- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-11-2018 05:31 AM
Hi Experts,
Customer has a requirement, can we do it with ISE?
User A is one of AD user, User A connect Anyconnect VPN and authenticated by ISE with AD identity source. After authentication, ISE assign VPN group policy to ASA. Custome would ISE have a user list, only user in the list can have higher VPN network privilege because the AD dont have any attribute for reference.
I know ISE could define condition with user=A or user=B or user=C, but is there any better way to do it?
Thanks
DL
Solved! Go to Solution.
- Labels:
-
Identity Services Engine (ISE)
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-11-2018 06:31 AM
Configure a user identity group on the ISE.
Configure the users which are highly privileged on the ISE and while configuring them, choose the password store as Active Directory instead of configuring the passwords locally on the ISE for those users.
Configure an authorization policy with the ISE internal user group condition to assign the required group policy.
In the authentication policy, make sure that internal identity store is looked at first and then the AD join points (create a new identity source sequence if required).
I haven’t personally tried this but logically speaking, this should work.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-11-2018 05:54 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-11-2018 06:10 AM
Customer is network administration team, they cannot get AD team support to do it. So ask us this question, it's presale question.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-11-2018 06:31 AM
Configure a user identity group on the ISE.
Configure the users which are highly privileged on the ISE and while configuring them, choose the password store as Active Directory instead of configuring the passwords locally on the ISE for those users.
Configure an authorization policy with the ISE internal user group condition to assign the required group policy.
In the authentication policy, make sure that internal identity store is looked at first and then the AD join points (create a new identity source sequence if required).
I haven’t personally tried this but logically speaking, this should work.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-11-2018 09:45 PM
thank you, let me have a try.
