<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE's retrieval of user's group membership from Active directory. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3355643#M549670</link>
    <description>&lt;P&gt;Thanks Octavian for your valuable inputs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am struggling to comprehend the flow of how things would work in my scenario.&lt;/P&gt;
&lt;P&gt;Scenario:&lt;/P&gt;
&lt;P&gt;Single SSID mapped with Multiple User Groups. Each User group may have unique user database (ISE local database/ AD), unique QoS requirement, unique Network Access privileges.....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am basically looking for the flowchart, starting from client attempting association on an SSID, getting authenticated with ISE/ AD database and &lt;FONT color="#FF0000"&gt;most importantly the role assignment handling at ISE.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Mar 2018 06:43:12 GMT</pubDate>
    <dc:creator>Muhammed Adnan</dc:creator>
    <dc:date>2018-03-27T06:43:12Z</dc:date>
    <item>
      <title>Cisco ISE's retrieval of user's group membership from Active directory.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3350610#M549668</link>
      <description>&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;Hello Experts,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;I am quite new to Active directory's integration with Cisco ISE. Have found a&amp;nbsp;&lt;A style="box-sizing: border-box;" href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/ise_active_directory_integration/b_ISE_AD_integration_20.pdf" target="_self"&gt;&lt;SPAN style="color: #005073;"&gt;document&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;which is quite educative, however still have some doubts.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;We are proposing a POC for a networking setup comprising of Cisco Wireless LAN Controller, ISE and Microsoft Active Directory.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;a) We&amp;nbsp;have a requirement to map multiple user groups defined on AD with multiple authorization policies&amp;nbsp;defined on ISE.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;b) The wireless users part of different user groups will associate through single WLAN SSID.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;c)&amp;nbsp; Authentication of wireless users takes at AD, while the authorization at ISE.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;Based on the&amp;nbsp;AD attribute tokenGroups, ISE evaluates the user's group member ship and accordingly applies authorization profile mapped against the user's group.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;d) Authorization profiles will have each unique user's group with different privileges: Internet access/ Internet and Exchange Server Access / Internet, Exchange Server and Complete Enterprise Servers Access....&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;&lt;U&gt;Below is the concern:&lt;/U&gt;&lt;BR /&gt;The authentication protocol that we are proposing is EAP-PEAP (MSCHAPv2). However if we see the table 1 of Cisco doc, it appears "User Groups and attributes retrieval" can take place only for EAP-TLS/ EAP-FAST-TLS.&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Could someone please share the inputs on the POC that we are planning have, its limitations, repercussions and recommendations?&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;Can user group retrieval from AD to ISE happen when&amp;nbsp;&lt;SPAN&gt;EAP-PEAP (MSCHAPv2) is the authentication method in use?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;Excerpts from the document:&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;1.&amp;nbsp;Cisco ISE uses the AD attribute tokenGroups to evaluate a user’s group membership. Cisco ISE machine account must have permission to read tokenGroups attribute.&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;2.&amp;nbsp;You must configure Active Directory user groups for them to be available for use in authorization policies. Internally, Cisco ISE uses security identifiers (SIDs) to help resolve group name ambiguity issues and to enhance group mappings.SID provides accurate group assignment matching.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;3. Authentication protocols supported by Active directory.&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-right" image-alt="Authentication protocols supported by Active Directory.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/9056i6938FA73715E34E6/image-size/large?v=v2&amp;amp;px=999" role="button" title="Authentication protocols supported by Active Directory.PNG" alt="Authentication protocols supported by Active Directory.PNG" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:49:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3350610#M549668</guid>
      <dc:creator>Muhammed Adnan</dc:creator>
      <dc:date>2020-02-21T18:49:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE's retrieval of user's group membership from Active directory.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3350691#M549669</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I wouldn't worry about that. Just configure your authentication/authorization rules to use the groups you've configured in AD.(after you've previsouly imported them into ISE - AD connector section groups/attributes)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding this phrase -&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'Helvetica', sans-serif; color: #58585b;"&gt;c)&amp;nbsp; Authentication of wireless users takes at AD, while the authorization at ISE.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;The authentication will be dealt also by ISE (as in an authentication request) but using AD as a backend authentication server.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-family: 'Helvetica',sans-serif; color: #58585b;"&gt;Thanks, &lt;BR /&gt;Octavian&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Mar 2018 09:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3350691#M549669</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2018-03-19T09:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE's retrieval of user's group membership from Active directory.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3355643#M549670</link>
      <description>&lt;P&gt;Thanks Octavian for your valuable inputs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am struggling to comprehend the flow of how things would work in my scenario.&lt;/P&gt;
&lt;P&gt;Scenario:&lt;/P&gt;
&lt;P&gt;Single SSID mapped with Multiple User Groups. Each User group may have unique user database (ISE local database/ AD), unique QoS requirement, unique Network Access privileges.....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am basically looking for the flowchart, starting from client attempting association on an SSID, getting authenticated with ISE/ AD database and &lt;FONT color="#FF0000"&gt;most importantly the role assignment handling at ISE.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Mar 2018 06:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3355643#M549670</guid>
      <dc:creator>Muhammed Adnan</dc:creator>
      <dc:date>2018-03-27T06:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE's retrieval of user's group membership from Active directory.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3356369#M549671</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;All your users have to belong to a specific group (HR, IT, etc).&lt;/P&gt;
&lt;P&gt;Your SSID will have 802.1x configured for it. From ISE perspective, it's receiving 802.1x authentication requests from WLC/SSID_X.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Authentication policy:&lt;/P&gt;
&lt;P&gt;Wireless_802.1x + SSID_X and&lt;/P&gt;
&lt;P&gt;PEAP_MSCAPv2 - use Identity Source Seq LOCAL&amp;amp;AD&lt;/P&gt;
&lt;P&gt;EAP_TLS - if issuer eq MyCA - use CA Source Seq&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the above its just an example showing you that for the same SSID you can actually use different eap authentication methods.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Authorization policy:&lt;/P&gt;
&lt;P&gt;Wireless_8021x + SSID_X + (Internal ISE Group IT OR External AD Group IT) = IT_AUTHZ (that contains your specific/extra attributes)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Wireless_8021x + SSID_X + External AD Group HR = HR_AUTHZ (that contains your specific/extra attributes)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IT_AUTHZ = dACL name (it has to be configure on WLC) + extra attributes that you can push via radius vsa&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 05:33:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3356369#M549671</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2018-03-28T05:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE's retrieval of user's group membership from Active directory.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3362732#M549672</link>
      <description>&lt;P&gt;Thank you Octavian Szolga for your precious time in responding to the query &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Apr 2018 10:59:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3362732#M549672</guid>
      <dc:creator>Muhammed Adnan</dc:creator>
      <dc:date>2018-04-09T10:59:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE's retrieval of user's group membership from Active directory.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3362749#M549673</link>
      <description>&lt;P&gt;. Answer is below:-&lt;/P&gt;
&lt;P&gt;All your users have to belong to a specific group (HR, IT, etc).&lt;/P&gt;
&lt;P&gt;Your SSID will have 802.1x configured for it. From ISE perspective, it's receiving 802.1x authentication requests from WLC/SSID_X.&lt;/P&gt;
&lt;P&gt;Authentication policy:&lt;/P&gt;
&lt;P&gt;Wireless_802.1x + SSID_X and&lt;/P&gt;
&lt;P&gt;PEAP_MSCAPv2 - use Identity Source Seq LOCAL&amp;amp;AD&lt;/P&gt;
&lt;P&gt;EAP_TLS - if issuer eq MyCA - use CA Source Seq&lt;/P&gt;
&lt;P&gt;For the above its just an example showing you that for the same SSID you can actually use different eap authentication methods.&lt;/P&gt;
&lt;P&gt;Authorization policy:&lt;/P&gt;
&lt;P&gt;Wireless_8021x + SSID_X + (Internal ISE Group IT OR External AD Group IT) = IT_AUTHZ (that contains your specific/extra attributes)&lt;/P&gt;
&lt;P&gt;Wireless_8021x + SSID_X + External AD Group HR = HR_AUTHZ (that contains your specific/extra attributes&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IT_AUTHZ = dACL name (it has to be configure on WLC) + extra attributes that you can push via radius vsa&lt;/P&gt;</description>
      <pubDate>Mon, 09 Apr 2018 12:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-s-retrieval-of-user-s-group-membership-from-active/m-p/3362749#M549673</guid>
      <dc:creator>Farhan Mohamed</dc:creator>
      <dc:date>2018-04-09T12:10:49Z</dc:date>
    </item>
  </channel>
</rss>

