<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095775#M560817</link>
    <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your idea sounds good, but I am not well tracking.&amp;nbsp; If you can further expand to help me understand that would be great.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Specifically, on these:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- NADs: what do you mean by NADs?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- that onboard via 8021x or mab&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-&amp;nbsp;reauth timer: where do I change that?&amp;nbsp; On the devices, ISE server, or both?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 01 Jun 2020 22:20:29 GMT</pubDate>
    <dc:creator>pn2020</dc:creator>
    <dc:date>2020-06-01T22:20:29Z</dc:date>
    <item>
      <title>Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095105#M560784</link>
      <description>&lt;P&gt;We have an automation (using python) project where we have to update shared secrets on network devices (Cisco IOS/IOS XR and also other non-Cisco platforms, via netmiko).&amp;nbsp; Of course, we also have to update (via ERS REST API) the Cisco ISE server with the same shared secrets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best approach to updating, with minimum connectivity outage?&amp;nbsp; One device at a time, ie, updating the ISE, then updating the device, check for connectivity, then move on to another device?&amp;nbsp; Or bulk update, ie, updating the shared secrets on the ISE for a small group of devices, then&amp;nbsp;updating the secrets for the same group of devices?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I assume it would be one at a time, but like hear additional feedbacks.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, is there a solution whereby we can dictate/direct the Cisco devices (or any network device platform) and Cisco ISE to try to check the authenticate using the new shared secret.&amp;nbsp; If check is good, then flip over to the new shared secret.&amp;nbsp; That way, we can get a minimum connectivity disruption. Is that possible?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 31 May 2020 14:55:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095105#M560784</guid>
      <dc:creator>pn2020</dc:creator>
      <dc:date>2020-05-31T14:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095134#M560787</link>
      <description>&lt;P&gt;Do you have a fall back Local Account? if yes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will change all the Secret at end Device First and later on ISE Side. and test&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;best practice, test 1 or 2 devices all working as expected, then deploy mass device config change. (even it fails you have fallen back to Local Account to change as required)&lt;/P&gt;</description>
      <pubDate>Sun, 31 May 2020 17:21:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095134#M560787</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-05-31T17:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095186#M560789</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;SPAN&gt;BB.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We have quite a few devices, so likely that some won't have a local account to fall back.&amp;nbsp; Especially, a number of them aren't Cisco platforms.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, I assume the safest plan is to do one by one?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BTW, is this how to check if Cisco IOS routers/switches are configured with local tacacs/radius authentication fallback when communication ISE/ACS server is down?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa authentication login default group tacacs+ line&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa authentication login console group radius local&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 31 May 2020 22:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095186#M560789</guid>
      <dc:creator>pn2020</dc:creator>
      <dc:date>2020-05-31T22:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095265#M560795</link>
      <description>&lt;P&gt;The device does not have control like Cisco devices if not many suggest changing manually and test it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as per the cisco devices - you should ( as per my interested) have local account some point you may need if any disaster of ISE or network connection loss.&lt;/P&gt;
&lt;P&gt;below command fall back to Local - only if you have a local username and enable password enabled.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa authentication login console group radius local&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Note: if not your device is locked and you need to go with password recovery.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 05:27:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095265#M560795</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-06-01T05:27:47Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095513#M560802</link>
      <description>&lt;P&gt;Agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;.&amp;nbsp; Another thought to ensure clients connected to certain NADs that onboard via 8021x or mab is to change the reauth timer to a greater time setting than you have configured now.&amp;nbsp; Essentially what you could do is bump the reauth timers to 8-12 hours in your authz profiles to buy you time to conduct your changes, and avoid having client onboarding issues.&amp;nbsp; Always test on one or two devices first before mass rollout.&amp;nbsp; Good luck &amp;amp; HTH!&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 14:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095513#M560802</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-06-01T14:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095627#M560808</link>
      <description>&lt;P&gt;Aside from the tips provided, you can also leverage second shared secret feature on ISE. This allows two shared secret to be active at the same time for migration (Only available for RADIUS):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-06-01 at 12.12.28 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/75839i4AD864BD3A4C2129/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2020-06-01 at 12.12.28 PM.png" alt="Screen Shot 2020-06-01 at 12.12.28 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 17:16:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095627#M560808</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2020-06-01T17:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095709#M560813</link>
      <description>&lt;P&gt;Thanks everyone for your feedbacks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will look more into this.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 20:27:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095709#M560813</guid>
      <dc:creator>pn2020</dc:creator>
      <dc:date>2020-06-01T20:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095763#M560815</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/833210"&gt;@Mike.Cifelli&lt;/a&gt;&amp;nbsp;yes that would be a nice idea, original post does not mention any BYOD feature using with ISE, But your point needs to consider one another aspect of dependency, good point.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;let us know how it goes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 22:00:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095763#M560815</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-06-01T22:00:56Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095775#M560817</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your idea sounds good, but I am not well tracking.&amp;nbsp; If you can further expand to help me understand that would be great.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Specifically, on these:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- NADs: what do you mean by NADs?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- that onboard via 8021x or mab&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-&amp;nbsp;reauth timer: where do I change that?&amp;nbsp; On the devices, ISE server, or both?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 22:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095775#M560817</guid>
      <dc:creator>pn2020</dc:creator>
      <dc:date>2020-06-01T22:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095785#M560819</link>
      <description>&lt;P&gt;Do you use ISE for dot1.X authentication?&amp;nbsp; or BYOD in your environment?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;check other screenshot posted on this post - you can have seconds shared key, (not tried myself)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 22:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4095785#M560819</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-06-01T22:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4096327#M560845</link>
      <description>Specifically, on these:&lt;BR /&gt;- NADs: what do you mean by NADs?&lt;BR /&gt;Network Access Devices.  Edge/Access switches that clients connect to.&lt;BR /&gt;- that onboard via 8021x or mab &lt;BR /&gt;How you authenticate and authorize hosts onto their respective network.  &lt;BR /&gt;- reauth timer: where do I change that?  On the devices, ISE server, or both?&lt;BR /&gt;If you are utilizing ISE already to push authz policy I would recommend configuring it in the authz profiles.  This can be done under 'Common Tasks' section under 'Reauthentication'.&lt;BR /&gt;HTH!</description>
      <pubDate>Tue, 02 Jun 2020 17:29:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4096327#M560845</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-06-02T17:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4096495#M560849</link>
      <description>&lt;P&gt;We are not using I&lt;SPAN&gt;SE for dot1.X authentication, no BYOD.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The TACACS doesn't have the 2nd shared secret, but it has the retired secret feature.&amp;nbsp; I like to explore that feature more. If anyone has good experiences with the retired secret feature in production or in lab, please share.&amp;nbsp; Details on how that feature works would be great.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks in advance!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 22:11:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4096495#M560849</guid>
      <dc:creator>pn2020</dc:creator>
      <dc:date>2020-06-02T22:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4096496#M560850</link>
      <description>&lt;P&gt;Thanks Mike.&amp;nbsp; I will explore the auth timer more&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 22:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4096496#M560850</guid>
      <dc:creator>pn2020</dc:creator>
      <dc:date>2020-06-02T22:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4097269#M560879</link>
      <description>&lt;BLOCKQUOTE&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The TACACS doesn't have the 2nd shared secret, but it has the retired secret feature.&amp;nbsp; I like to explore that feature more. If anyone has good experiences with the retired secret feature in production or in lab, please share.&amp;nbsp; Details on how that feature works would be great.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;See &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId-851964346" target="_self"&gt;Change your shared secret without network disruption&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This can only be configured in ISE admin web UI.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 02:02:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4097269#M560879</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-06-04T02:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4097271#M560881</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;SPAN class="user-badges-list"&gt;&lt;SPAN&gt;&amp;nbsp;hslai.&amp;nbsp; So&lt;SPAN class="UserName lia-user-name lia-user-rank-Cisco-Employee lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;&amp;nbsp;the retire secret feature can't be configured via ERS REST API?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 02:05:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4097271#M560881</guid>
      <dc:creator>pn2020</dc:creator>
      <dc:date>2020-06-04T02:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4098682#M560962</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/242765"&gt;@pn2020&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&lt;SPAN class="user-badges-list"&gt;&lt;SPAN&gt;... So&lt;SPAN class="UserName lia-user-name lia-user-rank-Cisco-Employee lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;&amp;nbsp;the retire secret feature can't be configured via ERS REST API?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;That is correct. Please voice your feedback through &lt;A href="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356#toc-hId--1287519475" target="_self"&gt;New Features and Feedback&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jun 2020 17:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4098682#M560962</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-06-06T17:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and network devices</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4098686#M560965</link>
      <description>&lt;P&gt;That's definitely disappointing and a major deficiency, especially RADIUS supports the secondary shared secret.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did leave a request on that forum channel.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jun 2020 18:03:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/4098686#M560965</guid>
      <dc:creator>pn2020</dc:creator>
      <dc:date>2020-06-06T18:03:57Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and n</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/5271127#M595470</link>
      <description>&lt;P&gt;In case anyone stumbles on this discussion in future, I made some further revelations about the usage of RADIUS second shared secret.&amp;nbsp; Here are some limitations/caveats regarding RADIUS:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Even when second RADIUS shared secret is configured, ISE will still use the primary shared secret when it sends CoA. If the network device has been updated to the new (second) shared secret, then the CoA will not be acknowledged by the device&lt;/LI&gt;
&lt;LI&gt;The second RADIUS shared secret will only be honoured by ISE if the Access-request contains the attribute 80 (Message-Authenticator) - the absence of this attribute will cause a reject. Most PAP requests and things like IOS "test aaa" commands do not include Message-Authenticator.&amp;nbsp; EAP requests always include the Message-Authenticator.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Therefore, the message is, your mileage may vary.&amp;nbsp; The safest option is probably to update one device at a time, taking care of the CoA shared secret on the device as well.&amp;nbsp; That is the cleanest and safest approach - and also the hardest.&lt;/P&gt;
&lt;P&gt;As for TACACS, it's 2025 and ISE 3.4 still doesn't support rotation in bulk.&amp;nbsp; It's a case of doing those one-by-one too, Not fun.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Mar 2025 00:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/5271127#M595470</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-03-14T00:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: Best approach to updating TACACS/RADIUS share secrets on ISE and n</title>
      <link>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/5291227#M596347</link>
      <description>&lt;P&gt;An update on the TACACS+ key rotation using REST API topic - great news!&amp;nbsp; The &lt;A href="https://developer.cisco.com/docs/identity-services-engine/v1/networkdevice/" target="_self"&gt;Cisco Developer ISE SDK&lt;/A&gt; is listing this feature as being available in ISE 3.5 if I read that correctly. ISE 3.5 is not yet publicly available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1747355648134.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/245069i33A694D3D0EB7F43/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_0-1747355648134.png" alt="ArneBier_0-1747355648134.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2025 03:20:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-approach-to-updating-tacacs-radius-share-secrets-on-ise-and/m-p/5291227#M596347</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-05-16T03:20:26Z</dc:date>
    </item>
  </channel>
</rss>

