<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE integration with RSA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-rsa/m-p/3569372#M517830</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. The link is pointing to the RSA implementation guide. I had already seen this document earlier. It explains the two ways of configuring the integration with ISE but not what are the differences. To rephrase my question, what are the benefits (if any) of integrating the server as a RSA Identity Sources instead of RADIUS Token Identity Sources ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I'm pretty familiar with the different EAP types and the different authentications method. The question is what is the difference in NAM behavior when you configure "Authenticate using a password" with EAP GTC and "Authenticate using a token and EAP-GTC". That sounds like two redundant options.&lt;/P&gt;&lt;P&gt;Why do we have the choice for the last option? The token could also be considered as a password (yes it is changing every time but that is transparent for NAM)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 Feb 2018 21:08:03 GMT</pubDate>
    <dc:creator>jdal</dc:creator>
    <dc:date>2018-02-14T21:08:03Z</dc:date>
    <item>
      <title>ISE integration with RSA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-rsa/m-p/3569370#M517828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two questions regarding RSA integration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) In ISE, there are two way of integrating to the RSA server, either by using Native SecurID protocol or RADIUS protocol.&lt;/P&gt;&lt;P&gt;In my customer, the ISE admins couldn't get a sdconf.rec from the RSA admins so they have configured the integration via the RADIUS protocol. Is there any drawbacks?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) They are actually planning to use OTP as an inner method of EAP-FAST.&lt;/P&gt;&lt;P&gt;In this case, it looks like we can configure it in two different ways, what is the difference between a "password" and a "token"?&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2018-02-14 at 17.38.29.png" class="image-1 jive-image" src="/legacyfs/online/fusion/115227_Screen Shot 2018-02-14 at 17.38.29.png" style="height: 258px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Feb 2018 16:43:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-rsa/m-p/3569370#M517828</guid>
      <dc:creator>jdal</dc:creator>
      <dc:date>2018-02-14T16:43:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with RSA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-rsa/m-p/3569371#M517829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For 1, please check Oncampus RSA authentication section in&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/docs/DOC-71528"&gt;Two Factor Authentication on ISE – 2FA on ISE&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For 2, Usually inner-methods such as MSCHAP use passwords that doesn't change unless there is a expiry period.&lt;/P&gt;&lt;P&gt;OTP is a one time password mechanism to support variety of servers such as OTP servers, RADIUS servers etc, idea is to generate one time password using a token which is different everytime you authenticate. EAP-GTC is an inner eap method supporting this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Krishnan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Feb 2018 20:49:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-rsa/m-p/3569371#M517829</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2018-02-14T20:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with RSA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-rsa/m-p/3569372#M517830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. The link is pointing to the RSA implementation guide. I had already seen this document earlier. It explains the two ways of configuring the integration with ISE but not what are the differences. To rephrase my question, what are the benefits (if any) of integrating the server as a RSA Identity Sources instead of RADIUS Token Identity Sources ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I'm pretty familiar with the different EAP types and the different authentications method. The question is what is the difference in NAM behavior when you configure "Authenticate using a password" with EAP GTC and "Authenticate using a token and EAP-GTC". That sounds like two redundant options.&lt;/P&gt;&lt;P&gt;Why do we have the choice for the last option? The token could also be considered as a password (yes it is changing every time but that is transparent for NAM)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Feb 2018 21:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-rsa/m-p/3569372#M517830</guid>
      <dc:creator>jdal</dc:creator>
      <dc:date>2018-02-14T21:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with RSA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-rsa/m-p/3569373#M517831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect40/administration/guide/b_AnyConnect_Administrator_Guide_4-0/configure-nam.html#ID-1424-00000202" style="font-family: inherit; font-size: inherit; font-style: inherit; color: #6f53bc;"&gt;AnyConnect Admin Guide on NAM EAP-GTC&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; says,&lt;/SPAN&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P style="margin-top: 6px; margin-bottom: 6px; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; color: #58585b;"&gt;&lt;EM&gt;Neither the Network Access Manager, the authenticator, nor the EAP-GTC protocol can distinguish between password and token code. These options impact only the credential’s lifetime within the Network Access Manager. While a password can be remembered until logout or longer, the token code cannot (because the user is prompted for the token code with every authentication). &lt;/EM&gt;&lt;/P&gt;

&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Feb 2018 21:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-rsa/m-p/3569373#M517831</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-02-14T21:48:40Z</dc:date>
    </item>
  </channel>
</rss>

