04-22-2022 04:28 AM
Good day! My question is how to use AD users to access network devices using ISE TACACS settings. I have configuration with internal users and it works just fine. On ISE deployment I've created an internal user, included the user in to the user group for network admins. Created the Tacacs command sets - IOS_Full_Commands, Tacacs Profiles - Network_Admins. My Device Admin Policy set looks like: TACACS User IN Network Access UserName, allowed protocol is Default Device Admin. My Authentication Policy rule looks like: Default Internal Users. My Authorization Policy rule looks like: InternalUser IdentityGroup EQUALS User Identity Groups:Network_Admins, command set IOS_Full_Commands, shell profile Network_Admins. Also I've added into the Network Devices my c2960, enabled the TACACS and entered the shared secret for TACACS. What should I change to make it work with AD users? Thanks in advance!
Solved! Go to Solution.
04-24-2022 02:49 AM
04-22-2022 05:03 AM
First thing, if you didn´t yet, is join the ISE to AD.
Administration > Identity Management > External Identity Sources > Active Directory.
04-23-2022 10:28 AM
Thank you for an advice.
I joined AD.
Do I have to create Identity Users?
If I create a user with exact name from an AD group and select "Password" for this user from AD then it works and server checks the user password in AD. But I think I miss something.
Is there another way to point out users from AD group for TACACS in ISE?
04-23-2022 10:40 AM
Did you retrieved the groups from AD?
Which ISE version are you?
This guide might help for 2.0 version.
04-23-2022 09:58 PM
Yes, I did retrieved the groups from AD. We have ISE 3.0.
04-24-2022 02:49 AM
04-25-2022 01:05 AM - edited 04-25-2022 01:06 AM
Thank you! It did worked for me!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide