<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Device authentication with Tacacs using RSA and AD in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/device-authentication-with-tacacs-using-rsa-and-ad/m-p/3882974#M472106</link>
    <description>&lt;P&gt;Adding to what&amp;nbsp;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/400253" target="_blank"&gt;rubenvankomen&lt;/A&gt;&amp;nbsp;suggested...&lt;/P&gt;
&lt;P&gt;Below is an example of T+ policy sets similar to what you asked for and I tested working:&lt;/P&gt;
&lt;P&gt;Two policy sets: One with TACACS.User endsWith 1 and the other is default.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-07-01 at 9.01.22 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/39900i08C1B9B7C93DD268/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2019-07-01 at 9.01.22 PM.png" alt="Screen Shot 2019-07-01 at 9.01.22 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The Username ends with 1 Policy set uses MFA (e.g. DuoRADIUS)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-07-01 at 9.03.43 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/39905i7E00D54810F4BD99/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2019-07-01 at 9.03.43 PM.png" alt="Screen Shot 2019-07-01 at 9.03.43 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The default policy set uses AD to auth the users.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-07-01 at 9.04.07 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/39903i9CFF674149A7E33A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2019-07-01 at 9.04.07 PM.png" alt="Screen Shot 2019-07-01 at 9.04.07 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jul 2019 04:09:24 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2019-07-02T04:09:24Z</dc:date>
    <item>
      <title>Device authentication with Tacacs using RSA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/device-authentication-with-tacacs-using-rsa-and-ad/m-p/3876735#M472103</link>
      <description>&lt;P&gt;Both RSA and AD are setup as external identities. RSA is also using AD as identity store. So effectively all accounts are present in both ext. ID stores. What I’m trying is to set my policy so that when I use an account that ends “_a” it requires to use RSA 2/fa. All other accounts in that match specific security group just get in with read only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there a way to match “_a” accounts to be authenticated against certain ext ID store, RSA in my case? I’ve tried with “contains” and “end with” in the policy but doesn’t seem to make a difference and it simply doesn’t want to match.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2019 12:46:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-authentication-with-tacacs-using-rsa-and-ad/m-p/3876735#M472103</guid>
      <dc:creator>kondzio24</dc:creator>
      <dc:date>2019-06-20T12:46:07Z</dc:date>
    </item>
    <item>
      <title>Re: Device authentication with Tacacs using RSA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/device-authentication-with-tacacs-using-rsa-and-ad/m-p/3876943#M472104</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;As you described, you can match an attribute to a value in the authentication policy to make sure that certain users use a specific Identity Store or Identity Store Sequence. Can you please confirm that you are using the Device Administration Policy set (Work Centers &amp;gt; Device Administration &amp;gt; Device Admin Policy Sets) and not the Network Acces Policy set for TACACS+ Device Administration?&lt;BR /&gt;&lt;BR /&gt;If you are using the correct Policy set, can you provide a screenshot of the condition?</description>
      <pubDate>Thu, 20 Jun 2019 17:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-authentication-with-tacacs-using-rsa-and-ad/m-p/3876943#M472104</guid>
      <dc:creator>rubenvankomen</dc:creator>
      <dc:date>2019-06-20T17:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: Device authentication with Tacacs using RSA and AD</title>
      <link>https://community.cisco.com/t5/network-access-control/device-authentication-with-tacacs-using-rsa-and-ad/m-p/3882974#M472106</link>
      <description>&lt;P&gt;Adding to what&amp;nbsp;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/400253" target="_blank"&gt;rubenvankomen&lt;/A&gt;&amp;nbsp;suggested...&lt;/P&gt;
&lt;P&gt;Below is an example of T+ policy sets similar to what you asked for and I tested working:&lt;/P&gt;
&lt;P&gt;Two policy sets: One with TACACS.User endsWith 1 and the other is default.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-07-01 at 9.01.22 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/39900i08C1B9B7C93DD268/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2019-07-01 at 9.01.22 PM.png" alt="Screen Shot 2019-07-01 at 9.01.22 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The Username ends with 1 Policy set uses MFA (e.g. DuoRADIUS)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-07-01 at 9.03.43 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/39905i7E00D54810F4BD99/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2019-07-01 at 9.03.43 PM.png" alt="Screen Shot 2019-07-01 at 9.03.43 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The default policy set uses AD to auth the users.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-07-01 at 9.04.07 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/39903i9CFF674149A7E33A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2019-07-01 at 9.04.07 PM.png" alt="Screen Shot 2019-07-01 at 9.04.07 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 04:09:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-authentication-with-tacacs-using-rsa-and-ad/m-p/3882974#M472106</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-02T04:09:24Z</dc:date>
    </item>
  </channel>
</rss>

