cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
822
Views
0
Helpful
2
Replies

Device authentication with Tacacs using RSA and AD

kondzio24
Level 1
Level 1

Both RSA and AD are setup as external identities. RSA is also using AD as identity store. So effectively all accounts are present in both ext. ID stores. What I’m trying is to set my policy so that when I use an account that ends “_a” it requires to use RSA 2/fa. All other accounts in that match specific security group just get in with read only.

 

Is there a way to match “_a” accounts to be authenticated against certain ext ID store, RSA in my case? I’ve tried with “contains” and “end with” in the policy but doesn’t seem to make a difference and it simply doesn’t want to match.

1 Accepted Solution

Accepted Solutions

hslai
Cisco Employee
Cisco Employee

Adding to what rubenvankomen suggested...

Below is an example of T+ policy sets similar to what you asked for and I tested working:

Two policy sets: One with TACACS.User endsWith 1 and the other is default.

Screen Shot 2019-07-01 at 9.01.22 PM.png

The Username ends with 1 Policy set uses MFA (e.g. DuoRADIUS)

Screen Shot 2019-07-01 at 9.03.43 PM.png

The default policy set uses AD to auth the users.

Screen Shot 2019-07-01 at 9.04.07 PM.png

 

 

 

View solution in original post

2 Replies 2

rubenvankomen
Level 1
Level 1
Hello,

As you described, you can match an attribute to a value in the authentication policy to make sure that certain users use a specific Identity Store or Identity Store Sequence. Can you please confirm that you are using the Device Administration Policy set (Work Centers > Device Administration > Device Admin Policy Sets) and not the Network Acces Policy set for TACACS+ Device Administration?

If you are using the correct Policy set, can you provide a screenshot of the condition?

hslai
Cisco Employee
Cisco Employee

Adding to what rubenvankomen suggested...

Below is an example of T+ policy sets similar to what you asked for and I tested working:

Two policy sets: One with TACACS.User endsWith 1 and the other is default.

Screen Shot 2019-07-01 at 9.01.22 PM.png

The Username ends with 1 Policy set uses MFA (e.g. DuoRADIUS)

Screen Shot 2019-07-01 at 9.03.43 PM.png

The default policy set uses AD to auth the users.

Screen Shot 2019-07-01 at 9.04.07 PM.png