Cisco ISE and Active Directory Integration

Cisco ISE and Active Directory Integration

Cisco ISE + Active Directory

The integration between these tools is one of the most important steps for ISE functionality. It does not mean that without ISE and AD integration, Cisco ISE will not work. You could use using only the internal users' database, but this is not scalable. Usually, in a network environment, there is some type of user access control, in this case, we are working with Microsoft AD.

When both tools are integrated, the network administration and the network access control can be easily managed by the network's administrators. It makes it possible to use the same user credential to login into the workstation, authenticate the user into the wired or wireless corporative network, and also access the network devices by SSH or telnet session.

Beyond the connectivity in the internal network, it also brings the possibility for the user to use its credentials to login into the client VPN. If you keep listing, you will figure out a variety of resources integrating these tools. We will keep focused on network administration and network access.

To start the integration go to Administration > Identity Management > External Identity Source > Activity Directory and press Add.

No alt text provided for this image

Insert information of the AD, as per below.

No alt text provided for this image

Join Point Name, is like a description, does not exist a rule for this. Different than Active Diretory Domain, that has the need to include the Domain Name. I usually to use the same for both. Press Submit.

After this will pop up a message Would you like to Join all ISE Nodes to this Active Directory Domain? Click Yes.

After this, will appear a window to fill up an AD Username and Password. This user does not need to be an user with administrative privileges. In our case, will be used administrator that is the only account created until now.

No alt text provided for this image

After this will appear a window as Integrating and you will get the window below. Click on close and will see the standalone ISE integrated with the domain.

No alt text provided for this image
No alt text provided for this image

After this phase is completed, it is need to add the Groups that will be part of this integration.

Click in Groups tab > Add > select the option Select the Groups From Directory > click on Retrieve Groups to find it out all the groups from AD, and let's add the group named as Domain Users, then press ok.

No alt text provided for this image

Note: The user Administrator is part of this group.

After this, the integration with Active Diretory is completed.

If you want to validate, it is possible to perform Test User and Diagnostic Tool, in the Connection Tab.

Click on Test User and insert the username and password. Below is the results.

No alt text provided for this image

It is possible to see that the authentication result is SUCCESS. Rollout the scrollbar to check other parameters regarding the user administrator. Also Navigate in the tabs, Group and Attributes to check further information for this user.

You can also perform tests over Diagnostic Tools. This tool show you how is the integration between ISE and AD.

No alt text provided for this image

You will see all the tests as running and if everything is working fine, that is our case, the status will show as Successful.

No alt text provided for this image

That way, we finish the integration of ISE and Active Directory.

I hope you enjoyed this read!

New contents coming soon.

Jonas Resende

Jo?o Paulo Lyrio

IT Infrastructure | Network Services | Managed Services | Technology

2 年

??????

回复

要查看或添加评论,请登录

Jonas Resende的更多文章

  • ThousandEyes - Web Application Troubleshooting

    ThousandEyes - Web Application Troubleshooting

    Hi community, at this article I would like to bring some real troubleshoting case with ThousandEyes (part of Cisco)…

    13 条评论
  • Error to perform packet captures using Wireshark in EVE-NG

    Error to perform packet captures using Wireshark in EVE-NG

    Introduction Hi Community, This article today is for everyone who enjoys EVE-NG tool to play with your labs. The…

    6 条评论
  • Cisco ISE Users and How to configure Them

    Cisco ISE Users and How to configure Them

    The Cisco ISE tool is one of the fewer platforms which has different user accounts for different purposes. In the Cisco…

    12 条评论
  • Cisco ISE Certificates. How to deploy?

    Cisco ISE Certificates. How to deploy?

    The last article, it was shown the initial and the prerequisites to accomplish a minimum ISE lab setup. It was…

    7 条评论
  • My ISE Lab | Initial Setup

    My ISE Lab | Initial Setup

    Hello community, here we are for a new article. As you know, on my last article I wrote about RADIUS and TACACS…

    12 条评论
  • 1/3 - RADIUS vs TACACS+, who wins this battle?

    1/3 - RADIUS vs TACACS+, who wins this battle?

    You have probably thought, which is the best protocol to use, RADIUS or TACACS? In fact, for this question there is not…

    2 条评论
  • My ISE Setup

    My ISE Setup

    Hey community, I am back with a new article. The idea of my articles is to provide you detailed information about ISE…

    9 条评论
  • My path to Cisco ISE Certification

    My path to Cisco ISE Certification

    What is Cisco ISE 300-715 Certification? Implementing and Configuring Cisco Identity Services Engine (SISE) – 300-715…

    20 条评论

社区洞察

其他会员也浏览了