cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5692
Views
1
Helpful
5
Replies

ISE TACACS with Smart Card integration

Abhishek Kumar
Cisco Employee
Cisco Employee

My customer have a ISE 2.2 deployment and have a test switch, what they are trying to do as you know is the continuous requests for TACACS+ access to the network from the various support and development teams.

They currently use smart cards in the PC’s as opposed to the need to type in AD credentials on a per authentication basis.

The unique identifier they have in AD which is consistent is the EMPLOYEE ID

The networks team have the ability to query AD but don’t own or control the infrastructure

They would like to know how to configure the policy set such that it cross references the "smartcard details" and the "employee ID" to authenticate the end user into a tacacs user group. Is that possible?

1 Accepted Solution

Accepted Solutions

Here is a community site that discusses all about 2FA, it includes the document from pragmasys for device administration.

https://communities.cisco.com/docs/DOC-71528

Though the document uses internal user for authorization, this could work with AD as well but needs to be tested.

There is a Cisco AV pair that needs to be created in the shell profile for ISE to get the CN, UPN from PKI for comparison. It is all in the doc.

Look under device administration. There is a dcloud training link as well.

-Krishnan

View solution in original post

5 Replies 5

Jason Kunst
Cisco Employee
Cisco Employee

Researching this

Here is a community site that discusses all about 2FA, it includes the document from pragmasys for device administration.

https://communities.cisco.com/docs/DOC-71528

Though the document uses internal user for authorization, this could work with AD as well but needs to be tested.

There is a Cisco AV pair that needs to be created in the shell profile for ISE to get the CN, UPN from PKI for comparison. It is all in the doc.

Look under device administration. There is a dcloud training link as well.

-Krishnan

Jason Kunst
Cisco Employee
Cisco Employee

Also look at this link, Pragma 2-factor SSH for Cisco & Federal Agencies

http://www.pragmasys.com/support-cisco-2-factor

Abhishek Kumar
Cisco Employee
Cisco Employee

I had a follow-up call with the customer just now and here is the screen shot of what they’re trying to do.

Under the Authentication policy they want to add an attribute pulled out from the AD that has a unique attribute “employee ID”.

Firstly, is it possible to pull in that unique attribute and add that in the authentication policy? I’m sure we could but just not able to find how.

As I had specified in my query above that these users use smart card logins in the PC as a first step and then they get to interrogate AD when they get required privileges.

I understand from your response to the above that " You cannot gather AD group before it is authenticated, so authentication does not support these. Only authorization supports this"

Just to be clear on your response, we can achieve this use-case and it is just that the required AD attribute can be used in the authorization policy but not in the authentication policy as the user needs to be authenticated first before those AD attributes can be used to have shell access, correct?

So, the authorization policy as under could have an AND condition like “employee id=xxx” then permitAllCommands?

Can you confirm please?

Thank you for posting the follow-up conversation in community site.

Authentication of user using Smart card is done using authentication policy.

If you want to authorize them based on AD attribute, then you need to do it in authorization policy mapping to a Shell profile/command sets.

-Krishnan