<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4418740#M567877</link>
    <description>&lt;P&gt;The Device Admin Policy Set does not support Authorization Policy conditions using the ROPC Azure AD store. As such, you cannot match on AzureAD groups for differentiated device admin access.&lt;/P&gt;</description>
    <pubDate>Wed, 16 Jun 2021 03:08:56 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2021-06-16T03:08:56Z</dc:date>
    <item>
      <title>Cisco ISE 3.0 with Azure AD deployment - TACACS User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4416862#M567802</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are going to deploy Cisco ISE 3.0 with azure AD, There is a requirement from customer to integrate the security and network devices for TACACS user authentication.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This solution is possible with Cisco ISE with Azure AD ,as i understand only ROPC protocol works between Cisco ISE &amp;amp; Azure AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jithish K K&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 15:05:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4416862#M567802</guid>
      <dc:creator>Jithishkk1514</dc:creator>
      <dc:date>2021-06-11T15:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4417074#M567806</link>
      <description>&lt;P&gt;From the ISE Admin Guide:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-0/admin_guide/b_ISE_admin_3_0/b_ISE_admin_30_asset_visibility.html?bookSearch=true#concept_6878301F1F7C460585A4A267ECF77723" target="_self"&gt;SAMLv2 Identity Provider as an External Identity Source&lt;/A&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;SAML SSO is supported for the following portals:&lt;/P&gt;
&lt;UL id="concept_6878301F1F7C460585A4A267ECF77723__ul_fr5_5kh_zdb" class="ul"&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_839ADA4C83C1468AAF109B6F7866DC88" class="li"&gt;
&lt;P class="p"&gt;Guest portal (sponsored and self-registered)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_42F92355DB5E4A50A16D038A9ECEF4D7" class="li"&gt;
&lt;P class="p"&gt;Sponsor portal&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_E91BD286F67E4ADEA1D0DD57BA31129E" class="li"&gt;
&lt;P class="p"&gt;My Devices portal&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_2AD664BB37B847D7AFB479EB1A50090A" class="li"&gt;
&lt;P class="p"&gt;Certificate Provisioning portal&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="p"&gt;You cannot select IdP as external identity source for BYOD portal, but you can select an IdP for a guest portal and enable BYOD flow.&lt;/P&gt;
&lt;P class="p"&gt;Cisco ISE is &lt;SPAN class="searchMark primary"&gt;SAML&lt;/SPAN&gt;v2 compliant and supports all &lt;SPAN class="searchMark primary"&gt;SAML&lt;/SPAN&gt;v2 compliant IdPs that use Base64-encoded certificates. The IdPs listed below have been tested with Cisco ISE:&lt;/P&gt;
&lt;UL id="concept_6878301F1F7C460585A4A267ECF77723__ul_m1s_vkh_zdb" class="ul"&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_B59D772C36034EF395B151C77420226F" class="li"&gt;
&lt;P class="p"&gt;Oracle Access Manager (OAM)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_3C4F2C35B2184F44BE46AEF7D92E1EA0" class="li"&gt;
&lt;P class="p"&gt;Oracle Identity Federation (OIF)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_58BBCF4EA39E49C4B0BE43C047744C39" class="li"&gt;
&lt;P class="p"&gt;SecureAuth&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_F8994CC1ADC84D27B1B3EF5578C79EFA" class="li"&gt;
&lt;P class="p"&gt;PingOne&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_1A221A6B3B134F7590F73E9A95943C2E" class="li"&gt;
&lt;P class="p"&gt;PingFederate&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="concept_6878301F1F7C460585A4A267ECF77723__li_638A8A6B9C07440BA72DA7FF362A953A" class="li"&gt;
&lt;P class="p"&gt;Azure Active Directory&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="p"&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;The IdP cannot be added to an identity source sequence.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Fri, 11 Jun 2021 23:59:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4417074#M567806</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-06-11T23:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4417752#M567844</link>
      <description>&lt;P&gt;Thanks Thomas,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please confirm whether TACACS can be used in ISE 3.0 version with Azure AD.?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jun 2021 10:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4417752#M567844</guid>
      <dc:creator>Jithishkk1514</dc:creator>
      <dc:date>2021-06-14T10:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4418740#M567877</link>
      <description>&lt;P&gt;The Device Admin Policy Set does not support Authorization Policy conditions using the ROPC Azure AD store. As such, you cannot match on AzureAD groups for differentiated device admin access.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jun 2021 03:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4418740#M567877</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-06-16T03:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4714017#M578004</link>
      <description>&lt;P&gt;Is TACACS authentication/Authorization for network device support with ISE 3.2 and azure AD?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 06:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4714017#M578004</guid>
      <dc:creator>hasitha siriwardhana</dc:creator>
      <dc:date>2022-11-01T06:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4715156#M578044</link>
      <description>&lt;P&gt;No, there is no change to this behaviour in the current release of ISE 3.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 21:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4715156#M578044</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-11-02T21:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4795904#M580549</link>
      <description>&lt;P&gt;Is there a way to pass the Authentication with AzureAD and handle authorization on Cisco ISE?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2023 17:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4795904#M580549</guid>
      <dc:creator>kirk.thibodeaux</dc:creator>
      <dc:date>2023-03-16T17:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4796027#M580558</link>
      <description>&lt;P&gt;As I stated earlier in this thread:&lt;BR /&gt;&lt;EM&gt;"The Device Admin Policy Set does not support &lt;STRONG&gt;Authorization&lt;/STRONG&gt; Policy conditions using the ROPC Azure AD store. As such, you cannot match on AzureAD groups for differentiated device admin access."&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2023 21:09:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4796027#M580558</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-03-16T21:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4821603#M581374</link>
      <description>&lt;P&gt;Hey Greg. Is user authentication supported with ISE + Azure AD for tacacs (not authorization) in ISE 3.2 ?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 21:28:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4821603#M581374</guid>
      <dc:creator>emgalanme</dc:creator>
      <dc:date>2023-04-25T21:28:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4821707#M581380</link>
      <description>&lt;P&gt;Technically yes, you can use an ROPC Identity Store in the Device Admin Authentication Policy. The Authentication session will pass, but the Authorization session will result in a process failure.&lt;/P&gt;
&lt;P&gt;You could mitigate the process failure by configuring the advanced option for 'If process fail = CONTINUE' but there would still be no way to differentiate authorization for different levels of admin access (Read-Write versus Read-Only, for example). You would be limited to the result of the Default Authorization Policy.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2023 01:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4821707#M581380</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-04-26T01:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4828796#M581535</link>
      <description>&lt;P&gt;The process fail option didn't actually work, since the secondary authentication results in a user not found, not necessarily a process failure. So the only way to make it "work" is a user not found-continue, which ends up allowing any Bunk username to pass. Which is obviously not an option...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Recommendation is to either use on prem MS AD or local accounts in ISE.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 16:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/4828796#M581535</guid>
      <dc:creator>steve.berglund</dc:creator>
      <dc:date>2023-05-04T16:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5216408#M592745</link>
      <description>&lt;P&gt;When will Cisco support AZURE saml IDP for TACACS+ authentication?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 19:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5216408#M592745</guid>
      <dc:creator>mike.bradley</dc:creator>
      <dc:date>2024-10-28T19:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5216470#M592754</link>
      <description>&lt;P&gt;First of all, roadmap is not discussed on this public forum.&lt;/P&gt;
&lt;P&gt;Secondly, SAML is browser-based so I'm not sure how that would work with TACACS+. The client itself would have to be able to pop up a browser to complete the authentication.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 21:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5216470#M592754</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-10-28T21:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5371057#M599819</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;Is there in the behavior if ise version is 3.4 or 3.5 now to do external authentication for Device Administration using Entra ID&amp;nbsp; ?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 22:27:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5371057#M599819</guid>
      <dc:creator>MSJ1</dc:creator>
      <dc:date>2026-02-18T22:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5371795#M599842</link>
      <description>&lt;P&gt;The first stop for questions like this should be to review the Release Notes found at &lt;A href="https://cs.co/ise-docs" target="_blank"&gt;https://cs.co/ise-docs&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This is a new feature in ISE 3.5 and is clearly documented in those &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-5/release_notes/cisco-ise-release-notes-35.html" target="_blank" rel="noopener"&gt;Release Notes&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-02-23 at 9.01.27 am.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/260055iB5DA83281D77BE1A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2026-02-23 at 9.01.27 am.png" alt="Screenshot 2026-02-23 at 9.01.27 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Feb 2026 22:02:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5371795#M599842</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2026-02-22T22:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5372701#M599876</link>
      <description>&lt;P&gt;But do you agree that since Device Policy Set will use Entra ID user group as part of Device Policy Set , we may will fall into same for the bug&amp;nbsp;(&amp;nbsp;&lt;SPAN class="custom-text-color-light subheader-large"&gt;CSCws30603&amp;nbsp; )&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="subheader-large"&gt;ISE unable to fetch user group membership if user belongs to more than 20 groups.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 18:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5372701#M599876</guid>
      <dc:creator>MSJ1</dc:creator>
      <dc:date>2026-02-25T18:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.0 with Azure AD deployment - TACACS User authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5372762#M599879</link>
      <description>&lt;P&gt;Yes, it still uses Graph API calls so it would be subject to that bug&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 21:45:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-0-with-azure-ad-deployment-tacacs-user/m-p/5372762#M599879</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2026-02-25T21:45:03Z</dc:date>
    </item>
  </channel>
</rss>

