<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE admin Group AD users in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5070303#M588761</link>
    <description>&lt;P&gt;Guys i tested this in the lab with ISE 2.7 version.&lt;/P&gt;
&lt;P&gt;1. Created an AD group in AD and added users (aduser1) to it.&lt;BR /&gt;2. Created external Administrator Group in ISE and selected the AD group&lt;BR /&gt;3. Logged into the ISE portal with username&amp;nbsp;aduser1&lt;BR /&gt;4. Result -&amp;nbsp;&lt;SPAN class="td-span"&gt;Administrator authentication failed &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;i checked the Admin audit log in ISE. It gave log "&lt;SPAN class="td-span"&gt;Authentication failed due to zero RBAC Groups."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="td-span"&gt;Created another AD user and added in ISE as super admin group. This user was able to login to ISE GUI. I think we can conclude ISE is intelligent enough to deny any AD user from logging to admin GUI portal.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Apr 2024 07:23:42 GMT</pubDate>
    <dc:creator>manvik</dc:creator>
    <dc:date>2024-04-16T07:23:42Z</dc:date>
    <item>
      <title>ISE admin Group AD users</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5051818#M588456</link>
      <description>&lt;P&gt;I have created an external admin group in ISE, which is pointing to an AD group. There are several users in this AD group.&lt;BR /&gt;Will all the users in this AD group gets ISE admin access or can it be restricted to few users.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 05:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5051818#M588456</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2024-03-28T05:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE admin Group AD users</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5051885#M588457</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/161770"&gt;@manvik&lt;/a&gt; any member of that group would be allowed based on that group membership.&lt;/P&gt;
&lt;P&gt;Ideally you should create a new group and add the users that require access into that group.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 08:26:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5051885#M588457</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-28T08:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE admin Group AD users</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5051896#M588458</link>
      <description>&lt;P&gt;oops that's shocking, is there any way to control this in ISE.&lt;BR /&gt;AD is handled diff department. Creating groups, adding/changing users to that group ha lengthy process and wait period.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 08:53:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5051896#M588458</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2024-03-28T08:53:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE admin Group AD users</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5051905#M588459</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/161770"&gt;@manvik&lt;/a&gt; use individual local accounts in the short term. And also arranage for the other department to create a dedicated AD group for ISE administrator, this is the standard approach of delegating mgmt to ISE administrators.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 08:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5051905#M588459</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-28T08:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE admin Group AD users</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5052346#M588483</link>
      <description>&lt;P&gt;This should not be shocking - this is the exact reason why group-based access exists and how it works to save you the need to individual manage permissions for 10's/100's/1000's of user accounts.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 20:06:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5052346#M588483</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-03-28T20:06:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE admin Group AD users</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5070303#M588761</link>
      <description>&lt;P&gt;Guys i tested this in the lab with ISE 2.7 version.&lt;/P&gt;
&lt;P&gt;1. Created an AD group in AD and added users (aduser1) to it.&lt;BR /&gt;2. Created external Administrator Group in ISE and selected the AD group&lt;BR /&gt;3. Logged into the ISE portal with username&amp;nbsp;aduser1&lt;BR /&gt;4. Result -&amp;nbsp;&lt;SPAN class="td-span"&gt;Administrator authentication failed &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;i checked the Admin audit log in ISE. It gave log "&lt;SPAN class="td-span"&gt;Authentication failed due to zero RBAC Groups."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="td-span"&gt;Created another AD user and added in ISE as super admin group. This user was able to login to ISE GUI. I think we can conclude ISE is intelligent enough to deny any AD user from logging to admin GUI portal.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 07:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5070303#M588761</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2024-04-16T07:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE admin Group AD users</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5070573#M588764</link>
      <description>&lt;P&gt;Are you saying that you had to create the admin locally in the AD as well as in ISE local database? if that is the case then I would say there is something wrong as if you point to an AD group for the admin accesses you shouldn't create any local account for those admins.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 10:27:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5070573#M588764</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-16T10:27:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE admin Group AD users</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5070798#M588777</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;, nope. AD user is created in AD only. AD group is called out as an ISE admin group.&amp;nbsp;&lt;BR /&gt;User wont be permitted to login to ISE GUI, if it's not created in ISE as an external password user.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 13:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5070798#M588777</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2024-04-16T13:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE admin Group AD users</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5070815#M588780</link>
      <description>&lt;P&gt;Thanks for the clarification. I don't remember ever had to do it that way, usually I connect ISE to AD and create the RBAC policy connecting the specific admin users AD group that would have full permissions.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 13:25:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-admin-group-ad-users/m-p/5070815#M588780</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-16T13:25:40Z</dc:date>
    </item>
  </channel>
</rss>

