<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE - TACACS custom attributes with APIC in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-custom-attributes-with-apic/m-p/3548322#M528775</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CSCve33558 might have an impact.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 30 Jun 2017 19:23:53 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2017-06-30T19:23:53Z</dc:date>
    <item>
      <title>ISE - TACACS custom attributes with APIC</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-custom-attributes-with-apic/m-p/3548320#M528773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For a customer POC, I have a question relating to &lt;STRONG&gt;what the custom attribute should look like&lt;/STRONG&gt; for users accounts authenticating from an APIC GUI to &lt;STRONG&gt;ISE using Tacacs&lt;/STRONG&gt;. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured the network devices with a network device group, configured the Tacacs Profiles and configured the device admin policy sets. Based on searches, I’ve tried the following cisco av-pair=shell:domains = all/admin/,common//read-all and is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone able to share what the Profile Attributes that are required in a raw view format in the TACACS Profile? This would be simple if it was IOS with shell and privilege levels, but APIC is a web based GUI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any pointers would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jun 2017 17:08:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-custom-attributes-with-apic/m-p/3548320#M528773</guid>
      <dc:creator>iagyte</dc:creator>
      <dc:date>2017-06-30T17:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - TACACS custom attributes with APIC</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-custom-attributes-with-apic/m-p/3548321#M528774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check out the following article and stick to the format when you configure cisco-av-pair&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/kb/b_KB_Configuring_TACACS_RADIUS_LDAP_for_ACI_Access.html#task_D0D8572AB60745F1BFEFE0A2800A1749&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure if APIC supports this for all domains. First try giving specific domains and observe the behavior. If there is any logs in APIC turn it on.&lt;/P&gt;&lt;P&gt;Try RADIUS as well to isolate issue with attributes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Krishnan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jun 2017 17:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-custom-attributes-with-apic/m-p/3548321#M528774</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2017-06-30T17:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - TACACS custom attributes with APIC</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-custom-attributes-with-apic/m-p/3548322#M528775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CSCve33558 might have an impact.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jun 2017 19:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-custom-attributes-with-apic/m-p/3548322#M528775</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-06-30T19:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - TACACS custom attributes with APIC</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-custom-attributes-with-apic/m-p/3548323#M528776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In APIC you should see the roles you can assign on the &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;STRONG style="font-size: 10pt;"&gt;Admin-&amp;gt;Security Management-&amp;gt;Roles&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; screen.&amp;nbsp; The admin role is used to grant full access.&amp;nbsp; The read-all role is used for read-only access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;In ISE you assign a RAW profile result t assign the role:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;shell:domains = all/admin/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shell:domains = all/read-all/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: the training slash has to be there for it to work.&amp;nbsp; If you have multiple domains you can control access to the domains instead of saying "all" you would specify the domain they have access to.&amp;nbsp; I haven't played around with multiple domains before in APIC and control their access but it should work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jun 2017 20:18:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-custom-attributes-with-apic/m-p/3548323#M528776</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-06-30T20:18:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - TACACS custom attributes with APIC</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-custom-attributes-with-apic/m-p/3796205#M528777</link>
      <description>&lt;P&gt;Thank you so much for posting this out here!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've been digging through Cisco documentation like crazy and not finding what we needed for the AV-Pair for the APIC's.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again!&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 19:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-custom-attributes-with-apic/m-p/3796205#M528777</guid>
      <dc:creator>Travis Stroebele</dc:creator>
      <dc:date>2019-02-06T19:24:52Z</dc:date>
    </item>
  </channel>
</rss>

