<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.7 CLI access using Active Directory credentials in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4044525#M558821</link>
    <description>&lt;P&gt;Arne,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your insights on this. I have passed this on to PM/Engineering to look.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Krishnan&lt;/P&gt;</description>
    <pubDate>Wed, 11 Mar 2020 20:25:29 GMT</pubDate>
    <dc:creator>kthiruve</dc:creator>
    <dc:date>2020-03-11T20:25:29Z</dc:date>
    <item>
      <title>ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4042575#M558665</link>
      <description>&lt;P&gt;Hello ISE 2.7 users&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was so excited when I heard that in ISE 2.7 I could finally SSH into my nodes using AD credentials.&lt;/P&gt;
&lt;P&gt;This should have been a simple 5 minute job for me.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;According to the ISE 2.7 &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-7/admin_guide/workflow/html/b_overview_2_7.html#id_99029" target="_self"&gt;Admin Guide on how to configure the node to allow AD credentials for CLI logins&lt;/A&gt;&amp;nbsp;this should be simple.&lt;/P&gt;
&lt;P&gt;There is documentation bug on that page because it asks to "run" the identity store command - instead of saying that this is a configuration option under conf t.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Connect to the Cisco ISE CLI, run the &lt;FONT color="#FF0000"&gt;&lt;EM&gt;identity-store command&lt;/EM&gt;&lt;/FONT&gt;, and assign the Admin user to the ID store. For example, to map the CLI admin user to the Active Directory defined in ISE as adpool1, &lt;FONT color="#FF0000"&gt;&lt;EM&gt;run identity-store active-directory domain-name adpool1 user admincliuser&lt;/EM&gt;&lt;/FONT&gt;.&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The first thing that threw me off is that I now have to edit my AD Admin User(s) - the UI equivalent never required any manual tuning of this user.&amp;nbsp; Anyway - minor gripe ... I edited my AD user as indicated&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Assign uidNumber greater than 60000, and make sure that the number is unique.
Assign gidNumber as 110 (admin user) or 111 (read-only)&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I then ran the CLI command to join the Domain.&amp;nbsp; This is where I shook my head again. This node is already joined to the AD. Why am I having to do this again ? I tried the identity-store command once, and then I opened a new SSH window, but the AD credentials were not accepted.&amp;nbsp; I even left and re-joined the AD via CLI, but it doesn't allow me to login with the user shown below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ise03/admin(config)# &lt;STRONG&gt;no identity-store active-directory domain-name somedomain.com.au user admin-biera&lt;/STRONG&gt;
Left the domain somedomain.com.au successfully
ise03/admin(config)# &lt;STRONG&gt;identity-store active-directory domain-name somedomain.com.au user admin-biera&lt;/STRONG&gt;
If the domain somedomain.com.au is already joined via UI, then you must rejoin the domain somedomain.com.au from UI after this configuration. Until the rejoin happens, authentications to somedomain.com.au will fail
Do you want to proceed? Y/N [N]: &lt;STRONG&gt;Y&lt;/STRONG&gt;
Password for admin-biera:
Joined to domain somedomain.com.au successfully
ise03/admin(config)# &lt;STRONG&gt;end&lt;/STRONG&gt;
ise03/admin#
&lt;/PRE&gt;
&lt;P&gt;As the message above indicated, after I did the CLI "AD Join", it breaks the GUI AD Join Point (which is not great - I had to leave the AD Join int he GUI and then re-join ... then all was ok again).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What am I doing wrong regarding the CLI login. Is there a missing step?&lt;/P&gt;
&lt;P&gt;In general:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do I have to re-join the domain with all of my admin users?&amp;nbsp; Surely not ...&lt;/LI&gt;
&lt;LI&gt;If I have more than one ISE node, do I have to go through this "weird AD join on the CLI" on every node?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any hints welcome&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 05:06:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4042575#M558665</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-03-09T05:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4043076#M558698</link>
      <description>&lt;P&gt;Update: I changed the wrong AD attribute - I was searching for "uid" by pressing "u" to search through the list - and I edited the first search result that came back - uid.&amp;nbsp; Which was a mistake, because I needed to edit uidNumber.&amp;nbsp; At least I won't forget that next time &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; - the AD login on CLI now works after changing the uidNumber to a value &amp;gt; 60000.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="attr.png" style="width: 425px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/68790i3F07DFB7C989D812/image-size/large?v=v2&amp;amp;px=999" role="button" title="attr.png" alt="attr.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If anyone has insights/answer to the other questions I'd be happy to hear from you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 21:42:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4043076#M558698</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-03-09T21:42:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4043626#M558760</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;I'm glad someone tested this before me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I looked at the documentation myself couple of days ago, and the steps need to be followed in a specific order, I'm not sure exactly why, most probably it has to do with behind the scenes functionality and order of operation). One of the things which it states is exactly that if you use the same join point as defined in the GUI, you would have to rejoin from the GUI; doesn't sound like the perfect outcome for a customer, but probably/hopefully it will improve with future versions, so there will be no more need to loose AD access for a while.&lt;/P&gt;&lt;P&gt;&amp;nbsp; Did you make it work in the end?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 18:10:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4043626#M558760</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-10T18:10:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4043807#M558772</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295226"&gt;@Cristian Matei&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yeah I got it working - in my first attempt I assigned a value to the wrong AD attribute - I then realised my mistake and updated the correct attribute. It works like a charm. I only have two AD users configured and tested with this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would have preferred a solution that just copied the same behaviour as the GUI Admin AD Integration ... it seems that CLI and GUI use completely different code to authenticate the admin users.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 23:41:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4043807#M558772</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-03-10T23:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4043818#M558774</link>
      <description>&lt;P&gt;So the process you have described is exactly the same as I had to undertake in ISE 2.6 and I agree, why is the CLI auth process (domain join and user properties etc) different between CLI and GUI? I guess it is due to the GUI being a separate application on the appliance vs the host OS process.&lt;/P&gt;&lt;P&gt;It is a pain having to do the CLI first and then leave and join the GUI if it was already joined.&lt;/P&gt;&lt;P&gt;So good to know the process is still the same in 2.7&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 23:58:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4043818#M558774</guid>
      <dc:creator>obrien-r</dc:creator>
      <dc:date>2020-03-10T23:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4044525#M558821</link>
      <description>&lt;P&gt;Arne,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your insights on this. I have passed this on to PM/Engineering to look.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Krishnan&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 20:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4044525#M558821</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2020-03-11T20:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4044563#M558823</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; If you ask me, the feature came out on a rush, as most customers would want to use the same AD in the CLI as in the GUI, but they don't want that when the process is done, the GUI needs to rejoin the AD, thus leaving a window when news users will not be able to get authenticated/authorized.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Initially i thought the same, that indeed because the CLI and GUI are two different entities (even though run as OS/RHEL and ISE application on top of it), the integration of CLI and GUI with AD are two different process, but than how come that if you use in the CLI the same Join Point as in the GUI, it breaks the GUI attachment and you would need to rejoin?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;If you ask me, this is gonna get fixed on next releases in one of two ways:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- either CLI can make use of the same Join Point as the GUI with no need to rejoin the GUI or join at all from CLI&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- either CLI joining the AD will no longer break the GUI AD Join; like now, but without sacrificing anything&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 21:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4044563#M558823</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-11T21:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4139024#M562431</link>
      <description>Hi, I tried this within dcloud environment using ISE 2.7 p2. Initial AD join on CLI was successful but CLI based external accounts could not login. Solution was to disjoin AD from CLI and rejoin on both CLI and GUI.</description>
      <pubDate>Thu, 20 Aug 2020 20:03:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4139024#M562431</guid>
      <dc:creator>edwardonelife</dc:creator>
      <dc:date>2020-08-20T20:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4139664#M562448</link>
      <description>&lt;P&gt;CSCvs60879 is a known issue on this feature.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Aug 2020 06:02:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4139664#M562448</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-08-22T06:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4273135#M564798</link>
      <description>&lt;P&gt;Hi Arne&lt;/P&gt;&lt;P&gt;u would probably want to disable it again because of&amp;nbsp;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-fNZX8hHj" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-fNZX8hHj&lt;/A&gt;&lt;/P&gt;&lt;P&gt;otherwise upgrade to 3.0 :0)&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jan 2021 10:01:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4273135#M564798</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-01-15T10:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4273160#M564802</link>
      <description>&lt;P&gt;Thanks for that little heads up;-) I deleted 2.7 months ago. For some reason my 2.4 -&amp;gt; 2.7 upgrade ended up being a disaster (had to reboot once a week). I was put off by this bad experience. But I think it’s ok for others. I think the whole ISE CLI AD integration is a bit of a shambles. I don’t care much for it now. If they can implement it probably I might consider it again in future.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jan 2021 11:04:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4273160#M564802</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-01-15T11:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4395045#M566945</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to achieve the ISE CLI Integration with AD, I was able to successfully add the user using identity store and it works fine on all nodes after I added manually to all ISE nodes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems like documentation is not clear or there is some kind of issue as if I need to add another user from same AD group it does not give me an option add the password for that user , generally it should ask the admin user who we want to integrate with CLI as a manual option.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It only works with the first user and since then the AD is already added we cannot add another user from the same group, is it a BUG or configuration issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Meh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 19:21:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4395045#M566945</guid>
      <dc:creator>net87</dc:creator>
      <dc:date>2021-04-28T19:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4395338#M566966</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/624196"&gt;@net87&lt;/a&gt;&amp;nbsp;- not sure what you mean. Can you rephrase the last two sentences please.&lt;/P&gt;
&lt;P&gt;I have given up on this feature because it's so badly implemented. I'll wait and see if it improves. It took Cisco 7 years to add authenticated SMTP to ISE. Fingers crossed ...&lt;/P&gt;</description>
      <pubDate>Thu, 29 Apr 2021 10:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4395338#M566966</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-04-29T10:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4395538#M566992</link>
      <description>&lt;P&gt;Hi Arne,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let us say I have 4 users in ciscoadmin group in AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I performed following steps as per cisco documentation&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) I added the identity store command and it asked for the password for the first user and then it worked well after joining back the ISE nodes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now since the CLI already has the domain added with the first user, I am unable to add the second user as it must ask for a password to sync it back to CLI ( the way document explains). It only says domain is already added.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Meh&lt;/P&gt;</description>
      <pubDate>Thu, 29 Apr 2021 14:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4395538#M566992</guid>
      <dc:creator>net87</dc:creator>
      <dc:date>2021-04-29T14:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 CLI access using Active Directory credentials</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4662197#M576489</link>
      <description>&lt;P&gt;Hi, we are running into this same issue regarding adding multiple ad users as admins to ISE CLI. Did you find a solution?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2022 15:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-cli-access-using-active-directory-credentials/m-p/4662197#M576489</guid>
      <dc:creator>Anthony Faudale</dc:creator>
      <dc:date>2022-08-02T15:31:53Z</dc:date>
    </item>
  </channel>
</rss>

