of the user not being found, the user is found, but it's a different user account and ISE needs to continue onto the next identity source despite the AuthN fail.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there a work-around for this?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jul 2019 09:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898175#M471032</guid>
      <dc:creator>scott.stapleton</dc:creator>
      <dc:date>2019-07-26T09:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: Continuing on to next Identity Source upon AuthN failure from first Identity Source</title>
      <link>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898190#M471034</link>
      <description>&lt;P&gt;How do you think this type of ambiguity should be treated? I can’t figure out from your description where the issue lies. If a user exists in both Identity sources then how should ISE discern one from the other (based on what, and why?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jul 2019 10:11:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898190#M471034</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-07-26T10:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: Continuing on to next Identity Source upon AuthN failure from first Identity Source</title>
      <link>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898260#M471035</link>
      <description>&lt;P&gt;It's simple. If AuthN is successful from first ID. source, then move to AuthZ. If not successful, move to second ID. source.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is that upon AuthN failure from the first ID source, ISE doesn't move to the next ID source.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jul 2019 13:05:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898260#M471035</guid>
      <dc:creator>scott.stapleton</dc:creator>
      <dc:date>2019-07-26T13:05:52Z</dc:date>
    </item>
    <item>
      <title>Re: Continuing on to next Identity Source upon AuthN failure from first Identity Source</title>
      <link>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898294#M471037</link>
      <description>It has been the way on the ISE since the beginning. ISE will only fallback to another identity store if the user is not found but not on an authentication failure. A failure is a failure to ISE.&lt;BR /&gt;</description>
      <pubDate>Fri, 26 Jul 2019 13:35:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898294#M471037</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2019-07-26T13:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: Continuing on to next Identity Source upon AuthN failure from first Identity Source</title>
      <link>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898364#M471038</link>
      <description>&lt;P&gt;No work-around for this ISE limitation then?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jul 2019 14:42:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898364#M471038</guid>
      <dc:creator>scott.stapleton</dc:creator>
      <dc:date>2019-07-26T14:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: Continuing on to next Identity Source upon AuthN failure from first Identity Source</title>
      <link>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898406#M471039</link>
      <description>I wouldn’t count this as a limitation as such since it makes logical sense to reject a user if an authentication fails. For example, if a user is only present in the external store and fails authentication, it would simply be unnecessary to look at the user in another store. If authentication fails in one store and passes in another, how should that be counted? A failure or a success ?&lt;BR /&gt;</description>
      <pubDate>Fri, 26 Jul 2019 15:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898406#M471039</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2019-07-26T15:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: Continuing on to next Identity Source upon AuthN failure from first Identity Source</title>
      <link>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898748#M471040</link>
      <description>&lt;P&gt;I posted a response to your original thread -- &lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/confirmation-of-apparent-ise-bugs-amp-limitations/m-p/3898745/highlight/true#M29084" target="_self"&gt;Confirmation of apparent ISE bugs &amp;amp; lim..&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jul 2019 23:59:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3898748#M471040</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-27T23:59:41Z</dc:date>
    </item>
    <item>
      <title>Re: Continuing on to next Identity Source upon AuthN failure from first Identity Source</title>
      <link>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3899209#M471041</link>
      <description>&lt;P&gt;Well I can't achieve the use-case I have so it is a limitation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As mentioned, I have a use-case where I need to look in both stores; it's not unnecessary; it's simply unsupported in ISE. This is likely a corner case, but I simply wanted to confirm there wasn't a work-around.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding your example, it should be treated as the user configures in the ISE GUI (by default failure, but with the option of configuring success), if this option were available.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 12:01:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3899209#M471041</guid>
      <dc:creator>scott.stapleton</dc:creator>
      <dc:date>2019-07-29T12:01:28Z</dc:date>
    </item>
    <item>
      <title>Re: Continuing on to next Identity Source upon AuthN failure from first Identity Source</title>
      <link>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3899325#M471110</link>
      <description>&lt;P&gt;What is the second store?&amp;nbsp; Is it AD by any chance?&amp;nbsp; If it is then you just would have to coach the users to use an alternate AD account name format.&amp;nbsp; For example lets say there is a username in AD and guest database called user1.&amp;nbsp;&amp;nbsp; Let's assume the email address for user1 is first.last@mycompany.com and the AD domain is mycompany.local.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the user logs in with "user1" as the user ID you have a conflict and are in the situation you are facing, but there are many ways to specify user credentials when authenticating against AD:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;mycompany\user1&lt;/P&gt;
&lt;P&gt;user1@mycompany.local&lt;/P&gt;
&lt;P&gt;first.last@mycompany.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;None of those formats should have conflict with the guest user database in ISE.&amp;nbsp; I am guessing your second source is not AD so this probably won't help, but wanted to post on alternative user name formats which could help if AD was the second source.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The other option would be to link to another portal.&amp;nbsp; The first portal is for true guests.&amp;nbsp; On that portal you can have a URL that links to a second portal that ties to the second authentication source.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 14:22:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3899325#M471110</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-07-29T14:22:41Z</dc:date>
    </item>
    <item>
      <title>Re: Continuing on to next Identity Source upon AuthN failure from first Identity Source</title>
      <link>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3899968#M471112</link>
      <description>&lt;P&gt;Cheers - I was initially using username (there was only a single domain) however the powers that be wanted it consistent with guests.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, second source is AD (well, LDAP).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using UPN or any other format will cause usability problems so I'm going down the path of blocking corp. users from creating guest accounts with their AD email.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 12:38:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/continuing-on-to-next-identity-source-upon-authn-failure-from/m-p/3899968#M471112</guid>
      <dc:creator>scott.stapleton</dc:creator>
      <dc:date>2019-07-30T12:38:30Z</dc:date>
    </item>
  </channel>
</rss>

