<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE ERS API - RBAC in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-ers-api-rbac/m-p/3956644#M455772</link>
    <description>&lt;P dir="ltr"&gt;Hello Team.&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;My customer is looking at consuming the ERS Api for specific uses and has enquired whether&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;it is possible to restrict access to a limited subset of API&lt;/STRONG&gt;? In reviewing the documentation, it seems that once an account is created for API access, it is granted full access to all ERS APIs.&lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;- External RESTful Services Admin-Full access to all ERS APIs (GET, POST, DELETE, PUT). This user can Create, Read, Update, and Delete ERS API requests&lt;/P&gt;
&lt;P dir="ltr"&gt;Secondly,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;is it possible to report/audit&amp;nbsp;API calls;&amp;nbsp;determine&amp;nbsp;what account and APIs have been used/called and when&lt;/STRONG&gt;?&lt;/P&gt;
&lt;P dir="ltr"&gt;Lastly, my current understanding is that the API uses Basic Authentication within the http headers which is simply consist of a username and password base64 encoded. if this is correct,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;are there any best practices employed by other customer to avoid the credentials from being compromised and used by an unauthorized app/user&lt;/STRONG&gt;?&lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;Header&amp;nbsp;&amp;nbsp; &amp;nbsp;Values&amp;nbsp;&amp;nbsp; &amp;nbsp;Description&lt;BR /&gt;ACCEPT&amp;nbsp;&amp;nbsp; &amp;nbsp;Application/XML or Application/JSON&amp;nbsp;&amp;nbsp; &amp;nbsp;Indicates to the server what media type(s) this client is willing to accept&lt;BR /&gt;&lt;STRONG&gt;AUTHORIZATION&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;"&lt;STRONG&gt;Basic&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;" plus username and password (per&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;RFC 2617&lt;/STRONG&gt;)&amp;nbsp;&amp;nbsp; &amp;nbsp;Identifies the authorized user making this request&lt;BR /&gt;CONTENT-TYPE&amp;nbsp;&amp;nbsp; &amp;nbsp;Application/XML or Application/JSON&amp;nbsp;&amp;nbsp; &amp;nbsp;Describes the representation and syntax of the request message body.&lt;BR /&gt;ERS-Media-Type&amp;nbsp;&amp;nbsp; &amp;nbsp;Consists Of: resource-namespace.resource-name.resource-version&amp;nbsp;&amp;nbsp; &amp;nbsp;This Header is not mandatory. It describes ERS resource version. If not sent from client, the server will assume latest version.&lt;/P&gt;
&lt;P dir="ltr"&gt;&lt;A href="https://tools.ietf.org/html/rfc2617#section-2" target="_blank"&gt;https://tools.ietf.org/html/rfc2617#section-2&lt;/A&gt;&lt;/P&gt;
&lt;PRE dir="ltr"&gt;the client sends the userid and password,
   separated by a single colon (":") character, within a base64 [&lt;A title="&amp;quot;Uniform Resource Identifiers (URI): Generic Syntax&amp;quot;" href="https://tools.ietf.org/html/rfc2617#ref-7" target="_blank"&gt;
7&lt;/A&gt;]
   encoded string in the credentials
&lt;/PRE&gt;
&lt;P dir="ltr"&gt;Thanks,&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;Regan&lt;/P&gt;</description>
    <pubDate>Mon, 11 Nov 2019 13:16:43 GMT</pubDate>
    <dc:creator>rdediana</dc:creator>
    <dc:date>2019-11-11T13:16:43Z</dc:date>
    <item>
      <title>ISE ERS API - RBAC</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ers-api-rbac/m-p/3956644#M455772</link>
      <description>&lt;P dir="ltr"&gt;Hello Team.&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;My customer is looking at consuming the ERS Api for specific uses and has enquired whether&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;it is possible to restrict access to a limited subset of API&lt;/STRONG&gt;? In reviewing the documentation, it seems that once an account is created for API access, it is granted full access to all ERS APIs.&lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;- External RESTful Services Admin-Full access to all ERS APIs (GET, POST, DELETE, PUT). This user can Create, Read, Update, and Delete ERS API requests&lt;/P&gt;
&lt;P dir="ltr"&gt;Secondly,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;is it possible to report/audit&amp;nbsp;API calls;&amp;nbsp;determine&amp;nbsp;what account and APIs have been used/called and when&lt;/STRONG&gt;?&lt;/P&gt;
&lt;P dir="ltr"&gt;Lastly, my current understanding is that the API uses Basic Authentication within the http headers which is simply consist of a username and password base64 encoded. if this is correct,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;are there any best practices employed by other customer to avoid the credentials from being compromised and used by an unauthorized app/user&lt;/STRONG&gt;?&lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;Header&amp;nbsp;&amp;nbsp; &amp;nbsp;Values&amp;nbsp;&amp;nbsp; &amp;nbsp;Description&lt;BR /&gt;ACCEPT&amp;nbsp;&amp;nbsp; &amp;nbsp;Application/XML or Application/JSON&amp;nbsp;&amp;nbsp; &amp;nbsp;Indicates to the server what media type(s) this client is willing to accept&lt;BR /&gt;&lt;STRONG&gt;AUTHORIZATION&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;"&lt;STRONG&gt;Basic&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;" plus username and password (per&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;RFC 2617&lt;/STRONG&gt;)&amp;nbsp;&amp;nbsp; &amp;nbsp;Identifies the authorized user making this request&lt;BR /&gt;CONTENT-TYPE&amp;nbsp;&amp;nbsp; &amp;nbsp;Application/XML or Application/JSON&amp;nbsp;&amp;nbsp; &amp;nbsp;Describes the representation and syntax of the request message body.&lt;BR /&gt;ERS-Media-Type&amp;nbsp;&amp;nbsp; &amp;nbsp;Consists Of: resource-namespace.resource-name.resource-version&amp;nbsp;&amp;nbsp; &amp;nbsp;This Header is not mandatory. It describes ERS resource version. If not sent from client, the server will assume latest version.&lt;/P&gt;
&lt;P dir="ltr"&gt;&lt;A href="https://tools.ietf.org/html/rfc2617#section-2" target="_blank"&gt;https://tools.ietf.org/html/rfc2617#section-2&lt;/A&gt;&lt;/P&gt;
&lt;PRE dir="ltr"&gt;the client sends the userid and password,
   separated by a single colon (":") character, within a base64 [&lt;A title="&amp;quot;Uniform Resource Identifiers (URI): Generic Syntax&amp;quot;" href="https://tools.ietf.org/html/rfc2617#ref-7" target="_blank"&gt;
7&lt;/A&gt;]
   encoded string in the credentials
&lt;/PRE&gt;
&lt;P dir="ltr"&gt;Thanks,&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;Regan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2019 13:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ers-api-rbac/m-p/3956644#M455772</guid>
      <dc:creator>rdediana</dc:creator>
      <dc:date>2019-11-11T13:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE ERS API - RBAC</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ers-api-rbac/m-p/3958644#M455773</link>
      <description>&lt;P&gt;The first item is not available at present. I would suggest to check with our PM team(s) for enhancements.&lt;/P&gt;
&lt;P&gt;The second item has some in our existing audit reports. Please have a look at them.&lt;/P&gt;
&lt;P&gt;The third items will be done the same as the usual. Restrict access to the ERS API service port(s) by firewall and not using common user credentials, etc. ERS API has an option to allow CSRF validation, but this is not working with DNAC integration.&lt;/P&gt;
&lt;P&gt;The last item does not seem a question or comment.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 15:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ers-api-rbac/m-p/3958644#M455773</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-11-14T15:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE ERS API - RBAC</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ers-api-rbac/m-p/3958692#M455774</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/397746"&gt;@rdediana&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the enhancement request already opened for this -&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr07394" target="_blank" rel="noopener"&gt;CSCvr07394&lt;/A&gt;&amp;nbsp;(&lt;SPAN&gt;Create ERS users with specific privileges)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 15:55:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ers-api-rbac/m-p/3958692#M455774</guid>
      <dc:creator>Anurag Sharma</dc:creator>
      <dc:date>2019-11-14T15:55:48Z</dc:date>
    </item>
  </channel>
</rss>

