<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User Active in AD group in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5037684#M588008</link>
    <description>&lt;P&gt;See the &lt;LI-MESSAGE title="Cisco ISE Device Administration Prescriptive Deployment Guide" uid="3738365" url="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-device-administration-prescriptive-deployment-guide/m-p/3738365#U3738365" discussion_style_icon_css="lia-mention-container-editor-message lia-img-icon-tkb-thread lia-fa-icon lia-fa-tkb lia-fa-thread lia-fa"&gt;&lt;/LI-MESSAGE&gt;&amp;nbsp;&amp;gt; &lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId-1570587580" target="_self"&gt;Figure 7 TACACS Flow with AAA&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Notice how a single authentication occurs followed by multiple authorizations. This is because ISE has already authenticated the user against the identity store for their group membership and privilege level so when additional command authorization requests come in there is &lt;EM&gt;no authentication&lt;/EM&gt; - only &lt;EM&gt;authorization&lt;/EM&gt; - against the TACACS+ Command Sets.&amp;nbsp; ISE will not re-authenticate the user against the identity store for the remainder of that session on that network device.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2024 17:57:36 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2024-03-11T17:57:36Z</dc:date>
    <item>
      <title>User Active in AD group</title>
      <link>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5036101#M587963</link>
      <description>&lt;P&gt;Hi Team, Need clarity for the below scenarios.,&lt;/P&gt;&lt;P&gt;Common input: User abcd got added into AD groups and have both Read only/write permission&lt;BR /&gt;&lt;BR /&gt;Scenario1:User abcd logged in to switch and the session got established, while the user READ a file and performed some activity, by this time user got removed from the Read-only group, since the session is enabled still user can able to perform the Read access inside the active session.&lt;/P&gt;&lt;P&gt;Scenrio2:User abcd logged in to switch and the session got established, while the user READ a file and performed some activity, by this time user got removed from the Read-only group, since the session is enabled still user can able to perform the Read access inside the active session.&lt;BR /&gt;&lt;BR /&gt;Understanding: Since the session is active in both scenarios, it is expected if user try for Read-only but the other thought, when the user got removed from the AD groups it has to auto-exit.&lt;/P&gt;&lt;P&gt;Please confirm the same. Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 18:37:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5036101#M587963</guid>
      <dc:creator>lanagna</dc:creator>
      <dc:date>2024-03-07T18:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: User Active in AD group</title>
      <link>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5036113#M587964</link>
      <description>&lt;P&gt;Good question&amp;nbsp; - i have never come across this situation to be honest - the user fired in 1min of time. (that is different use case)&lt;/P&gt;
&lt;P&gt;depends on how you configured on the ISE - if you have Authorization&amp;nbsp; cache timeout 0 - then each authorization need to validate against ID source (as per my understanding)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In that user which is not valid, get authorization error. (this is my understand)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since ISE does not hold any cache of user information as per 3.0 version. ( 3.2 or 3.3 may have different - but not that i am aware.)&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 19:00:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5036113#M587964</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-03-07T19:00:24Z</dc:date>
    </item>
    <item>
      <title>Re: User Active in AD group</title>
      <link>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5036427#M587979</link>
      <description>&lt;P&gt;Thanks for the input and views.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 11:43:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5036427#M587979</guid>
      <dc:creator>lanagna</dc:creator>
      <dc:date>2024-03-08T11:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: User Active in AD group</title>
      <link>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5036737#M587990</link>
      <description>&lt;P&gt;As &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt; said, authentication is separate from authorization. There is no protocol or update mechanism for AD to callback to ISE or the switch (which AD knows nothing about) to say "the user permissions have changed, please invalidate your cache".&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 22:08:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5036737#M587990</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-03-08T22:08:35Z</dc:date>
    </item>
    <item>
      <title>Re: User Active in AD group</title>
      <link>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5037453#M588000</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;for briefing the query with additional inputs. Here I had a typo in the &lt;STRONG&gt;scenario2&lt;/STRONG&gt; which has to actual &lt;STRONG&gt;Read-write[changed below and marked additional query]&lt;/STRONG&gt;., So the above input is applicable for Read-Write also or it will differ - when the user establishes the session and writes some config??&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Scenrio2:&lt;/STRONG&gt; User abcd logged in to switch and the session got established, while the user a file and performed some activity, by this time user got removed from the &lt;STRONG&gt;Read-Write&lt;/STRONG&gt; group, &lt;EM&gt;&lt;STRONG&gt;Note: Once Read-write permission was removed for the active user it is getting reflected immediately in active session. i.e. If I'm the user I can't able to perform any write actions.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Scenario1:&amp;nbsp;&lt;/STRONG&gt;User abcd logged in to switch and the session was established, while the user READ a file and performed some activity, by this time user was removed from the Read-only group,&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;since the session is enabled still user can able to perform the Read access inside the active session.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2024 10:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5037453#M588000</guid>
      <dc:creator>lanagna</dc:creator>
      <dc:date>2024-03-11T10:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: User Active in AD group</title>
      <link>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5037684#M588008</link>
      <description>&lt;P&gt;See the &lt;LI-MESSAGE title="Cisco ISE Device Administration Prescriptive Deployment Guide" uid="3738365" url="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-device-administration-prescriptive-deployment-guide/m-p/3738365#U3738365" discussion_style_icon_css="lia-mention-container-editor-message lia-img-icon-tkb-thread lia-fa-icon lia-fa-tkb lia-fa-thread lia-fa"&gt;&lt;/LI-MESSAGE&gt;&amp;nbsp;&amp;gt; &lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId-1570587580" target="_self"&gt;Figure 7 TACACS Flow with AAA&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Notice how a single authentication occurs followed by multiple authorizations. This is because ISE has already authenticated the user against the identity store for their group membership and privilege level so when additional command authorization requests come in there is &lt;EM&gt;no authentication&lt;/EM&gt; - only &lt;EM&gt;authorization&lt;/EM&gt; - against the TACACS+ Command Sets.&amp;nbsp; ISE will not re-authenticate the user against the identity store for the remainder of that session on that network device.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2024 17:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5037684#M588008</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-03-11T17:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: User Active in AD group</title>
      <link>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5040066#M588113</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp; for the more input&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 18:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-active-in-ad-group/m-p/5040066#M588113</guid>
      <dc:creator>lanagna</dc:creator>
      <dc:date>2024-03-14T18:47:29Z</dc:date>
    </item>
  </channel>
</rss>

