<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic Authorization policy based on groups pulled from odbc in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-policy-based-on-groups-pulled-from-odbc/m-p/5143804#M590579</link>
    <description>&lt;P&gt;Your methodology sounds correct. If the 'in' operator is not working, try 'contains' since the value returned may be treated as a string.&lt;/P&gt;
&lt;P&gt;Consider looking at any of the docs under &lt;A href="https://cs.co/ise-berg#odbc" target="_blank"&gt;https://cs.co/ise-berg#odbc &lt;/A&gt;for similar situations and solutions.&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jul 2024 20:01:44 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2024-07-11T20:01:44Z</dc:date>
    <item>
      <title>Dynamic Authorization policy based on groups pulled from odbc</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-policy-based-on-groups-pulled-from-odbc/m-p/5139086#M590385</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;There is a need that specific end clients can connect/authenticate(EAP-TLS) on RADIUS via specific NAS/Authenticators.&lt;/P&gt;&lt;P&gt;It can be a 1:1(One end client allowed through a specific NAS only) or 1:Many(One end client allowed through multiple NAS) relationship. These relationships can change and are dynamic.&lt;/P&gt;&lt;P&gt;Able to get the dynamic 1:1 scenario done using odbc "&lt;SPAN&gt;Fetch attributes"&lt;/SPAN&gt;. (A table with two columns : Common name from EAP-TLS certificate| serial number of allowed NAS) i.e. (cn|router)&lt;/P&gt;&lt;P&gt;The RADIUS request has the NAS serial number in the NAS identifier field and so an authorization policy as below works.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="adityaprakashdash_0-1719943863449.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/222134i227D9807201D07E4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="adityaprakashdash_0-1719943863449.png" alt="adityaprakashdash_0-1719943863449.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;authdetails is the name of the odbc connection in ISE and router is the column with the&amp;nbsp; NAS serial number.&lt;/P&gt;&lt;P&gt;However, can't this to work for the 1:Many case where groups need to be involved. (&lt;SPAN&gt;Fetch groups in ODBC)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Three backend tables: One with the list of devices(Common names from cert), One with the groups (list of NAS serial number), One with group relationship(device -&amp;gt; NAS serial number linkage).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;An authorization policy like below does not work. I can see in debug logs, the groups a device is in are fetched successfully.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="adityaprakashdash_1-1719944741441.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/222136i1169A9119E86075A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="adityaprakashdash_1-1719944741441.png" alt="adityaprakashdash_1-1719944741441.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Update:&lt;/P&gt;&lt;P&gt;This works only if I fetch the groups in the "&lt;SPAN&gt;ODBC Identity Source" and they are populated in the list of allowed values.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="adityaprakashdash_0-1719946837535.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/222138i598EA806010D4316/image-size/medium?v=v2&amp;amp;px=400" role="button" title="adityaprakashdash_0-1719946837535.png" alt="adityaprakashdash_0-1719946837535.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Can't ISE just take the value in the NAS-Identifier field and check if it is in the list of fetched groups during the actual authentication. (Because it does fetch the list of groups during the authentication attempt).&lt;UL&gt;&lt;LI&gt;Essentially for a group based check, can't ISE compare the value/text in the authorization policy against the list of group names fetched during authentication from the odbc. (Why does it also require list of all the valid/allowed group names predefined?)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;If the above is not possible, Is there a way to keep this allowed list up to date programmatically.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Any inputs appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 20:41:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-policy-based-on-groups-pulled-from-odbc/m-p/5139086#M590385</guid>
      <dc:creator>adityaprakashdash</dc:creator>
      <dc:date>2024-07-03T20:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization policy based on groups pulled from odbc</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-policy-based-on-groups-pulled-from-odbc/m-p/5139092#M590386</link>
      <description>&lt;P&gt;Updated the original question with the new data.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 20:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-policy-based-on-groups-pulled-from-odbc/m-p/5139092#M590386</guid>
      <dc:creator>adityaprakashdash</dc:creator>
      <dc:date>2024-07-03T20:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization policy based on groups pulled from odbc</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-policy-based-on-groups-pulled-from-odbc/m-p/5143804#M590579</link>
      <description>&lt;P&gt;Your methodology sounds correct. If the 'in' operator is not working, try 'contains' since the value returned may be treated as a string.&lt;/P&gt;
&lt;P&gt;Consider looking at any of the docs under &lt;A href="https://cs.co/ise-berg#odbc" target="_blank"&gt;https://cs.co/ise-berg#odbc &lt;/A&gt;for similar situations and solutions.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 20:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-policy-based-on-groups-pulled-from-odbc/m-p/5143804#M590579</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-07-11T20:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Authorization policy based on groups pulled from odbc</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-authorization-policy-based-on-groups-pulled-from-odbc/m-p/5144382#M590607</link>
      <description>&lt;P&gt;Thanks for the reply&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;In operator does work.(I updated the original question).&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But it works only if I fetch the groups in the "&lt;/SPAN&gt;&lt;SPAN&gt;ODBC Identity Source" and they are populated in the list of allowed values.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So, essentially there are two checks that is being done by the Authorization policy:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- if the name(In this case the NAS-Identifier) is in the list of fetched groups(A list of NAS-Identifiers).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- Second, if the name is in the list of valid group names or not.(The allowed list).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So, query now is:&lt;/P&gt;&lt;P&gt;- Isn't the first check itself sufficient?&lt;/P&gt;&lt;P&gt;- Is there a way to bypass the second check. (As that does not add value in this situation)&lt;/P&gt;&lt;P&gt;- If the second check has to happen, then what are the programmable ways to keep the allowed values up to date.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 21:34:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-authorization-policy-based-on-groups-pulled-from-odbc/m-p/5144382#M590607</guid>
      <dc:creator>adityaprakashdash</dc:creator>
      <dc:date>2024-07-12T21:34:45Z</dc:date>
    </item>
  </channel>
</rss>

