User authentication policies
in Cisco ISE enable you to provide authentication for a number of user login
session types using a variety of standard authentication protocols including,
but not limited to, Password Authentication Protocol (PAP), Challenge-Handshake
Authentication Protocol (CHAP), Protected Extensible Authentication Protocol
(PEAP), and Extensible Authentication Protocol (EAP). Cisco ISE specifies the
allowable protocol(s) that are available to the network devices on which the
user tries to authenticate and specifies the identity sources from which user
authentication is validated.
Cisco ISE allows for a wide
range of variables within authorization policies to ensure that only authorized
users can access the appropriate resources when they access the network. The
initial release of Cisco ISE supports only RADIUS-governed access to the
internal network and its resources.
At the most fundamental
level, Cisco ISE supports 802.1X, MAC authentication bypass (MAB), and
browser-based Web authentication login for basic user authentication and access
via both wired and wireless networks. Upon receiving an authentication request,
the “outer part” of the authentication policy is used to select the set of
protocols that are allowed when processing the request. Then, the “inner part”
of the authentication policy is used to select the identity source that is used
to authenticate the request. The identity source may consist of a specific
identity store or an identity store sequence that lists a set of accessible
identities until the user received a definitive authorization response.
Once authentication succeeds,
the session flow proceeds to the authorization policy. (There are also options
available that allow Cisco ISE to process the authorization policy even when
the authentication did not succeed.) Cisco ISE enables you to configure
behavior for “authentication failed,” “user not found,” and “process failed”
cases, and also to decide whether to reject the request, drop the request (no
response is issued), or continue to the authorization policy. In cases where
Cisco ISE continues to perform authorization, you can use the
“AuthenticationStaus” attribute in the “NetworkAccess” dictionary to
incorporate the authentication result as part of the authorization policy.
The authorization policy
result is Cisco ISE assigning an authorization profile that might also involve
a downloadable ACL specifying traffic management on the network policy
enforcement device. The downloadable ACL specifies the RADIUS attributes that
are returned during authentication and that define the user access privileges
granted once authenticated by Cisco ISE.
 Note |
Cisco ISE processes the attributes in the following order while
identifying the Authentication session for the incoming accounting packet:
-
For Cisco devices:
-
Class/State
-
audit-session-id
-
For third party devices:
-
Class/State
-
Calling-Station-ID
-
If the authentication session cannot be identified, Cisco ISE
creates a new session ID based on the Calling-Station-ID, NAS-Port, and
NAS-IP-Address.
|