<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Attached is a successful user in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880432#M912397</link>
    <description>&lt;P&gt;Attached is a successful user authentication log. &amp;nbsp;Please let me know if this is not what you were looking for.&lt;/P&gt;</description>
    <pubDate>Tue, 07 Jun 2016 19:25:42 GMT</pubDate>
    <dc:creator>Christopher Horton</dc:creator>
    <dc:date>2016-06-07T19:25:42Z</dc:date>
    <item>
      <title>ISE Device Administration (ACS) enable passwords integrated with Active Directory</title>
      <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880426#M912390</link>
      <description>&lt;P&gt;I'm working on an ISE standalone implementation and running into an issue where the enable password for a device isn't pulling properly. &amp;nbsp;I have initial login tied back to AD and I have policy conditions/results/sets all working as they need to be. &amp;nbsp;My test switch is a 2960S. &amp;nbsp;I tried configuring "aaa authentication enable default group &amp;lt;ISE group&amp;gt; enable", but the only way I could do an enabled login with that was if the user was locally configured in&amp;nbsp;ISE Identity Management &amp;gt; Identities &amp;gt; Users. &amp;nbsp;Is there something I have missed that will tie enable passwords to an active directory group like I have working for&amp;nbsp;initial login?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:50:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880426#M912390</guid>
      <dc:creator>Christopher Horton</dc:creator>
      <dc:date>2020-02-21T13:50:06Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880427#M912392</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;are you provisionning privilege level on your authorization policy? Could you give an output please?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2016 22:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880427#M912392</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-06T22:55:41Z</dc:date>
    </item>
    <item>
      <title>Yes.  I was following one of</title>
      <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880428#M912393</link>
      <description>&lt;P&gt;Yes. &amp;nbsp;I was following one of the example documents and giving default and max privilege levels. &amp;nbsp;Let me know exactly what output you would like and I'll grab it for you.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2016 00:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880428#M912393</guid>
      <dc:creator>Christopher Horton</dc:creator>
      <dc:date>2016-06-07T00:22:30Z</dc:date>
    </item>
    <item>
      <title>The rules for devices</title>
      <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880429#M912394</link>
      <description>&lt;P&gt;The rules for devices authentication, the authorization policy and logs from ise.&lt;/P&gt;
&lt;P&gt;eventually, ios config for aaa&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2016 00:31:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880429#M912394</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-07T00:31:41Z</dc:date>
    </item>
    <item>
      <title>authentication policy</title>
      <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880430#M912395</link>
      <description>&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;authentication policy&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Default Rule only&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;authorization policy&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Full Network Access&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;If AD group = Super Admin Group&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;then permit all commands and shell profile&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Read-Only Access&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;If AD group = Read Only Group&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;then permit show commands and shell profile&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Default&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Deny all&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="line-height: normal;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: normal;"&gt;For the commands and profile:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;permit all commands&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;allows all CLI commands&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;permit show commands&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;allows only "show"&amp;nbsp;CLI commands&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;shell profile&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;default priv = 15&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;max priv = 15&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="line-height: normal;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: normal;"&gt;Current working aaa configs:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;aaa new-model&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;aaa group server tacacs+ ISE_ACS&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;aaa authentication login default local&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;aaa authentication login ACS_Secure group ISE_ACS local&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;aaa authentication enable default enable&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;aaa authorization config-commands&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;aaa authorization exec ACS_Secure group ISE_ACS local if-authenticated&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;aaa authorization commands 15 ACS_Secure group ISE_ACS local if-authenticated&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;aaa accounting exec default start-stop group ISE_ACS&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;aaa accounting network default start-stop group ISE_ACS&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;aaa session-id common&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="line-height: normal;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: normal;"&gt;The aaa authentication enable configuration is what I have been playing around with. &amp;nbsp;When I set that to get the enable login from ISE, that is when it looks for a local user account within the ISE system.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2016 17:19:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880430#M912395</guid>
      <dc:creator>Christopher Horton</dc:creator>
      <dc:date>2016-06-07T17:19:17Z</dc:date>
    </item>
    <item>
      <title>Could you add logs from</title>
      <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880431#M912396</link>
      <description>&lt;P&gt;Could you add logs from authenticated users?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2016 19:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880431#M912396</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-07T19:13:16Z</dc:date>
    </item>
    <item>
      <title>Attached is a successful user</title>
      <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880432#M912397</link>
      <description>&lt;P&gt;Attached is a successful user authentication log. &amp;nbsp;Please let me know if this is not what you were looking for.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2016 19:25:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880432#M912397</guid>
      <dc:creator>Christopher Horton</dc:creator>
      <dc:date>2016-06-07T19:25:42Z</dc:date>
    </item>
    <item>
      <title>I don't see the authorization</title>
      <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880433#M912398</link>
      <description>&lt;P&gt;I don't see the authorization profile that ISE is pushing on your word document.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you make another screenshot of logging please?&lt;/P&gt;
&lt;P&gt;I'm not able to access my lab. As soon as I'm getting access, I will try to send out some screenshots of configuration.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2016 20:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880433#M912398</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-07T20:28:30Z</dc:date>
    </item>
    <item>
      <title>I see just an error with your</title>
      <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880434#M912399</link>
      <description>&lt;P&gt;I see just an error with your aaa authentication enable default enable. You should specify the Tacacs group.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I don't have access right now to my lab with ISE.&lt;/P&gt;
&lt;P&gt;Here is my config for switches used with ACS.&lt;/P&gt;
&lt;P&gt;aaa authentication login TACACS-SRV group tacacs+ local&lt;BR /&gt;aaa authentication login Console local&lt;BR /&gt;aaa authentication dot1x default group radius&lt;BR /&gt;aaa authorization exec TACACS-SRV group tacacs+ local &lt;BR /&gt;aaa authorization commands 15 TACACS-SRV group tacacs+ local &lt;BR /&gt;aaa authorization network default group radius &lt;BR /&gt;aaa accounting exec TACACS-SRV start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 15 TACACS-SRV start-stop group tacacs+&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you give me all outputs maybe we can figure out why your ISE TACACS not working with AD. I don't see any reason except a misconfiguration or another issue.&lt;/P&gt;
&lt;P&gt;Just to go on enable mode, you don't need anymore the command&amp;nbsp;&lt;SPAN&gt;aaa authentication enable default enable. This enable mode is pushed to the user if he gets privilege 15. Your issue should be on profile or policy. With authorization log, we can see if ISE is pushing the policy or not and why?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2016 22:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880434#M912399</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-07T22:10:18Z</dc:date>
    </item>
    <item>
      <title>So I've been trying to</title>
      <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880435#M912401</link>
      <description>&lt;P&gt;So I've been trying to recreate the issue I had initially, but when I went back and added in "aaa authentication enable default group &amp;lt;ACS_Group&amp;gt; enable" it is working now. &amp;nbsp;I haven't been able to determine what was done differently between this attempt and my previous that was unsuccessful, but I do appreciate all the help!&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2016 14:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880435#M912401</guid>
      <dc:creator>Christopher Horton</dc:creator>
      <dc:date>2016-06-09T14:02:46Z</dc:date>
    </item>
    <item>
      <title>Cool. I'm happy that we</title>
      <link>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880436#M912402</link>
      <description>&lt;P&gt;Cool. I'm happy that we solved your issue.&lt;/P&gt;
&lt;P&gt;Have a good day&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2016 14:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-device-administration-acs-enable-passwords-integrated-with/m-p/2880436#M912402</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-09T14:06:43Z</dc:date>
    </item>
  </channel>
</rss>

