02-19-2019 08:15 PM
Hello, we are in the process of setting up ISE 2.4 for a demo in our lab. I am trying to replicate our rules for network device access (device administration) that we use on ACS on our ISE demo. The organization I work for requires that we use a different enable password than our login password. We are required to use AD for our device login. On ACS we achieve this by creating our AD user and updating ACS with our enable login and then tell it to check all identity stores. However I am having difficulty configuring this on ISE. It seems when I create a user on ISE and set it to use an external source for authentication it grays out the enable password box. On ACS we are able to enter in an enable password. On the network devices we purposefully removed any if-authenticated commands so you must use an seperate enable password. Everything works great with an internal user but this doesn't fit our security requirements. I have spent some time reviewing the guides and I came across this line in the Administrator guide:
The device sends a special enable authentication type when the device administrator attempts to enter the privileged mode. Cisco ISE supports a separate enable password to validate this special enable authentication type. The separate enable password is used when the device administrator is authenticated with internal identity stores. For authentication with external identity stores, the same password is used as for regular login.
By reading that paragraph it sounds as though using a separate enable password and an external identity for authentication is possible. It sounds like it only supports internal users. I'm sure I'm missing something. Any help is truly appreciated. Thanks!
Solved! Go to Solution.
02-20-2019 07:18 PM
03-13-2019 03:49 PM
A contractor on our team figured it out, this is how it is done:
To get ISE to authenticate username/password against AD but use the local ISE user for the Enable password, I had to create two Authentication rules. The rule that authenticates the user against AD has the condition of ’TACACS Service Type EQUALS login”. The other rule which utilizes the local user identity store for the Enable password has the condition of “TACACS Service Type EQUALS enable”. The only catch is, and I think it’s the same when use ACS, is the username in ISE has to match the username in AD
02-19-2019 08:54 PM
02-20-2019 06:38 AM
Yes we would like a different enable password for each user. The workflow right now requires us to go into ACS and update our enable password. Each engineer updates their own enable password, so each each engineer has an unique device login (via AD) and a unique enable login via ACS. I hope that clears it up a little bit. Thanks!
02-20-2019 07:18 PM
02-21-2019 01:07 PM
Thank you Francesco. I appreciate the input. I had a meeting today with our Cisco Sales team and their architect pretty much said the same thing. I may still trying opening a TAC case just to absolutely verify, but from the sounds of it I may have to go with MFA. Thank you!
02-22-2019 06:24 PM
03-13-2019 03:49 PM
A contractor on our team figured it out, this is how it is done:
To get ISE to authenticate username/password against AD but use the local ISE user for the Enable password, I had to create two Authentication rules. The rule that authenticates the user against AD has the condition of ’TACACS Service Type EQUALS login”. The other rule which utilizes the local user identity store for the Enable password has the condition of “TACACS Service Type EQUALS enable”. The only catch is, and I think it’s the same when use ACS, is the username in ISE has to match the username in AD
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide