<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE / OKTA as Radius Token server - Authorization group okta in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4567735#M573356</link>
    <description>&lt;P&gt;OKTA seems to have an LDAP interface. Could you not use that, instead?&lt;/P&gt;
&lt;P&gt;Otherwise, &lt;A href="https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-and-attribute-quot-reply-message-quot/m-p/3488091/highlight/true#M535732" target="_self"&gt;Arne's reply in ISE as RADIUS Proxy and Attribute "Reply-Message"&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 10 Mar 2022 03:45:00 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2022-03-10T03:45:00Z</dc:date>
    <item>
      <title>ISE / OKTA as Radius Token server - Authorization group okta</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4557646#M572922</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I added OKTA to ISE as a Radius Token server, and it works fine&lt;/P&gt;&lt;P&gt;OKTA return RADIUS attribute "25 Class" for each group,&amp;nbsp;example class attribute :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ou=group1&lt;/LI&gt;&lt;LI&gt;ou=group1;ou=group2&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I see on Radius token server / authorization, I can configure CiscoSecure-Group-Id attribute or specify another (Class ?),&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I exploit it so that I can use it during authorization (allow only if a user is in a specific group) ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/144515i0CC88430A0D2436A/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE.png" alt="ISE.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 22 Feb 2022 22:38:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4557646#M572922</guid>
      <dc:creator>cisco.13</dc:creator>
      <dc:date>2022-02-22T22:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE / OKTA as Radius Token server - Authorization group okta</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4565123#M573259</link>
      <description>&lt;P&gt;In your ISE Policy's Authorization Rule, create a condition with&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Cisco:cisco-av-pair CONTAINS &amp;lt;group&amp;gt;&lt;/P&gt;
&lt;P&gt;and see if that works.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145513iB2976489548572A5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 04:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4565123#M573259</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-03-07T04:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE / OKTA as Radius Token server - Authorization group okta</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4565388#M573279</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No work with&amp;nbsp;&lt;STRONG&gt;&lt;SPAN&gt;Cisco:cisco-av-pair CONTAINS &amp;lt;group&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;!&lt;/P&gt;&lt;P&gt;in ISE, Class is OUT attribute, I&lt;SPAN&gt;&amp;nbsp;changed it to cisco-avpair in okta,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;but still not working!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 12:52:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4565388#M573279</guid>
      <dc:creator>cisco.13</dc:creator>
      <dc:date>2022-03-07T12:52:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE / OKTA as Radius Token server - Authorization group okta</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4565480#M573283</link>
      <description>&lt;P&gt;Sorry, I don't know what "Class is OUT" means.&lt;/P&gt;
&lt;P&gt;You need to provide some actual details for the community to help you.&lt;/P&gt;
&lt;P&gt;See &lt;LI-MESSAGE title="How to Ask The Community for Help" uid="3704356" url="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/m-p/3704356#U3704356"&gt;&lt;/LI-MESSAGE&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 15:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4565480#M573283</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-03-07T15:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE / OKTA as Radius Token server - Authorization group okta</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4565501#M573284</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Class is OUT" =&amp;gt; Direction&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image001.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145586iEAAD1212F5C0380D/image-size/large?v=v2&amp;amp;px=999" role="button" title="image001.png" alt="image001.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image002.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145587i9439A4C87BD9C45C/image-size/large?v=v2&amp;amp;px=999" role="button" title="image002.png" alt="image002.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is my configuration&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image001 (1).png" style="width: 945px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145588i50E315F72A7FE679/image-size/large?v=v2&amp;amp;px=999" role="button" title="image001 (1).png" alt="image001 (1).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;AuthZ rule :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image002 (1).png" style="width: 653px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145589iA7190D336C04721F/image-size/large?v=v2&amp;amp;px=999" role="button" title="image002 (1).png" alt="image002 (1).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 16:03:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4565501#M573284</guid>
      <dc:creator>cisco.13</dc:creator>
      <dc:date>2022-03-07T16:03:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE / OKTA as Radius Token server - Authorization group okta</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4567735#M573356</link>
      <description>&lt;P&gt;OKTA seems to have an LDAP interface. Could you not use that, instead?&lt;/P&gt;
&lt;P&gt;Otherwise, &lt;A href="https://community.cisco.com/t5/network-access-control/ise-as-radius-proxy-and-attribute-quot-reply-message-quot/m-p/3488091/highlight/true#M535732" target="_self"&gt;Arne's reply in ISE as RADIUS Proxy and Attribute "Reply-Message"&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2022 03:45:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4567735#M573356</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-03-10T03:45:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE / OKTA as Radius Token server - Authorization group okta</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4567778#M573361</link>
      <description>&lt;P&gt;It's been a while since I have used a token server in ISE but I recall that the reply message (from the token server) to ISE has to contain a Cisco AVPair that is formatted in such a way, that ISE can understand.&amp;nbsp; From my research some years back, the reply has to contain Cisco AVPair as such&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACS:&amp;lt;whatever_attr_name_you_want&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then you define that under RADIUS Token Identity Sources 'Authorization'.&amp;nbsp; You will have the &amp;lt;whatever_attr_name_you_want&amp;gt; available in your AuthZ policies.&amp;nbsp; If you don't use a custom name, then ISE defaults to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;CiscoSecure-Group-Id.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That means your external radius server needs to return a Cisco AVPair that looks like this (the User is in GroupXYZ) - you can't use anything other than a CiscoAVPair containing ACS...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So in your particular example, you have used Attribute Name of "cisco-av-pair" - this means, that OKTA has to reply to ISE with RADIUS attributes as shown below (two separate scenarios)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco-AVPair = ACS:cisco-av-pair = Super-User&lt;/P&gt;
&lt;P&gt;Cisco-AVPair = ACS:cisco-av-pair = Monitor-User&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this is the case, then your ISE Authorization rules will work - I explained it a bit more in the link that hslai shared.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The question is whether OKTA will let you manipulate the RADIUS attributes sent to ISE?&amp;nbsp; &lt;A href="https://help.okta.com/en/prod/Content/Topics/integrations/Okta_Radius_App-gen-group-auth.htm" target="_self"&gt;This OKTA link&lt;/A&gt; seems to imply that they support Vendor Specific (which is what Cisco-AVPair is using) - so hopefully you can make it work by pre-pending the ACS:blah to it?&lt;/P&gt;
&lt;P&gt;Select the Vendor Specific option from the drop down and then see how you get on. Share the screenshot please since I don't have OKTA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2022 06:12:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4567778#M573361</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-03-10T06:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE / OKTA as Radius Token server - Authorization group okta</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4567956#M573371</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Thank you for your reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In OKTA, I have :&lt;/P&gt;&lt;P&gt;26-Vendor specific&lt;/P&gt;&lt;P&gt;25-Class&lt;/P&gt;&lt;P&gt;11-Filter-ID&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can specify "&lt;STRONG&gt;ACS:cisco-av-pair&lt;/STRONG&gt;" only in "&lt;STRONG&gt;Group name format&lt;/STRONG&gt;" which returned to ISE (check ok with wireshark)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="okta1.png" style="width: 322px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145820iF17FF3A586444FDF/image-size/large?v=v2&amp;amp;px=999" role="button" title="okta1.png" alt="okta1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="okta2.png" style="width: 323px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145821iFB8052E03DACC251/image-size/large?v=v2&amp;amp;px=999" role="button" title="okta2.png" alt="okta2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2022 11:49:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/4567956#M573371</guid>
      <dc:creator>cisco.13</dc:creator>
      <dc:date>2022-03-10T11:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE / OKTA as Radius Token server - Authorization group okta</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/5195462#M591850</link>
      <description>&lt;P&gt;Hi Sir,&lt;/P&gt;
&lt;P&gt;I have recently integrated ISE's RADIUS TOKEN with OKTA. After entering the username and password on the Cisco switch, OKTA shows successful authentication, but I still see "% Authentication failed" on the switch.&lt;/P&gt;
&lt;P&gt;OKTA shows the authentication was successful, and on ISE, I only see Authentication success, but there is no information regarding Authorization.&lt;/P&gt;
&lt;P&gt;Could you please share your ISE and OKTA configurations for reference? Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 15:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-okta-as-radius-token-server-authorization-group-okta/m-p/5195462#M591850</guid>
      <dc:creator>tzuyukuo31538</dc:creator>
      <dc:date>2024-09-17T15:27:12Z</dc:date>
    </item>
  </channel>
</rss>

