IMO, it should really be separate. Auth for networking gear should be managed by the people who manage the networking gear. If you tie it to AD, anyone with permissions could grant themselves access to any device. This is bad.
TACACS+ is better for Cisco gear as it allows you to do command-level auth at command run time, rather than having to rely on pre-defined privilege levels as with RADIUS. Juniper, not sure, as I've never implemented RADIUS with Junos, but I suspect it has the same restriction.
If you don't care about the second two A's in AAA, then RADIUS will work fine for you. If you do care, use TACACS+. Either way, keep the user database separate from your AD database.
You can support this with access groups (you can bolt this on in the Windows Radius server in the client rules section based on IP's) or using proper LDAP search paths. I can be in AD with Mary Jane Secretary and she can't log in to network gear while I can.
No, but Windows Admin #1 who has no business in any of the network gear can grant himself permissions to log in to said networking gear. And, via RADIUS, it's one attribute which determines priv level.
Sounds like a business / process issue and not a tech / IT issue. And with RADIUS you can assign groups inside the Windows Radius tool via the rules. You can assign it via group, OU or per user (per device also).
Has nothing to do with policy or process. It has to do with removing the opportunity for misuse. If you tie your network device AAA to AD, any Windows admin can modify that, even admins that have no business in the networking gear. That's a huge security hole.
Additinally, TACACS+ provides a much greater granularity for command-level auth and logging that RADIUS does not have.
These are facts that can't be argued and they should absolutely be considered when deploying AAA in a network.
Obviously, VPN AAA should be tied to AD, but unless the people who maintain AD also maintain the networking equipment, device AAA should not be.
Has nothing to do with policy or process. It has to do with removing the opportunity for misuse. If you tie your network device AAA to AD, any Windows admin can modify that, even admins that have no business in the networking gear. That's a huge security hole.
Additinally, TACACS+ provides a much greater granularity for command-level auth and logging that RADIUS does not have.
These are facts that can't be argued and they should absolutely be considered when deploying AAA in a network.
Obviously, VPN AAA should be tied to AD, but unless the people who maintain AD also maintain the networking equipment, device AAA should not be.