<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Integration ISE to existing ACS for role based access (Admin, Supprot user etc) control in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3768240#M487099</link>
    <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/314466" target="_blank"&gt;Nadav&lt;/A&gt;&amp;nbsp;is correct regarding AD/LDAP/ODBC ID sources for external admins. However, RSA or other RADIUS token servers (ACS in this case) are treated differently and require internal admin users shadowing the same usernames and assigned to the desired admin user groups in order to authorize appropriately.&lt;/P&gt;</description>
    <pubDate>Sat, 22 Dec 2018 18:57:10 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2018-12-22T18:57:10Z</dc:date>
    <item>
      <title>Integration od ISE to existing ACS for role based access (Admin, Supprot user etc) control</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3763480#M487084</link>
      <description>&lt;P&gt;&lt;SPAN style="caret-color: #343537; color: #343537; font-family: -apple-system, 'Segoe UI Semilight', sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 300; letter-spacing: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none; display: inline !important; float: none;"&gt;Hi Guys,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="caret-color: #343537; color: #343537; font-family: -apple-system, 'Segoe UI Semilight', sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 300; letter-spacing: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none; display: inline !important; float: none;"&gt;My customer wants to integrate ISE to existing ACS for role based access (Admin, Supprot etc) control. Though i don’t see the way to do such thing because there is no AV-Pair which can do ISE access control with ACS, however, still want to hear if anyone came across such requirement. &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 05:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3763480#M487084</guid>
      <dc:creator>Jay Tiwari</dc:creator>
      <dc:date>2018-12-14T05:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Integration od ISE to existing ACS for role based access (Admin, Supprot user etc) control</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3763747#M487085</link>
      <description>I don’t understand the use case and need more details &lt;BR /&gt;&lt;BR /&gt;ISE replaces ACS . Acs is going away&lt;BR /&gt;</description>
      <pubDate>Fri, 14 Dec 2018 13:15:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3763747#M487085</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-12-14T13:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: Integration ISE to existing ACS for role based access (Admin, Supprot user etc) control</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3764699#M487088</link>
      <description>&lt;P&gt;If I understood it correctly, ISE may use ACS as a RADIUS token server and use that as the authentication source for ISE admin users for ISE admin web portal. However, ISE needs internal shadow admin users defined and associated with the desired admin groups, because ISE performs external authentication but internal authorization for such use case. See&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_0101.html#ID929" target="_blank"&gt;Configure Admin Access Using an External Identity Store for Authentication with Internal Authorization&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 01:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3764699#M487088</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-12-17T01:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: Integration ISE to existing ACS for role based access (Admin, Supprot user etc) control</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3768209#M487095</link>
      <description>&lt;P&gt;For ISE 2.4 and above (I'm not famliar with older versions):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When creating external admin groups, you just point your custom group at the external identity group of your choice and it dynamically checks it via Kerberos/LDAPS with each authentication. You don't need to create a shadow admin user.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Dec 2018 15:49:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3768209#M487095</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2018-12-22T15:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: Integration ISE to existing ACS for role based access (Admin, Supprot user etc) control</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3768240#M487099</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/314466" target="_blank"&gt;Nadav&lt;/A&gt;&amp;nbsp;is correct regarding AD/LDAP/ODBC ID sources for external admins. However, RSA or other RADIUS token servers (ACS in this case) are treated differently and require internal admin users shadowing the same usernames and assigned to the desired admin user groups in order to authorize appropriately.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Dec 2018 18:57:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3768240#M487099</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-12-22T18:57:10Z</dc:date>
    </item>
    <item>
      <title>Re: Integration ISE to existing ACS for role based access (Admin, Supprot user etc) control</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3768243#M487103</link>
      <description>&lt;P&gt;Any reason why not just duplicate the administration policy from ACS into ISE? ACS is deprecated afterall, it shouldn't become a dependancy for an ISE deployment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is is a cross-domain issue?&lt;/P&gt;</description>
      <pubDate>Sat, 22 Dec 2018 19:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3768243#M487103</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2018-12-22T19:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: Integration ISE to existing ACS for role based access (Admin, Supprot user etc) control</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3768304#M487105</link>
      <description>&lt;P&gt;Not sure. It could be not knowing the passwords of all the admin users.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Dec 2018 04:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3768304#M487105</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-12-23T04:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: Integration ISE to existing ACS for role based access (Admin, Supprot user etc) control</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3768362#M487108</link>
      <description>&lt;P&gt;Thanks Guys...Integrated ACS with ISE as RADIUS TOKEN identity server and its working as expected.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Dec 2018 12:12:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/3768362#M487108</guid>
      <dc:creator>Jay Tiwari</dc:creator>
      <dc:date>2018-12-23T12:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: Integration ISE to existing ACS for role based access (Admin, Supprot user etc) control</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/4063754#M559530</link>
      <description>&lt;P&gt;Hi Jatiwari&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please confirm the steps you took to make this integration with ACS for Admin access to ISE configuration&amp;nbsp; , We have a similar requirement.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/428902"&gt;@Jay Tiwari&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Thanks Guys...Integrated ACS with ISE as RADIUS TOKEN identity server and its working as expected.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2020 21:05:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-od-ise-to-existing-acs-for-role-based-access-admin/m-p/4063754#M559530</guid>
      <dc:creator>CSCO12058043</dc:creator>
      <dc:date>2020-04-10T21:05:55Z</dc:date>
    </item>
  </channel>
</rss>

