<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Got the answer. But, really in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/4128020#M562004</link>
    <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how did you solve this? im having the same issue&lt;/P&gt;</description>
    <pubDate>Thu, 30 Jul 2020 12:43:36 GMT</pubDate>
    <dc:creator>mcarassale</dc:creator>
    <dc:date>2020-07-30T12:43:36Z</dc:date>
    <item>
      <title>ISE authenticating AD users with only domain name included</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728236#M54141</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am performing a migration from ACS to ISE. Both these devices use a Win 2012 Server as External Identity sources. The connection to the AD is made via LDAP. Here is a sample of what is happening on all the network devices:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;N7K# test aaa group ACS &lt;A href="mailto:test@xyz.com" target="_blank"&gt;test@xyz.com&lt;/A&gt; C!sc0@123&lt;/P&gt;&lt;P&gt;user has failed authentication&lt;/P&gt;&lt;P&gt;N7K# test aaa group ACS test C!sc0@123&lt;/P&gt;&lt;P&gt;user has been authenticated&lt;/P&gt;&lt;P&gt;N7K# test aaa group ISE test C!sc0@123&lt;/P&gt;&lt;P&gt;user has failed authentication&lt;/P&gt;&lt;P&gt;N7K# test aaa group ISE &lt;A href="mailto:test@xyz.com" target="_blank"&gt;test@xyz.com&lt;/A&gt; C!sc0@123&lt;/P&gt;&lt;P&gt;user has been authenticated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ACS results in a successful authentication only when [username] is given and fails when [username]@[domain] is entered.&lt;/P&gt;&lt;P&gt;The ISE results in a successful authentication only when [username]@[domain] is given and fails when just the [username] is entered.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why is there a difference when both are using the same AD to authenticate against? Also, for information, the exact username in the AD is [username]@[domain] and the [domain] cannot be stripped. How do I make ISE ignore the “@[domain]” section? I want the ISE to consider only the [username]. Is this some setting that needs to be done on the AD or on the ISE? Please let me know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:01:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728236#M54141</guid>
      <dc:creator>stealthmode</dc:creator>
      <dc:date>2019-03-11T06:01:59Z</dc:date>
    </item>
    <item>
      <title>Hi there,What you require can</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728237#M54142</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;What you require can be achieved with the Identity Re-Write settings in ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Assuming you have an authentication policy which defines which Identity Store to use:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IF DEVICE is N7K THEN USE AD(xyz.com)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;...this will rule will accept both [username] and [username]@[domain]. You then need to configure the Identity Re-Write:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Administration -&amp;gt; Identity Management -&amp;gt; Extenal Identity Sources -&amp;gt; Active Directory -&amp;gt; 'xyz.com'&lt;/P&gt;&lt;P&gt;Then under the 'Advanced' tab, scroll to the bottom for the 'Identity Re-Write' section.&lt;/P&gt;&lt;P&gt;Here you can define how usernames are handled. ISE by default will accept [username]@[domain], but if you want just [username] to be accepted add a rule like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If Identity Matches: [IDENTITY]&amp;nbsp; re-write as : [IDENTITY]@xyz.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;...this will append the domain name and then pass the request onto AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cheers,&lt;/P&gt;&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2015 10:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728237#M54142</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2015-09-07T10:01:04Z</dc:date>
    </item>
    <item>
      <title>You can define attributes</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728238#M54143</link>
      <description>&lt;P&gt;You can define attributes that you reference under External Identity Sources-&amp;gt;Your AD-&amp;gt;Attributes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could change to SamAccountName here for instance, which is your username only instead of UserPrincipalName which is username@domain.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2015 10:06:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728238#M54143</guid>
      <dc:creator>Tobias Svensson</dc:creator>
      <dc:date>2015-09-07T10:06:34Z</dc:date>
    </item>
    <item>
      <title>This is a useful bit of info,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728239#M54144</link>
      <description>&lt;P&gt;This is a useful bit of info, but, like mentioned, I am using LDAP to connect to the AD. These Identity rewrite operations are not present under the LDAP section.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Can you help me here?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2015 10:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728239#M54144</guid>
      <dc:creator>stealthmode</dc:creator>
      <dc:date>2015-09-07T10:51:53Z</dc:date>
    </item>
    <item>
      <title>Got the answer. But, really</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728240#M54145</link>
      <description>&lt;P&gt;Got the answer. But, really thanks for this useful bit of info. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2015 11:01:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728240#M54145</guid>
      <dc:creator>stealthmode</dc:creator>
      <dc:date>2015-09-07T11:01:22Z</dc:date>
    </item>
    <item>
      <title>If its the LDAP connector</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728241#M54146</link>
      <description>&lt;P&gt;If its the LDAP connector youre using you can specify 'cn' as 'Subject Name Attribute' instead under the General tab.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2015 11:02:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/2728241#M54146</guid>
      <dc:creator>Tobias Svensson</dc:creator>
      <dc:date>2015-09-07T11:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: Got the answer. But, really</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/3719532#M54147</link>
      <description>&lt;P&gt;Hello abhsha,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How did you solve this? I am connecting the AD via LDAP as well.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 19:50:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/3719532#M54147</guid>
      <dc:creator>jarjones</dc:creator>
      <dc:date>2018-10-04T19:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: Got the answer. But, really</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/4128020#M562004</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how did you solve this? im having the same issue&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 12:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authenticating-ad-users-with-only-domain-name-included/m-p/4128020#M562004</guid>
      <dc:creator>mcarassale</dc:creator>
      <dc:date>2020-07-30T12:43:36Z</dc:date>
    </item>
  </channel>
</rss>

