<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE COA after disable a user on AD ( how to kick automatically disabled user on AD ) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-coa-after-disable-a-user-on-ad-how-to-kick-automatically/m-p/4307827#M566163</link>
    <description>&lt;P&gt;I can only think of two possible ways to accomplish this:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Use a super aggressive Reauth timer in the AuthZ Profile pushed by your AuthZ Policy for AD user/computer sessions. The downside is that this would apply to all AD sessions and drastically increase the amount of RADIUS events/logs; possibly impacting performance.&lt;/LI&gt;
&lt;LI&gt;Look into possibly using scripting on the AD side (maybe a PowerShell script) that both disables the user account and uses the &lt;A href="https://developer.cisco.com/docs/identity-services-engine/2.7/#!using-change-of-authorization-rest-apis/introduction" target="_blank" rel="noopener"&gt;REST API&lt;/A&gt; to find the MAC address associated with that particular user session and issues a COA.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Example AuthZ Profile setting:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-03-16 at 9.17.13 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/106482i0E600C76D84467A3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-03-16 at 9.17.13 am.png" alt="Screen Shot 2021-03-16 at 9.17.13 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Mar 2021 22:24:31 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2021-03-15T22:24:31Z</dc:date>
    <item>
      <title>ISE COA after disable a user on AD ( how to kick automatically disabled user on AD )</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-coa-after-disable-a-user-on-ad-how-to-kick-automatically/m-p/4307552#M566149</link>
      <description>&lt;P&gt;hi y'all.&lt;/P&gt;&lt;P&gt;I have a question , i womder if someone out there can suggest me the easiest way to automatically&amp;nbsp;&lt;/P&gt;&lt;P&gt;kick an authenticated user doing traffic over the network , after i disable his AD account.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Basically if an account&amp;nbsp;has been disabled on AD the user can't join the network&amp;nbsp; , ofcourse.&lt;/P&gt;&lt;P&gt;but if a user is already authenticated inside the network and i disable his account on AD , untill&amp;nbsp;&lt;/P&gt;&lt;P&gt;a re-auth occurs the user keeps been connected and allowed to make traffic inside the network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So , is there a quick way to re-asses his status on AD trough a keep alive or something that tells ISE to check if the user account is still valid&amp;nbsp; ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 14:33:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-coa-after-disable-a-user-on-ad-how-to-kick-automatically/m-p/4307552#M566149</guid>
      <dc:creator>eugeniodesideri</dc:creator>
      <dc:date>2021-03-15T14:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE COA after disable a user on AD ( how to kick automatically disabled user on AD )</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-coa-after-disable-a-user-on-ad-how-to-kick-automatically/m-p/4307576#M566151</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1150156"&gt;@eugeniodesideri&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;please try:&lt;/P&gt;&lt;PRE&gt;in Context Visibility &amp;gt; Endpoints, filter by Username&lt;BR /&gt;on Change Authorization &amp;gt; CoA Session Terminate&lt;/PRE&gt;&lt;P&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 15:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-coa-after-disable-a-user-on-ad-how-to-kick-automatically/m-p/4307576#M566151</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-03-15T15:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE COA after disable a user on AD ( how to kick automatically disabled user on AD )</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-coa-after-disable-a-user-on-ad-how-to-kick-automatically/m-p/4307623#M566156</link>
      <description>&lt;P&gt;Thanks for the answer , but as i wrote i would like this to happen automatically as i disable a user inside the AD.&lt;/P&gt;&lt;P&gt;Do you think is that something i can achieve?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks again&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eugenio&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 16:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-coa-after-disable-a-user-on-ad-how-to-kick-automatically/m-p/4307623#M566156</guid>
      <dc:creator>eugeniodesideri</dc:creator>
      <dc:date>2021-03-15T16:25:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE COA after disable a user on AD ( how to kick automatically disabled user on AD )</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-coa-after-disable-a-user-on-ad-how-to-kick-automatically/m-p/4307827#M566163</link>
      <description>&lt;P&gt;I can only think of two possible ways to accomplish this:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Use a super aggressive Reauth timer in the AuthZ Profile pushed by your AuthZ Policy for AD user/computer sessions. The downside is that this would apply to all AD sessions and drastically increase the amount of RADIUS events/logs; possibly impacting performance.&lt;/LI&gt;
&lt;LI&gt;Look into possibly using scripting on the AD side (maybe a PowerShell script) that both disables the user account and uses the &lt;A href="https://developer.cisco.com/docs/identity-services-engine/2.7/#!using-change-of-authorization-rest-apis/introduction" target="_blank" rel="noopener"&gt;REST API&lt;/A&gt; to find the MAC address associated with that particular user session and issues a COA.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Example AuthZ Profile setting:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-03-16 at 9.17.13 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/106482i0E600C76D84467A3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-03-16 at 9.17.13 am.png" alt="Screen Shot 2021-03-16 at 9.17.13 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 22:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-coa-after-disable-a-user-on-ad-how-to-kick-automatically/m-p/4307827#M566163</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-03-15T22:24:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE COA after disable a user on AD ( how to kick automatically disabled user on AD )</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-coa-after-disable-a-user-on-ad-how-to-kick-automatically/m-p/4307979#M566167</link>
      <description>&lt;P&gt;the REST API looks like a very smart solution ! thanks for the advice !&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 08:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-coa-after-disable-a-user-on-ad-how-to-kick-automatically/m-p/4307979#M566167</guid>
      <dc:creator>eugeniodesideri</dc:creator>
      <dc:date>2021-03-16T08:43:07Z</dc:date>
    </item>
  </channel>
</rss>

