<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Store User Password During TACACS+ with LDAP? Encryption Detai in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-store-user-password-during-tacacs-with-ldap-encryption/m-p/5300951#M596854</link>
    <description>&lt;P&gt;I think that only an ISE Developer can tell you this kind of detail.&lt;/P&gt;
&lt;P&gt;Not sure if you mean the LDAP password to BIND to the directory, or the user password that is compared against an object in the LDAP directory? When you configure the LDAP external identity source in ISE, you must enter the bind credentials in clear text - there is no way around that. What the app does with that string is hopefully to encrypt it, and then store it somewhere in the Oracle Database (most likely) which is where a lot of the ISE config lives.&lt;/P&gt;
&lt;P&gt;As for the end client user password - that should most certainly NOT be stored on the disk (or logged in clear text) - I think only the ISE developers would tell you how that data flows through ISE. You'd hope they would take extra care with sensitive data, and free/cleanse the memory structures after the function has completed.&lt;/P&gt;</description>
    <pubDate>Fri, 20 Jun 2025 01:02:29 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2025-06-20T01:02:29Z</dc:date>
    <item>
      <title>ISE Store User Password During TACACS+ with LDAP? Encryption Details</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-store-user-password-during-tacacs-with-ldap-encryption/m-p/5300385#M596816</link>
      <description>&lt;P data-start="245" data-end="391"&gt;I have question about how Cisco ISE handles user passwords during &lt;STRONG data-start="314" data-end="390"&gt;TACACS+ authentication when LDAP is used as the external identity source&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P data-start="393" data-end="572"&gt;From what I understand, ISE forwards the user credentials to the LDAP server for authentication — but does it &lt;STRONG data-start="503" data-end="533"&gt;store the password locally&lt;/STRONG&gt; on the ISE server during that process?&lt;/P&gt;
&lt;UL data-start="574" data-end="916"&gt;
&lt;LI data-start="574" data-end="660"&gt;
&lt;P data-start="576" data-end="660"&gt;Is the password just held &lt;STRONG data-start="602" data-end="624"&gt;temporarily in RAM&lt;/STRONG&gt;, or is it written anywhere to disk?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="661" data-end="781"&gt;
&lt;P data-start="663" data-end="781"&gt;If it's stored in memory, does anyone know what kind of &lt;STRONG data-start="719" data-end="747"&gt;encryption or protection&lt;/STRONG&gt; (e.g., SHA-256 or other) is used?&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Thanks in advance.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 13:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-store-user-password-during-tacacs-with-ldap-encryption/m-p/5300385#M596816</guid>
      <dc:creator>ISENAC1122</dc:creator>
      <dc:date>2025-06-18T13:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Store User Password During TACACS+ with LDAP? Encryption Detai</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-store-user-password-during-tacacs-with-ldap-encryption/m-p/5300691#M596834</link>
      <description>&lt;P&gt;Those are good questions and I don't know definite answers to them. However, I don't believe ISE stores the passwords locally on the disk for those users that are authenticated against an external identity source. Instead, ISE stores locally the users' credentials of its local users and it does protect them with hashing and encryption.&lt;/P&gt;
&lt;P&gt;In your case we have two parts of transmitting the credentials, once between the network device and ISE and that will be over TACACS protocol which encrypts the payload, and then we have a transmission that would happen between ISE and the AD over LDAP. LDAP by default doesn't encrypt the payload which means those credentials will be passing in clear text over the wire.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;, or&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;might add more comments on this.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jun 2025 09:13:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-store-user-password-during-tacacs-with-ldap-encryption/m-p/5300691#M596834</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-06-19T09:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Store User Password During TACACS+ with LDAP? Encryption Detai</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-store-user-password-during-tacacs-with-ldap-encryption/m-p/5300951#M596854</link>
      <description>&lt;P&gt;I think that only an ISE Developer can tell you this kind of detail.&lt;/P&gt;
&lt;P&gt;Not sure if you mean the LDAP password to BIND to the directory, or the user password that is compared against an object in the LDAP directory? When you configure the LDAP external identity source in ISE, you must enter the bind credentials in clear text - there is no way around that. What the app does with that string is hopefully to encrypt it, and then store it somewhere in the Oracle Database (most likely) which is where a lot of the ISE config lives.&lt;/P&gt;
&lt;P&gt;As for the end client user password - that should most certainly NOT be stored on the disk (or logged in clear text) - I think only the ISE developers would tell you how that data flows through ISE. You'd hope they would take extra care with sensitive data, and free/cleanse the memory structures after the function has completed.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2025 01:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-store-user-password-during-tacacs-with-ldap-encryption/m-p/5300951#M596854</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-06-20T01:02:29Z</dc:date>
    </item>
  </channel>
</rss>

