<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Device admin policy set using RSA as external ID source in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829340#M581554</link>
    <description>&lt;P&gt;Of course. RSA has been configured and added to the DEvice admin policy. If you read my initial post, you will see that, and that I state this part works correctly. However, the authorization part fails, because it says it cannot find the user in the identity store, despite finding it in the authentication profile, and validating my credentials when I entered them.&lt;/P&gt;&lt;P&gt;What I need to know is how to get the authorization part to work correctly in the device admin policy set.&lt;/P&gt;</description>
    <pubDate>Fri, 05 May 2023 14:37:19 GMT</pubDate>
    <dc:creator>stuartcross</dc:creator>
    <dc:date>2023-05-05T14:37:19Z</dc:date>
    <item>
      <title>Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829282#M581549</link>
      <description>&lt;P&gt;Trying to configure a device admin policy set for TACACS plus, using RSA to authenticate.&amp;nbsp; I can get the Authentication to work and I see ISE talking to RSA in the tacacs logs and authenticating ok, however the authorization fails and says there is no user in the selected identity store.&amp;nbsp; How can I configure the authorization part of the policy?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 13:18:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829282#M581549</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-05T13:18:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829286#M581550</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1355203"&gt;@stuartcross&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;To configure the authorization part of the device admin policy set for TACACS+, you need to define the authorization profile and authorization rules in Cisco ISE. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://content.cisco.com/chapter.sjs?uri=/searchable/chapter/content/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_010011.html.xml" target="_blank" rel="noopener"&gt;https://content.cisco.com/chapter.sjs?uri=/searchable/chapter/content/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_010011.html.xml&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;=&amp;gt;&amp;nbsp;&lt;/SPAN&gt;Manage Authorization Policies and Profiles&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 13:24:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829286#M581550</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2023-05-05T13:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829309#M581551</link>
      <description>&lt;P&gt;No that's not an answer to my question.&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 13:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829309#M581551</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-05T13:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829325#M581552</link>
      <description>&lt;P&gt;OK &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1355203"&gt;@stuartcross&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Do you have configured the necessary identity store in ISE to retrieve user information ? This identity store can be an Active Directory server, LDAP server, or other external databases.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Do you have c&lt;/SPAN&gt;reated authorization rules that specify the privileges or permissions that are granted to authenticated users. These rules can be based on attributes such as user groups, network device type, and time of day.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 14:15:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829325#M581552</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2023-05-05T14:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829331#M581553</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200208-Configure-ISE-2-0-IOS-TACACS-Authentic.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200208-Configure-ISE-2-0-IOS-TACACS-Authentic.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This what you need for admin?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 14:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829331#M581553</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-05T14:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829340#M581554</link>
      <description>&lt;P&gt;Of course. RSA has been configured and added to the DEvice admin policy. If you read my initial post, you will see that, and that I state this part works correctly. However, the authorization part fails, because it says it cannot find the user in the identity store, despite finding it in the authentication profile, and validating my credentials when I entered them.&lt;/P&gt;&lt;P&gt;What I need to know is how to get the authorization part to work correctly in the device admin policy set.&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 14:37:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829340#M581554</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-05T14:37:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829342#M581555</link>
      <description>&lt;P&gt;I have got TACACS working using Cisco AD. However, this is for RSA, and so far I cannot get it to work the same as AD does.&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 14:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829342#M581555</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-05T14:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829358#M581556</link>
      <description>&lt;P&gt;AS you can see here. When I enter my RSA username and passcode, it is successful.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;"A session is established with the RSA SecurID Server - RSA "&lt;/LI&gt;&lt;LI&gt;"Check passcode operation succeeded - RSA SecurID"&lt;/LI&gt;&lt;LI&gt;"User authentication has succeeded - RSA"&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;However, the authorization fails&lt;/P&gt;&lt;P&gt;15013 Selected Identity Source - RSA SecurID&lt;BR /&gt;22056 Subject not found in the applicable identity store(s)&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 14:51:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829358#M581556</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-05T14:51:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829433#M581563</link>
      <description>&lt;P&gt;Could you share the detailed authentication report from ISE? Also, share the screenshot of the authentication and authorization policy that it should hit such that the options part of the authentication policy is visible.&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 17:00:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829433#M581563</guid>
      <dc:creator>Nancy Saini</dc:creator>
      <dc:date>2023-05-05T17:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829804#M581572</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I managed to get this working now by changing the options for "if user not found" to "continue".&amp;nbsp; What I don't understand is if it finds my user in RSA and authenticates me using my passcode, why does it then say user not found in identity store.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 06 May 2023 12:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829804#M581572</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-06T12:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829896#M581575</link>
      <description>&lt;P&gt;Seems like ISE is treating rejects from RSA server as "User not found" due to below configuration.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NancySaini_0-1683393928367.png" style="width: 894px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/183947iAFA6A11C9040B0AF/image-dimensions/894x342?v=v2" width="894" height="342" role="button" title="NancySaini_0-1683393928367.png" alt="NancySaini_0-1683393928367.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Check on the RSA server why it is sending reject to ISE&lt;/P&gt;</description>
      <pubDate>Sat, 06 May 2023 17:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829896#M581575</guid>
      <dc:creator>Nancy Saini</dc:creator>
      <dc:date>2023-05-06T17:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829975#M581578</link>
      <description>&lt;P&gt;I checked RSA logs and it is passing my authentication, and you see that in the ISE tacacs live log.&amp;nbsp; I don't believe it is sending rejects. Also under the RSA config, I do not have it set to treat rejects as "user not found".&amp;nbsp; However, changing the options to continue is allowing me to access the router.&lt;/P&gt;</description>
      <pubDate>Sun, 07 May 2023 10:02:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4829975#M581578</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-07T10:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4830063#M581580</link>
      <description>&lt;P&gt;Show us your actual policy and your actual error message(s).&lt;/P&gt;
&lt;P&gt;It's is very hard to comment or make suggestions on "&lt;EM&gt;authorization fails and says there is no user in the selected identity store&lt;/EM&gt;".&lt;/P&gt;
&lt;P&gt;We don't know what you are doing or how you are doing it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See &lt;LI-MESSAGE title="How to Ask The Community for Help" uid="3704356" url="https://community.cisco.com/t5/security-knowledge-base/how-to-ask-the-community-for-help/m-p/3704356#U3704356" discussion_style_icon_css="lia-mention-container-editor-message lia-img-icon-tkb-thread lia-fa-icon lia-fa-tkb lia-fa-thread lia-fa"&gt;&lt;/LI-MESSAGE&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 May 2023 15:45:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4830063#M581580</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2023-05-07T15:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4831557#M581610</link>
      <description>&lt;P&gt;Its a simple policy.&amp;nbsp; If a switch tacacs request is received, then use RSA identity source.&amp;nbsp; I can see my authentication happening in the RSA logs and passing ok.&amp;nbsp; From here it's then meant to just give me access to priv15 in the ISE authorization part of the policy.&amp;nbsp; This wasn't working, but now does since I changed the options to "continue" if "user not found"&lt;/P&gt;&lt;P&gt;The error I already posted above, it comes from the authorization report (authentication report is good and shows successful RSA authentication).&amp;nbsp; The two lines from the error report are.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;15013 Selected Identity Source - RSA SecurID&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;22056 Subject not found in the applicable identity store(s)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Do you need more than that?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2023 08:27:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4831557#M581610</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-09T08:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4831822#M581613</link>
      <description>&lt;P&gt;Added the report.&amp;nbsp; The authentication showing RSA authentication working fine. The authorization showing user not found but now using advanced options setting to continue.&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2023 11:35:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4831822#M581613</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-09T11:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4832321#M581629</link>
      <description>&lt;P&gt;Kindly download the complete report for working and non-working scenario and attach it as just screenshots of the report will not help much. Also attach the complete authentication and authorization policy details for matching policy.&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 04:24:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4832321#M581629</guid>
      <dc:creator>poongarg</dc:creator>
      <dc:date>2023-05-10T04:24:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4832410#M581631</link>
      <description>&lt;P&gt;Hi, The tacacs reports do not give you any detailed information.&amp;nbsp; Only a CSV outlining the attempts and if they failed or passed.&amp;nbsp; Is there a way I can download the the detailed report?&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 09:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4832410#M581631</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-10T09:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4832487#M581638</link>
      <description>&lt;P&gt;Also, just to add, this does not happen if I use AD as the external ID source. Only when using RSA, so maybe a symptom of using RSA as the external ID source, as it doesn't share the username with ISE, unlike AD?&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 11:14:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4832487#M581638</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-10T11:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4832520#M581648</link>
      <description>&lt;P&gt;You need to press CTRL+P to print the report. Also need to see the AuthC and AuthZ policies configured for this authentication.&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 12:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4832520#M581648</guid>
      <dc:creator>poongarg</dc:creator>
      <dc:date>2023-05-10T12:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Device admin policy set using RSA as external ID source</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4832533#M581653</link>
      <description>&lt;P&gt;Hi, I'm slightly uncomfortable about posting our policy on a public forum, is there a more secure method?&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 12:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-device-admin-policy-set-using-rsa-as-external-id-source/m-p/4832533#M581653</guid>
      <dc:creator>stuartcross</dc:creator>
      <dc:date>2023-05-10T12:28:34Z</dc:date>
    </item>
  </channel>
</rss>

