<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Device Admin with 2FA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-device-admin-with-2fa/m-p/4131340#M562151</link>
    <description>&lt;P&gt;Hi Guys, I want my ISE Device Admin to be in 2FA (AD username + passcode). I know that ISE can only authenticate to one external ID store at a time so what I am going to do is to integrate my 2FA server (since my 2FA is integrated already to AD). My question now is, which of these options should I use?&lt;/P&gt;&lt;P&gt;1. External RADIUS Server (under the Network Resources category)&lt;/P&gt;&lt;P&gt;2. RADIUS Token (under the External ID Sources) - this is the existing setup but I noticed I need to configure a username stored locally in ISE DB in which I don't want. I want to leverage the integration of my 2FA and AD.&lt;/P&gt;&lt;P&gt;3. RSA SecurID (under the External ID Sources)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 06 Aug 2020 10:27:08 GMT</pubDate>
    <dc:creator>fatalXerror</dc:creator>
    <dc:date>2020-08-06T10:27:08Z</dc:date>
    <item>
      <title>ISE Device Admin with 2FA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-admin-with-2fa/m-p/4131340#M562151</link>
      <description>&lt;P&gt;Hi Guys, I want my ISE Device Admin to be in 2FA (AD username + passcode). I know that ISE can only authenticate to one external ID store at a time so what I am going to do is to integrate my 2FA server (since my 2FA is integrated already to AD). My question now is, which of these options should I use?&lt;/P&gt;&lt;P&gt;1. External RADIUS Server (under the Network Resources category)&lt;/P&gt;&lt;P&gt;2. RADIUS Token (under the External ID Sources) - this is the existing setup but I noticed I need to configure a username stored locally in ISE DB in which I don't want. I want to leverage the integration of my 2FA and AD.&lt;/P&gt;&lt;P&gt;3. RSA SecurID (under the External ID Sources)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 10:27:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-admin-with-2fa/m-p/4131340#M562151</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2020-08-06T10:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Device Admin with 2FA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-admin-with-2fa/m-p/4131579#M562166</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I personally don't know the rsa solution. When using Duo, I use Radius token and replied to a previous post with same requirements (&lt;A href="https://community.cisco.com/t5/network-access-control/tacacs-authentication-with-a-proxy-radius-and-local/td-p/4088804" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/tacacs-authentication-with-a-proxy-radius-and-local/td-p/4088804&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Doing a quick search on this forum, you can use Radius Token and external 2FA for RSA. See the following links (2nd link include an official guide from RSA):&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-with-rsa-securid-and-ad-integration/td-p/3441295" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-with-rsa-securid-and-ad-integration/td-p/3441295&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/two-factor-authentication-on-ise-2fa-on-ise/ta-p/3636120" target="_blank"&gt;https://community.cisco.com/t5/security-documents/two-factor-authentication-on-ise-2fa-on-ise/ta-p/3636120&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 17:42:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-admin-with-2fa/m-p/4131579#M562166</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-08-06T17:42:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Device Admin with 2FA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-admin-with-2fa/m-p/4131584#M562167</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321306"&gt;@Francesco Molino&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Thanks for your feedback, I'll check it out.&lt;/P&gt;&lt;P&gt;But I am just wondering what are the difference between those different ways to integrate RADIUS server?&lt;/P&gt;&lt;P&gt;Thaks&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 17:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-admin-with-2fa/m-p/4131584#M562167</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2020-08-06T17:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Device Admin with 2FA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-admin-with-2fa/m-p/4131614#M562170</link>
      <description>The external identity source called RSA SecurID is a specific integration between ISE and RSA. Radius Token is an external server communicating through radius protocol. In this last case, ISE act as a proxy Radius and gets infos regarding authentication from another radius for example.</description>
      <pubDate>Thu, 06 Aug 2020 18:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-admin-with-2fa/m-p/4131614#M562170</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-08-06T18:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Device Admin with 2FA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-admin-with-2fa/m-p/4134152#M562287</link>
      <description>&lt;P&gt;Did you look at the &lt;A href="https://community.rsa.com/docs/DOC-99979" target="_self"&gt;Cisco ISE - RSA&amp;nbsp;SecurID&amp;nbsp;Access Implementation Guide&lt;/A&gt; ?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 21:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-admin-with-2fa/m-p/4134152#M562287</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-08-11T21:45:24Z</dc:date>
    </item>
  </channel>
</rss>

