<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ACI TACACS ISE authentication issues with local user. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-aci-tacacs-ise-authentication-issues-with-local-user/m-p/4661692#M576461</link>
    <description>&lt;P&gt;We are using ISE TACACS for authentication for our ACI environment.&amp;nbsp; We are also using RSA Securid for MFA, but I want to setup a local user on ISE that we can leverage for our Monitoring solution.&amp;nbsp; My user (MFA enabled on ISE) authenticates fine to the gui and I am able to do anything needed.&amp;nbsp; When I attempt to login to the GUI using the newly created account that does not utilize RSA and has a password set it eventually states that the TACACS/AAA took to long to respond.&amp;nbsp; Checking ISE the authentications for each are successful and the matched authorization policy is correct, along with the same shell provided to ACI.&amp;nbsp; I am not sure what logs to look at from either side but as I stated this works fine for a user that is setup with a Password type of RSA SecurID but not for a user that has a Password type of Internal User.&amp;nbsp; I can also type in the wrong pwd and it responds immediately with Access Denied.&lt;/P&gt;
&lt;P&gt;Thanks in advance,&lt;/P&gt;
&lt;P&gt;Joe&lt;/P&gt;</description>
    <pubDate>Mon, 01 Aug 2022 20:51:13 GMT</pubDate>
    <dc:creator>joeharb</dc:creator>
    <dc:date>2022-08-01T20:51:13Z</dc:date>
    <item>
      <title>Cisco ACI TACACS ISE authentication issues with local user.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aci-tacacs-ise-authentication-issues-with-local-user/m-p/4661692#M576461</link>
      <description>&lt;P&gt;We are using ISE TACACS for authentication for our ACI environment.&amp;nbsp; We are also using RSA Securid for MFA, but I want to setup a local user on ISE that we can leverage for our Monitoring solution.&amp;nbsp; My user (MFA enabled on ISE) authenticates fine to the gui and I am able to do anything needed.&amp;nbsp; When I attempt to login to the GUI using the newly created account that does not utilize RSA and has a password set it eventually states that the TACACS/AAA took to long to respond.&amp;nbsp; Checking ISE the authentications for each are successful and the matched authorization policy is correct, along with the same shell provided to ACI.&amp;nbsp; I am not sure what logs to look at from either side but as I stated this works fine for a user that is setup with a Password type of RSA SecurID but not for a user that has a Password type of Internal User.&amp;nbsp; I can also type in the wrong pwd and it responds immediately with Access Denied.&lt;/P&gt;
&lt;P&gt;Thanks in advance,&lt;/P&gt;
&lt;P&gt;Joe&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2022 20:51:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aci-tacacs-ise-authentication-issues-with-local-user/m-p/4661692#M576461</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2022-08-01T20:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACI TACACS ISE authentication issues with local user.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aci-tacacs-ise-authentication-issues-with-local-user/m-p/4661703#M576462</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320052"&gt;@joeharb&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One approach might be to include a TACACS Authentication Rule in ISE that looks for the local username using some form of identifier in the username itself - e.g. a prefix like "ise-xxxx" to distinguish it from the non-local accounts that are MFA enabled.&lt;/P&gt;
&lt;P&gt;For Authentication Policy, create a Condition, if you see a username like that, then don't use the External Identity/Sequence that you use for MFA, just use "Internal Users"&lt;/P&gt;
&lt;P&gt;And for Authorization Policy, you can either do the same thing again (match on TACACS Username STARTSWITH "ISE-" or whatever you like, and then assign the appropriate Authorization Profile.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2022 21:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aci-tacacs-ise-authentication-issues-with-local-user/m-p/4661703#M576462</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-08-01T21:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACI TACACS ISE authentication issues with local user.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aci-tacacs-ise-authentication-issues-with-local-user/m-p/4661710#M576463</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even the users that are MFA are still local users, their password type is different.&amp;nbsp; The authentication is successful for both users within the Audit Logs of ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jharibison.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158768iC0E8E28E9152B709/image-size/large?v=v2&amp;amp;px=999" role="button" title="jharibison.JPG" alt="jharibison.JPG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AAA_Slow.JPG" style="width: 935px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158769i49074386F53FD3B3/image-size/large?v=v2&amp;amp;px=999" role="button" title="AAA_Slow.JPG" alt="AAA_Slow.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2022 21:40:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aci-tacacs-ise-authentication-issues-with-local-user/m-p/4661710#M576463</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2022-08-01T21:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACI TACACS ISE authentication issues with local user.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-aci-tacacs-ise-authentication-issues-with-local-user/m-p/4661721#M576465</link>
      <description>&lt;P&gt;Sorry I didn't quite grasp it without the images - the images helped.&lt;/P&gt;
&lt;P&gt;Have you tried changing the jharbison Password Type from RSA SecureID to the default 'Internal User'?&lt;/P&gt;
&lt;P&gt;I would like to see your ISE Device Admin Authentication Policies and Authorization Policies - it seems like the non-RSA users are still subjected to additional (MFA) processing in ISE, when this should be bypassed for those users.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the the ACI configuration, is there any MFA awareness, or is it just straightforward TACACS+ configuration?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2022 22:12:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-aci-tacacs-ise-authentication-issues-with-local-user/m-p/4661721#M576465</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-08-01T22:12:51Z</dc:date>
    </item>
  </channel>
</rss>

