<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2FA to SSH to supported IOS devices using tacacs+, ISE, PIV card and PKI in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542491#M530239</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok thanks, that does clear it up.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Apr 2017 16:44:07 GMT</pubDate>
    <dc:creator>brmchenr</dc:creator>
    <dc:date>2017-04-12T16:44:07Z</dc:date>
    <item>
      <title>2FA to SSH to supported IOS devices using tacacs+, ISE, PIV card and PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542485#M530214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question regarding authentication using a PIV credential (smartcard) and ISE. After reading through several docs linked from here I want to ensure I have the proper processes down in order to be able to use ISE to authenticate users who want to use their PIV smartcard as credentials for IOS SSH access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Customer will be required to use a client that can pass/present the smartcard credentials to IOS.&lt;/P&gt;&lt;P&gt;2) Configure supported IOS for PKI&amp;nbsp; (and this is where I am fuzzy)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a) When configuring IOS for PKI, your trustpoint is the CA server where the certificate needs to be presented. Let's say they have their own in house CA server, which points back to their trusted root server elsewhere. It looks as if, from what I am reading, you can bring this into IOS (up to 10 total in the chain). So in essence the terminal client reads the PIV and presents the credentials to IOS; IOS relays this to the trustpoint CA server, passes or fails the authentication, then IOS resumes the authorization side of AAA with your configured AAA server such as ISE or ACS?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b) What isn't clear at all is whether the above is the only method to do this. Can you import the CA chain into ISE, have the terminal client present the PIV credentials to IOS, configure IOS trustpoint CA as ISE, then ISE checks the certficate and authenticates or not, proceeds with authorization, etc? So no need to import the CA chain into IOS in this scenario. Is this doable?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Brandon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Apr 2017 14:31:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542485#M530214</guid>
      <dc:creator>brmchenr</dc:creator>
      <dc:date>2017-04-12T14:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA to SSH to supported IOS devices using tacacs+, ISE, PIV card and PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542486#M530215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes theoretically will work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Apr 2017 15:08:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542486#M530215</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-04-12T15:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA to SSH to supported IOS devices using tacacs+, ISE, PIV card and PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542487#M530221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is some special software to work with such use cases. However, it's PKI authentication is local to the IOS devices with ISE to handle the authorizations.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Apr 2017 16:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542487#M530221</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-04-12T16:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA to SSH to supported IOS devices using tacacs+, ISE, PIV card and PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542488#M530227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are referring to the Terminal Clients correct? Yes I have identified one that Cisco uses in their example white paper and another that appears to be getting the functionality to read smartcards in an updated release. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The case behind this solution is the current authentication is via ACS which cannot authenticate smartcards. A move to ISE would allow that, I just wanted to be clear on the method. No sense in importing an entire CA chain into IOS if IOS itself can just relay the credentials to ISE and have ISE do the authentication.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Apr 2017 16:36:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542488#M530227</guid>
      <dc:creator>brmchenr</dc:creator>
      <dc:date>2017-04-12T16:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA to SSH to supported IOS devices using tacacs+, ISE, PIV card and PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542489#M530231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The credentials are the cert right? So this would need to be authenticated on ise and we would need to trust the chain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Apr 2017 16:40:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542489#M530231</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-04-12T16:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA to SSH to supported IOS devices using tacacs+, ISE, PIV card and PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542490#M530234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah. In this case, ISE works the same as ACS. No protocol support for T+ authentication (or RADIUS auth to line access) to use PKI at the moment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Apr 2017 16:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542490#M530234</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-04-12T16:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: 2FA to SSH to supported IOS devices using tacacs+, ISE, PIV card and PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542491#M530239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok thanks, that does clear it up.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Apr 2017 16:44:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/2fa-to-ssh-to-supported-ios-devices-using-tacacs-ise-piv-card/m-p/3542491#M530239</guid>
      <dc:creator>brmchenr</dc:creator>
      <dc:date>2017-04-12T16:44:07Z</dc:date>
    </item>
  </channel>
</rss>

