<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD users failing to authenticate on Cisco ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5157457#M591133</link>
    <description>&lt;P&gt;If you have integrated ISE with AD via a Join Point, there would have to be machine accounts created in AD for the ISE nodes.&lt;/P&gt;
&lt;P&gt;Have you tried removing the condition related to 'InternalUser'. I don't understand why that is there if you are authorizing an external user against Active Directory. What are you trying to match with that condition?&lt;/P&gt;</description>
    <pubDate>Wed, 07 Aug 2024 23:07:46 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2024-08-07T23:07:46Z</dc:date>
    <item>
      <title>AD users failing to authenticate on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5156373#M591087</link>
      <description>&lt;DIV&gt;Hi all,&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Recently I've been facing an issue in my environment whereby accounts from Active Directory fail to authenticate on Cisco switches. Logs in Cisco ISE (TACACS &amp;gt; Live logs) show that selected shell profile is "Deny Access". However, according to my policy set configuration, I feel it should be going to a different shell profile ("Cisco Read Write").&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;TACACS live logs also show that the user is found in our AD so I'm unsure why the authentication is failing. Any help in resolving this issue and enabling AD logins on network devices would be appreciated. I have attached pictures of my device admin policy set and TACACS live logs for clarity.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Cheers&lt;/DIV&gt;</description>
      <pubDate>Tue, 06 Aug 2024 09:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5156373#M591087</guid>
      <dc:creator>cfak211</dc:creator>
      <dc:date>2024-08-06T09:50:40Z</dc:date>
    </item>
    <item>
      <title>Re: AD users failing to authenticate on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5156393#M591090</link>
      <description>&lt;P&gt;Check depoly and license&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Admin&amp;gt;system &amp;gt;deployment&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Enable device admin service&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-admin &amp;gt; system &amp;gt; licensing&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Device admin&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2024 10:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5156393#M591090</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-06T10:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: AD users failing to authenticate on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5156516#M591097</link>
      <description>&lt;P&gt;Not enough information here to help unfortunately.&amp;nbsp; But something is not matching your configured authorization rules.&amp;nbsp; Your AD authentication is successful.&amp;nbsp; My guess is the AD Group is not matching.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2024 15:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5156516#M591097</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-08-06T15:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: AD users failing to authenticate on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5156669#M591108</link>
      <description>&lt;P&gt;To follow on to&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;'s comment, you might need to check the permissions on the ISE machine account in AD to ensure you have the necessary permissions as &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/ise_active_directory_integration/b_ISE_AD_integration_2x.html#reference_F19556CAD5C949B58DF89334E2C6255D" target="_blank" rel="noopener"&gt;per this table&lt;/A&gt;... especially the 'Read tokenGroups'&amp;nbsp;permission as that is required for group membership lookups.&lt;/P&gt;
&lt;P&gt;You can also use the &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/ise_active_directory_integration/b_ISE_AD_integration_2x.html#task_8E095069A94148B487E673B07376E014" target="_blank" rel="noopener"&gt;Test Users&lt;/A&gt; tool in ISE to confirm it sees the expected group memberships for the User account.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2024 22:22:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5156669#M591108</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-08-06T22:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: AD users failing to authenticate on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5156723#M591110</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Just checked, both Device admin service and Device admin license are active.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;I've tried the "Test user" tool and it's returning "Success" on the Authentication result, the group this particular account is a member of on the AD is showing up as well in the "Groups" tab.&lt;/P&gt;&lt;P&gt;I'm not aware of any ISE machine account in our AD however, is this something that will need to be configured on both the ISE and AD?&lt;/P&gt;&lt;P&gt;Thanks all for the responses.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2024 02:32:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5156723#M591110</guid>
      <dc:creator>cfak211</dc:creator>
      <dc:date>2024-08-07T02:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: AD users failing to authenticate on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5157457#M591133</link>
      <description>&lt;P&gt;If you have integrated ISE with AD via a Join Point, there would have to be machine accounts created in AD for the ISE nodes.&lt;/P&gt;
&lt;P&gt;Have you tried removing the condition related to 'InternalUser'. I don't understand why that is there if you are authorizing an external user against Active Directory. What are you trying to match with that condition?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2024 23:07:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5157457#M591133</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-08-07T23:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: AD users failing to authenticate on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5157485#M591136</link>
      <description>&lt;P&gt;That condition is actually there to enable logins to network devices from an internal account on ISE if connection to the AD fails.&lt;/P&gt;&lt;P&gt;Actually the problem is currently resolved, I just deleted the policy and added the conditions one by one. Now both AD accounts and the internal account are able to authenticate successfully.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2024 01:16:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-users-failing-to-authenticate-on-cisco-ise/m-p/5157485#M591136</guid>
      <dc:creator>cfak211</dc:creator>
      <dc:date>2024-08-08T01:16:49Z</dc:date>
    </item>
  </channel>
</rss>

