<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS Identity Groups Configuration Question in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-identity-groups-configuration-question/m-p/2553716#M89638</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm&amp;nbsp;configuring&amp;nbsp;a new ACS5.4 appliance from scratch.&amp;nbsp;My previous&amp;nbsp;ACS was a&amp;nbsp;3.3 Windows system so we decided to redesign the configuration.&amp;nbsp; You can imagine that the new ACS is very different to me.&lt;/P&gt;&lt;P&gt;My question is&amp;nbsp;what is&amp;nbsp;the best approach to setting up Identity Groups and Access Groups for TACACS authentication/authorization for our network devices.&amp;nbsp; I'll be using Activey Directory as my external ID Store.&lt;/P&gt;&lt;P&gt;Here's my criteria:&lt;/P&gt;&lt;P&gt;- I need to have Full Access Admins and Read Only Admins for remote site support staff.&lt;/P&gt;&lt;P&gt;- These Admins are granted access to 3 different network layers either with Full Access or Read Only access.&lt;/P&gt;&lt;P&gt;- Our external AD groups are set up to match Full Access or Read Only for each network layer.&lt;/P&gt;&lt;P&gt;Here's an example of how the are , and Full Access Here is how our Network Access&amp;nbsp;groups in AD&amp;nbsp;are set up:&lt;/P&gt;&lt;P&gt;Access Groups:&lt;BR /&gt;Full Contol Admins&lt;BR /&gt;Read Only Admins&lt;/P&gt;&lt;P&gt;Network Layers Per Site:&lt;BR /&gt;Site1-Core&lt;BR /&gt;Site1-Distro&lt;BR /&gt;Site1-Access&lt;BR /&gt;------------&lt;BR /&gt;Site2-Core&lt;BR /&gt;Site2-Distro&lt;BR /&gt;Site2-Access&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;AD Groups Per Site:&lt;BR /&gt;Site1-Core-Full Control&lt;BR /&gt;Site1-Core-Read Only&lt;/P&gt;&lt;P&gt;Site1-Distro-Full Control&lt;BR /&gt;Site1-Distro-Read Only&lt;/P&gt;&lt;P&gt;Site1-Access-Full Control&lt;BR /&gt;Site1-Access-Read Only&lt;BR /&gt;-----------------------&lt;BR /&gt;Site2-Core-Full Control&lt;BR /&gt;Site2-Core-Read Only&lt;/P&gt;&lt;P&gt;Site2-Distro-Full Control&lt;BR /&gt;Site2-Distro-Read Only&lt;/P&gt;&lt;P&gt;Site2-Access-Full Control&lt;BR /&gt;Site2-Access-Read Only&lt;/P&gt;&lt;P&gt;From what I've read in the ACS 5.4 configuration documents, it seems more efficient to&amp;nbsp;create Identity Groups specific to the Access types (Full Control or RO) instead of creating a whole bunch of Access Groups.&amp;nbsp; But at this point I'm bit uncertain about what approach I should take.&amp;nbsp; Any advise is greatly appreciated!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ray&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 04:50:48 GMT</pubDate>
    <dc:creator>rkallas</dc:creator>
    <dc:date>2019-03-11T04:50:48Z</dc:date>
    <item>
      <title>ACS Identity Groups Configuration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-identity-groups-configuration-question/m-p/2553716#M89638</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm&amp;nbsp;configuring&amp;nbsp;a new ACS5.4 appliance from scratch.&amp;nbsp;My previous&amp;nbsp;ACS was a&amp;nbsp;3.3 Windows system so we decided to redesign the configuration.&amp;nbsp; You can imagine that the new ACS is very different to me.&lt;/P&gt;&lt;P&gt;My question is&amp;nbsp;what is&amp;nbsp;the best approach to setting up Identity Groups and Access Groups for TACACS authentication/authorization for our network devices.&amp;nbsp; I'll be using Activey Directory as my external ID Store.&lt;/P&gt;&lt;P&gt;Here's my criteria:&lt;/P&gt;&lt;P&gt;- I need to have Full Access Admins and Read Only Admins for remote site support staff.&lt;/P&gt;&lt;P&gt;- These Admins are granted access to 3 different network layers either with Full Access or Read Only access.&lt;/P&gt;&lt;P&gt;- Our external AD groups are set up to match Full Access or Read Only for each network layer.&lt;/P&gt;&lt;P&gt;Here's an example of how the are , and Full Access Here is how our Network Access&amp;nbsp;groups in AD&amp;nbsp;are set up:&lt;/P&gt;&lt;P&gt;Access Groups:&lt;BR /&gt;Full Contol Admins&lt;BR /&gt;Read Only Admins&lt;/P&gt;&lt;P&gt;Network Layers Per Site:&lt;BR /&gt;Site1-Core&lt;BR /&gt;Site1-Distro&lt;BR /&gt;Site1-Access&lt;BR /&gt;------------&lt;BR /&gt;Site2-Core&lt;BR /&gt;Site2-Distro&lt;BR /&gt;Site2-Access&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;AD Groups Per Site:&lt;BR /&gt;Site1-Core-Full Control&lt;BR /&gt;Site1-Core-Read Only&lt;/P&gt;&lt;P&gt;Site1-Distro-Full Control&lt;BR /&gt;Site1-Distro-Read Only&lt;/P&gt;&lt;P&gt;Site1-Access-Full Control&lt;BR /&gt;Site1-Access-Read Only&lt;BR /&gt;-----------------------&lt;BR /&gt;Site2-Core-Full Control&lt;BR /&gt;Site2-Core-Read Only&lt;/P&gt;&lt;P&gt;Site2-Distro-Full Control&lt;BR /&gt;Site2-Distro-Read Only&lt;/P&gt;&lt;P&gt;Site2-Access-Full Control&lt;BR /&gt;Site2-Access-Read Only&lt;/P&gt;&lt;P&gt;From what I've read in the ACS 5.4 configuration documents, it seems more efficient to&amp;nbsp;create Identity Groups specific to the Access types (Full Control or RO) instead of creating a whole bunch of Access Groups.&amp;nbsp; But at this point I'm bit uncertain about what approach I should take.&amp;nbsp; Any advise is greatly appreciated!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ray&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:50:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-identity-groups-configuration-question/m-p/2553716#M89638</guid>
      <dc:creator>rkallas</dc:creator>
      <dc:date>2019-03-11T04:50:48Z</dc:date>
    </item>
    <item>
      <title>Ray,Try to make this as</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-identity-groups-configuration-question/m-p/2553717#M89639</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Ray,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Try to make this as simple as possible.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;If you are using AD, forget the local identity groups, it will just complicate the setup.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;I think you already have AD groups, so great.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;When you define the devices on the ACS, use a new NDG for site and name them:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Site1-Core&lt;BR style="font-size: 14px;" /&gt;Site1-Distro&lt;BR style="font-size: 14px;" /&gt;Site1-Access&lt;BR style="font-size: 14px;" /&gt;------------&lt;BR style="font-size: 14px;" /&gt;Site2-Core&lt;BR style="font-size: 14px;" /&gt;Site2-Distro&lt;BR style="font-size: 14px;" /&gt;Site2-Access&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Make each device part of the respective NDG.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;In the Identity section of the access service on the ACS, point it to AD directly.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;In the Authorization use the concept:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;"If AD group is X and site is A" then "Full acces/ read only"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;I know you are new to ACS 5 so if you have any questions, feel free to contact me.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Rate if Useful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Sharing knowledge makes you Immortal.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Regards,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Ed&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 19:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-identity-groups-configuration-question/m-p/2553717#M89639</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-07-03T19:33:43Z</dc:date>
    </item>
    <item>
      <title>Thanks Ed!I think you've</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-identity-groups-configuration-question/m-p/2553718#M89640</link>
      <description>&lt;P&gt;Thanks Ed!&lt;/P&gt;&lt;P&gt;I think you've confirmed what I was thinking; Identity groups in this case were just complicating the configuration.&lt;/P&gt;&lt;P&gt;I'm going to give this a try and let you know how it works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ray&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2014 18:25:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-identity-groups-configuration-question/m-p/2553718#M89640</guid>
      <dc:creator>rkallas</dc:creator>
      <dc:date>2014-07-08T18:25:24Z</dc:date>
    </item>
    <item>
      <title>Hi Ed,To recap your steps:1.</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-identity-groups-configuration-question/m-p/2553719#M89641</link>
      <description>&lt;P&gt;Hi Ed,&lt;/P&gt;&lt;P&gt;To recap your steps:&lt;/P&gt;&lt;P&gt;1. I already have AD groups&lt;/P&gt;&lt;P&gt;2. I defined the devices on the ACS, and have new NDGs by sites:&lt;/P&gt;&lt;P&gt;Site1-Core&lt;BR /&gt;Site1-Distro&lt;BR /&gt;Site1-Access&lt;/P&gt;&lt;P&gt;3. Each device part of the respective NDG (Router, Switch, FW, etc.)&lt;/P&gt;&lt;P&gt;4. In the Access Service section I have :&lt;/P&gt;&lt;P&gt;Access Policies/Access Services/TACACS Device Admin/Identity:&lt;BR /&gt;Rule-1 NDG device type=All / NDG Locations = All / Identity Source = AD1&lt;/P&gt;&lt;P&gt;5. In the Authorization section, I tried to set up as you suggested "If AD group is X and site is A" then "Full acces/ read only"&lt;BR /&gt;For Authorization though, I get choices for Identity Group, NDG:Location, NDG: Device Type, &amp;amp; Device Filter&amp;nbsp; and the Results Shell Profile.&amp;nbsp; There doesn't seem to be a selection that I can pick an AD Group from.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I in the wrong section for this?&amp;nbsp; Or have I missed a step earlier on in the process?&lt;/P&gt;&lt;P&gt;Any advice is greatly appreciated!&lt;/P&gt;&lt;P&gt;Ray&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 23:05:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-identity-groups-configuration-question/m-p/2553719#M89641</guid>
      <dc:creator>rkallas</dc:creator>
      <dc:date>2014-07-11T23:05:23Z</dc:date>
    </item>
  </channel>
</rss>

