I know this has been asked in a few different ways but I need to clarify the user experience under the following configuration
My ASA uses ACS4.2 as a radius server and it also provides downloaded ACLs depending on the users group within LDAP
Our Security department would like to implement two factor using RSA. The desired result would be to maintain the functionality of ACS and the Downloadable ACLs but use RSA secureID as another authentication source.
What I am unclear of is what the user experience would be. If I was to setup Secureid / RSA server as an external Database within ACS and ASA using ACS as the Radius server. When the client views the anyconnect window will they put LDAP username and password in click connect and then wait for some other challenge?
They would only get the RSA prompt for token, on ACS 4.2 you can use RSA with an LDAP group mapping to achieve RSA authentication but still pass the desired DAL based on their LDAP mapping. The username in RSA would have to be the same as the username in LDAP for this to work.
Enable full visibilityCreating first policy setUnderstanding ISE Live Log status
These are few tips that will help you with your first deployment of ISE. For advanced tips, please visit: https://community.cisco.com/t5/security-documents/advanced-i...
This guide helps in troubleshooting the IBM QRadar pxGrid App. It is assumed that the ISE pxGrid App has already been installed in QRadar. The official IBM QRadar pxGrid App How-to Guide can be downloaded from: https://exchange.xforce.ibmcloud.com/...
Join us live on Tuesday, July 16 at 10 am PT to learn how integration and automation are the key to successful security designs. We’ll answer questions about Threat Response and also do a quick demo of our browser plugin and our latest integration wi...
Hello and welcome to the repository for the Monthly Webinar Series put together by our Desert Plains Operation Security Architecture team.
Our sessions are NOT recorded -- however you'll find historical slide decks attached as well as futu...
In June we have had new additions to our growing list of Machine-Learning-powered Confirmed Threat detections provided by the Cognitive Intelligence engine. Thanks to the improvement made to our Machine Learning backend (see Machine Learning Backend Impro...