01-15-2022 08:36 PM
Hi,
While configuring TACACS+ Authentication on ISE, I see there are two options in the conditions: (See attached screenshot)
TACACS: Service EQUALS login
TACACS: Service EQUALS enable
What does this mean?
My understanding is that we can use different identity stores for login authentication and enable mode authentication. But what would be the use case for this?
This screenshot is from Cisco SISE course, but does not give any explanation on how this feature is used.
Would appreciate any thoughts on this.
Thanks and Regards,
Mohan
Solved! Go to Solution.
01-21-2022 04:45 PM
RADIUS and TACACS are standard protocols so you can find the respective protocol behavior and attribute definitions in RFCs like RFC-8907 The Terminal Access Controller Access-Control System Plus (TACACS+) Protocol which says
authen_service This is the service that is requesting the authentication. Valid values are: TAC_PLUS_AUTHEN_SVC_NONE := 0x00 TAC_PLUS_AUTHEN_SVC_LOGIN := 0x01 TAC_PLUS_AUTHEN_SVC_ENABLE := 0x02 TAC_PLUS_AUTHEN_SVC_PPP := 0x03 TAC_PLUS_AUTHEN_SVC_PT := 0x05 TAC_PLUS_AUTHEN_SVC_RCMD := 0x06 TAC_PLUS_AUTHEN_SVC_X25 := 0x07 TAC_PLUS_AUTHEN_SVC_NASI := 0x08 TAC_PLUS_AUTHEN_SVC_FWPROXY := 0x09 ... The TAC_PLUS_AUTHEN_SVC_LOGIN option indicates regular login (as opposed to ENABLE) to a client device. The TAC_PLUS_AUTHEN_SVC_ENABLE option identifies the ENABLE authen_service, which refers to a service requesting authentication in order to grant the user different privileges. This is comparable to the Unix "su(1)" command, which substitutes the current user's identity with another. An authen_service value of NONE is only to be used when none of the other authen_service values are appropriate. ENABLE may be requested independently; no requirements for previous authentications or authorizations are imposed by the protocol.
You will see that these Service options match what is in the ISE Device Admin Policy Set Authorization Rule attributes one-for-one :
So to answer your question, it's basically the CLI privilege level being requested: > or #
01-16-2022 02:00 AM
The below video give you some example :
01-21-2022 04:45 PM
RADIUS and TACACS are standard protocols so you can find the respective protocol behavior and attribute definitions in RFCs like RFC-8907 The Terminal Access Controller Access-Control System Plus (TACACS+) Protocol which says
authen_service This is the service that is requesting the authentication. Valid values are: TAC_PLUS_AUTHEN_SVC_NONE := 0x00 TAC_PLUS_AUTHEN_SVC_LOGIN := 0x01 TAC_PLUS_AUTHEN_SVC_ENABLE := 0x02 TAC_PLUS_AUTHEN_SVC_PPP := 0x03 TAC_PLUS_AUTHEN_SVC_PT := 0x05 TAC_PLUS_AUTHEN_SVC_RCMD := 0x06 TAC_PLUS_AUTHEN_SVC_X25 := 0x07 TAC_PLUS_AUTHEN_SVC_NASI := 0x08 TAC_PLUS_AUTHEN_SVC_FWPROXY := 0x09 ... The TAC_PLUS_AUTHEN_SVC_LOGIN option indicates regular login (as opposed to ENABLE) to a client device. The TAC_PLUS_AUTHEN_SVC_ENABLE option identifies the ENABLE authen_service, which refers to a service requesting authentication in order to grant the user different privileges. This is comparable to the Unix "su(1)" command, which substitutes the current user's identity with another. An authen_service value of NONE is only to be used when none of the other authen_service values are appropriate. ENABLE may be requested independently; no requirements for previous authentications or authorizations are imposed by the protocol.
You will see that these Service options match what is in the ISE Device Admin Policy Set Authorization Rule attributes one-for-one :
So to answer your question, it's basically the CLI privilege level being requested: > or #
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide