<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ISE : Authorization for nested groups in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4920181#M583963</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;I write this post because I face an issue with the External Group coming from my active directory on authorization policies.&lt;/P&gt;
&lt;P&gt;We have several nested groups under a kind of root group, such as :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; NETWORK_USER&amp;nbsp; &amp;gt; CISCO&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; NETWORK_USER &amp;gt; OTHER_VENDOR&lt;BR /&gt;&lt;BR /&gt;My goal is to use the nested group in order to build my AuthZ policies to select the group dedicated to the right technology to allow only technology "owner" to login into the switch.&lt;/P&gt;
&lt;P&gt;Unfortunately, when ISE is retrieving groups from AD for a user who is trying to connect, it will only retrieve the root group (NETWORK_USER) and not the "Cisco" or "Other_Vendor" group.&lt;/P&gt;
&lt;P&gt;Is it something possible to do ? Do you already faced this kind of issue ?&lt;/P&gt;
&lt;P&gt;Thanks for your help !&lt;/P&gt;</description>
    <pubDate>Fri, 08 Sep 2023 12:33:09 GMT</pubDate>
    <dc:creator>k2no</dc:creator>
    <dc:date>2023-09-08T12:33:09Z</dc:date>
    <item>
      <title>Cisco ISE : Authorization for nested groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4920181#M583963</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;I write this post because I face an issue with the External Group coming from my active directory on authorization policies.&lt;/P&gt;
&lt;P&gt;We have several nested groups under a kind of root group, such as :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; NETWORK_USER&amp;nbsp; &amp;gt; CISCO&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; NETWORK_USER &amp;gt; OTHER_VENDOR&lt;BR /&gt;&lt;BR /&gt;My goal is to use the nested group in order to build my AuthZ policies to select the group dedicated to the right technology to allow only technology "owner" to login into the switch.&lt;/P&gt;
&lt;P&gt;Unfortunately, when ISE is retrieving groups from AD for a user who is trying to connect, it will only retrieve the root group (NETWORK_USER) and not the "Cisco" or "Other_Vendor" group.&lt;/P&gt;
&lt;P&gt;Is it something possible to do ? Do you already faced this kind of issue ?&lt;/P&gt;
&lt;P&gt;Thanks for your help !&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 12:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4920181#M583963</guid>
      <dc:creator>k2no</dc:creator>
      <dc:date>2023-09-08T12:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE : Authorization for nested groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4921069#M583982</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1295915"&gt;@k2no&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tried testing the user's Group assignment, by doing a Test User in the External Identity Sources &amp;gt; AD ? You can perform a "Lookup" on a user without needing to know their password. ISE will tell you what AD Groups that user is a member of. There is no magic involved here, because it's an exact dump of the AD Group Membership of that user (ISE doesn't mess that up). If the user is a member of &lt;SPAN&gt;NETWORK_USER&amp;nbsp; &amp;gt; CISCO then ISE will tell you.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I suspect that your AD structure is made up of OUs and not Security Groups. Those are two different things in AD.&lt;/P&gt;
&lt;P&gt;Let's assume that you have and OU structure, then you can still perform this in ISE Authorization Policy. T&lt;A href="https://bluenetsec.com/how-to-use-active-directory-ous-in-cisco-ise-authorization-rules/" target="_self"&gt;ake a look at this article&lt;/A&gt; that explains how to use the AD Attributes feature to perform OU matching.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 22:13:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4921069#M583982</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-09-10T22:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE : Authorization for nested groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4924876#M584098</link>
      <description>&lt;P&gt;Hello Arne,&lt;/P&gt;
&lt;P&gt;Thanks for your feedback.&lt;/P&gt;
&lt;P&gt;Sorry, something I didn't explain very well we’re not using a proper AD Join we are using the LDAP join so I can’t really Test the user.&lt;/P&gt;
&lt;P&gt;I can see on which group the user belongs when clicking on “details” on the authentication. And I can see that the nested group is not shown for the user in ExternalGroup under “Other Attributes”.&lt;/P&gt;
&lt;P&gt;But if I try to retrieve them on Ex ID Source &amp;gt; LDAP &amp;gt; Groups I can retrieve the nested group without any issues.&lt;/P&gt;
&lt;P&gt;For example two of my not working nested group are CN=Cisco,OU=RADIUS,OU=Groups,OU=mydomain,DC=mydomain,DC=com &amp;amp; CN=Other,OU=RADIUS,OU=Groups,OU= mydomain,DC= mydomain,DC=com.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 07:59:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4924876#M584098</guid>
      <dc:creator>k2no</dc:creator>
      <dc:date>2023-09-18T07:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE : Authorization for nested groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4925251#M584115</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1295915"&gt;@k2no&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I find LDAP challenging at the best of times. I don't use it much, but each time I have to use a tool like LDAP Browser to remind me how things work. You can certainly test a user lookup in ISE under the LDAP Identity Source, then select the Attributes tab. Click "Add" and then choose "Select Attributes from Directory".&amp;nbsp; In the Example Subject field, you must put the exact Subject string to retrieve a single account. E.g. in my lab I used&amp;nbsp; &amp;nbsp;CN=Arne Bier,CN=Users,DC=rnlab,DC=local&amp;nbsp; &amp;nbsp;- then click Retrieve Attributes.&lt;/P&gt;
&lt;P&gt;Ok. Where to start... I am using Windows Server 2016 Active Directory and I have bound to the AD using LDAP TCP/389.&lt;/P&gt;
&lt;P&gt;I created some dummy OUs and a Group within that OU. I then also added a test user into the Group.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LDAP-AD.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/197580iA4B0F2474C783FDF/image-size/large?v=v2&amp;amp;px=999" role="button" title="LDAP-AD.png" alt="LDAP-AD.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ISE search base DNs I used are the top-level of the&amp;nbsp; domain rnlab.local. e.g.&amp;nbsp;DC=rnlab,DC=local&lt;/P&gt;
&lt;P&gt;I always modify the ISE LDAP schema, based on the default Active Directory schema, but instead of sUserPrincipalName, I use Subject Name Attribute = sAMAccountName.&lt;/P&gt;
&lt;P&gt;Then I added two Groups - notice the DN structure&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LDAP-groups.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/197579i25BCE7A09BD7DAE2/image-size/large?v=v2&amp;amp;px=999" role="button" title="LDAP-groups.png" alt="LDAP-groups.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Policy AuthZ as follows&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LDAP-AuthZ.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/197581iD2F7A3CF3FC5E619/image-size/large?v=v2&amp;amp;px=999" role="button" title="LDAP-AuthZ.png" alt="LDAP-AuthZ.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The Live Logs Details shows the results&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LDAP-ubuntu-authz.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/197582i1514355024AC1575/image-size/large?v=v2&amp;amp;px=999" role="button" title="LDAP-ubuntu-authz.png" alt="LDAP-ubuntu-authz.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 22:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4925251#M584115</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-09-18T22:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE : Authorization for nested groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4928672#M584235</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your time over your lab.&lt;/P&gt;
&lt;P&gt;That's not exactly the same issue i guess. Here you have a group in a specific OU and the user belongs to a specific group.&lt;/P&gt;
&lt;P&gt;My goal is to have a user belonging to a specific group in which other groups are member of and retrieve them on ISE. For example :&lt;/P&gt;
&lt;P&gt;I have my user 'myuser' who belongs to Network User group :&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="k2no_0-1695636652875.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198143iA9C34B2A292E7349/image-size/medium?v=v2&amp;amp;px=400" role="button" title="k2no_0-1695636652875.png" alt="k2no_0-1695636652875.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I also have "Cisco" and "Other" which are members of "Network_User" : &lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="k2no_1-1695636784113.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198144iB59EA3102B6C8E44/image-size/medium?v=v2&amp;amp;px=400" role="button" title="k2no_1-1695636784113.png" alt="k2no_1-1695636784113.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="k2no_2-1695636820892.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198145i4588434E29E22907/image-size/medium?v=v2&amp;amp;px=400" role="button" title="k2no_2-1695636820892.png" alt="k2no_2-1695636820892.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;My goal is to say if myuser is a network_user, since other and cisco are members of network_user myuser will be implicitly member of Cisco and Other. With that i would like to permit all Network_Users to be part of Cisco and Other groups and also give me the possibility to add users from others group to be member of "Cisco" or "Other" group without being in Network User.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't know if it's more clear to you.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2023 10:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4928672#M584235</guid>
      <dc:creator>k2no</dc:creator>
      <dc:date>2023-09-25T10:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE : Authorization for nested groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4931818#M584323</link>
      <description>&lt;P&gt;I have recreated your AD group structure:&lt;/P&gt;
&lt;P&gt;- Network_User&lt;BR /&gt;&amp;nbsp; - Cisco&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - cisco_user&lt;BR /&gt;&amp;nbsp; - Other_Vendor&lt;BR /&gt;&amp;nbsp; - myuser&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 401px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198471iC6C0DBB9F0E772A4/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;+Add the AD Groups to ISE:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198474i98FA226B68836B14/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Then go test the user as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/82347"&gt;@Arne Bier&lt;/a&gt; suggested:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 652px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198473iC9098A28C7AEEAEF/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and I get:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198477i4B6D6E7779813E47/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198478i8AC969A2F3BE8EB9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2023 23:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4931818#M584323</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2023-09-29T23:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE : Authorization for nested groups</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4932187#M584339</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1295915"&gt;@k2no&lt;/a&gt;&amp;nbsp;The LDAP ID sources in ISE do not support nested group membership lookups. Please create them as AD join points, instead.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Oct 2023 00:38:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authorization-for-nested-groups/m-p/4932187#M584339</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2023-10-02T00:38:56Z</dc:date>
    </item>
  </channel>
</rss>

