<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I have the same issue have in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-using-active-directory-rsa-dual-authentication-vpn-help/m-p/2635345#M56046</link>
    <description>&lt;P&gt;I have the same issue have you found a solution?&lt;/P&gt;</description>
    <pubDate>Fri, 14 Aug 2015 21:26:30 GMT</pubDate>
    <dc:creator>Rodrigo Gurriti</dc:creator>
    <dc:date>2015-08-14T21:26:30Z</dc:date>
    <item>
      <title>ISE using Active Directory/RSA dual authentication VPN help</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-active-directory-rsa-dual-authentication-vpn-help/m-p/2635344#M56044</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I need to incorporate two factor authentication to our current VPN AnyConnect/ASA/ISE environment. Currently, users are able to authenticate using AD or RSA credentials, however, I need to force certain users based on AD groups to ONLY authenticate using RSA, and be denied service if they try to use their AD passwords... Without needing to add another internet facing ASA.&lt;/P&gt;&lt;P&gt;I am trying to use ISE with two external identity sources (Active Directory&amp;nbsp;and RSA SecurID servers) for VPN AnyConnect access through an ASA. If users are members of specific AD groups they need to be forced to authenticate using their tokens&amp;nbsp;to the RSA server through ISE. However, in every configuration I try the users are also able to enter their AD passwords and still authenticate. I need an authorization rule that says, "if users in AD group XYZ authenticate with AD credentials, then deny access, but allow access if they authenticate to RSA".&amp;nbsp;But that does not seem to be an option with external identity sources, only local identity groups.&lt;/P&gt;&lt;P&gt;Is there a way to do this with ISE? I can't seem to find it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance for any help.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:37:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-active-directory-rsa-dual-authentication-vpn-help/m-p/2635344#M56044</guid>
      <dc:creator>Larry Smith</dc:creator>
      <dc:date>2019-03-11T05:37:52Z</dc:date>
    </item>
    <item>
      <title>I have the same issue have</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-active-directory-rsa-dual-authentication-vpn-help/m-p/2635345#M56046</link>
      <description>&lt;P&gt;I have the same issue have you found a solution?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 21:26:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-active-directory-rsa-dual-authentication-vpn-help/m-p/2635345#M56046</guid>
      <dc:creator>Rodrigo Gurriti</dc:creator>
      <dc:date>2015-08-14T21:26:30Z</dc:date>
    </item>
    <item>
      <title>We worked out a way to do</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-using-active-directory-rsa-dual-authentication-vpn-help/m-p/2635346#M56051</link>
      <description>&lt;P&gt;We worked out a way to do this.&amp;nbsp; The thing that makes it hard is that AD has to be in the picture.&amp;nbsp; We have it in a separate policy set - it may take a bit of work to separate it from other ASA users.&lt;/P&gt;
&lt;P&gt;Authentication Policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; if (VPN user of some kind) Allow Protocols : Default Network Access and&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Default&amp;nbsp; :use RSA&lt;/P&gt;
&lt;P&gt;!! set "if user not found" to "reject".&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Default Rule (if no match) Allow Protocols: Default Network Access and use: Deny Access&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Authorization Policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp; if (AD:ExternalGroups EQUALS /Groups/UseRSAforVPN) AND&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (Network Access:AuthenticationIdentityStore EQUALS RSA)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; then VPN_RSA&lt;/P&gt;
&lt;P&gt;&amp;nbsp; if (AD:ExternalGroups EQUALS /Groups/UseADforVPN)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; then VPN_AD&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Obviously use your own names to replace the ones I used.&amp;nbsp; Good luck!&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2015 12:40:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-using-active-directory-rsa-dual-authentication-vpn-help/m-p/2635346#M56051</guid>
      <dc:creator>rob.drye</dc:creator>
      <dc:date>2015-11-11T12:40:31Z</dc:date>
    </item>
  </channel>
</rss>

