<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS enable password authentication behavior - Cisco Identity Services Engine 2.4 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-enable-password-authentication-behavior-cisco-identity/m-p/3818328#M484319</link>
    <description>&lt;P&gt;Honestly the concept of enabled mode is antiquated.&amp;nbsp; If you enable command authorization for lvl 15 commands on your network devices you control what the user can do when they get on the device.&amp;nbsp; Put everyone at priv-15 (the # prompt) as soon as they login and create a Read-Only command set that can only do show commands and a Full-Access command set that can do everything.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I haven't used enabled passwords in 5-10 years on any of my installs.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 18:32:40 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2019-03-12T18:32:40Z</dc:date>
    <item>
      <title>TACACS enable password authentication behavior - Cisco Identity Services Engine 2.4</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-enable-password-authentication-behavior-cisco-identity/m-p/3818304#M484316</link>
      <description>&lt;P&gt;I am running an eval of ISE 2.4 (patch 6). I used the migration tool to pull in all information from ACS 5.8. ISE is new to me, so I'm just trying to figure it out.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue I am having right now is with the enable password. It was a simple process in ACS; under user authentication setting, you just made sure the "TACACS Enable Password" option was not checked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't see anything similar in ISE. The only way I got this to work was to go into each user account and configure the enable password. I am hoping there is a better way of doing this, as I have many users that require enable mode. They all belong to the same "User Identity Group"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My goal would be to for the Login Password to also work as the Enable Password (as it did in ACS). Another option might be for our TACACS network devices to not even prompt for a password when a user enters enable mode (not sure if this is possible).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 17:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-enable-password-authentication-behavior-cisco-identity/m-p/3818304#M484316</guid>
      <dc:creator>realeric</dc:creator>
      <dc:date>2019-03-12T17:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS enable password authentication behavior - Cisco Identity Services Engine 2.4</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-enable-password-authentication-behavior-cisco-identity/m-p/3818328#M484319</link>
      <description>&lt;P&gt;Honestly the concept of enabled mode is antiquated.&amp;nbsp; If you enable command authorization for lvl 15 commands on your network devices you control what the user can do when they get on the device.&amp;nbsp; Put everyone at priv-15 (the # prompt) as soon as they login and create a Read-Only command set that can only do show commands and a Full-Access command set that can do everything.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I haven't used enabled passwords in 5-10 years on any of my installs.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 18:32:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-enable-password-authentication-behavior-cisco-identity/m-p/3818328#M484319</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-03-12T18:32:40Z</dc:date>
    </item>
  </channel>
</rss>

