cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
842
Views
0
Helpful
3
Replies

ISE 2.4 Authentication - Identity Groups unavailable

ssschunk1
Level 1
Level 1

It was pointed out that our default policy set was not configured for best practice.  We had been pointing the default authentication to our RSA service.  In an attempt to change the default to deny access, I had to come up with a limiting method to prevent unnecessary/unacceptable request from being passed to the RSA service.  I thought I would use an AD group as a userid cache to qualify what userids would be sent onto the RSA service.  In addition, I am focused in the device admin section and the authentication I am handling is a tacacs communication.  As I dug into it I quickly discovered I could not manually define an AD group criteria nor could I use the previously created AD identity groups that I use in the authorization policy sets.  In fact, no identity groups are available when clicking on that icon in the authentication set.  My sad work around is this:  because we have standardized user account name, I took the tacacs username and qualified based on matching beginning characters of the usernames... While this works, that set is far greater than the userids I want to forward to our RSA service.  Is this limitation engineered by design?  Am I looking at Authentication in the wrong way? 

1 Accepted Solution

Accepted Solutions

hslai
Cisco Employee
Cisco Employee

You are correct on this. This is by the current design of ISE that ID groups available during authorization only but not during authentication.

View solution in original post

3 Replies 3

Damien Miller
VIP Alumni
VIP Alumni

It sounds like you might be missing a step, but my bad if I misunderstood the issue. In order to have AD groups available for use within ISE policy sets, or admin access areas, you need to "add" them to ISE.
1. navigate to https://<ISE_IP>/admin/#administration/administration_identitymanagement/administration_identitymanagement_external
2. Click on your AD connector
3. In the middle of the page you will have a "groups" tab, click it.
4. Search and add AD groups you would like to leverage within ISE. 

 

At this point you will have them available when you are creating radius/tacacs rules. 

ad.png

hslai
Cisco Employee
Cisco Employee

You are correct on this. This is by the current design of ISE that ID groups available during authorization only but not during authentication.

Thanks. Not really the answer I wanted and it really limits my authentication options. Any insight on this becoming a future feature add?