<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Two Cisco ISE feature requests in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/two-cisco-ise-feature-requests/m-p/3400275#M548363</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I'd like to share a couple of ideas for features I'd like to see in the next versions of ISE: as far as I know, they are not available, but feel free to correct me if I'm wrong!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) Ability to modify Policy Sets via REST API:&amp;nbsp; it is already possible to modify lots of things via API (complete list &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/api_ref_guide/api_ref_book/ise_api_ref_ers1.html" target="_blank"&gt;here&lt;/A&gt;); however, policy sets cannot be created/modified/deleted via API. This is like having a bathtub full of lego bricks and not being able to play with them!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Ability to use references to attributes in authorization profiles: that would allow for some pretty neat tricks. Let's suppose, for example, that you want to use the Identity PSK feature of Cisco WLC 8.5; this is a new feature that allows you to set different pre-shared keys for different clients for an SSID using WPA-PSK (see &lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-5/b_Identity_PSK_Feature_Deployment_Guide.html" target="_blank"&gt;here&lt;/A&gt; for an overview). However, if I'm not mistaken, you have to write a new authorization rule and a new authorization profile for every different PSK.&lt;/P&gt;
&lt;P&gt;It would be much better, in my opinion, to simply add an attribute to the Endpoints (let's call it ipsk) and reference it in a single authorization profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Instead of having multiple authorization profiles like these, each with its own authorization rule...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;cisco-av-pair = psk-mode=ascii&lt;BR /&gt;cisco-av-pair = psk=SharedPassword1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;cisco-av-pair = psk-mode=ascii&lt;BR /&gt;cisco-av-pair = psk=SharedPassword2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;cisco-av-pair = psk-mode=ascii&lt;BR /&gt;cisco-av-pair = psk=SharedPassword3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You would have a single authorization profile, with a reference to the attribute and a single authorization rule, referencing the "dynamic" authorization profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Access Type = ACCESS_ACCEPT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;cisco-av-pair = psk-mode=ascii&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;cisco-av-pair = psk=&lt;U&gt;&lt;STRONG&gt;$InternalEndpoint.ipsk&lt;/STRONG&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This feature would not be strictly necessary if we had feature #1, but would still allow for much more compact authorization rules.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The predefined authorization profile Cisco_WebAuth already has something like that:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;cisco-av-pair = url-redirect-acl=ACL_WEBAUTH_REDIRECT&lt;BR /&gt;cisco-av-pair = url-redirect=https://ip:port/portal/gateway?sessionId=SessionIdValue&amp;amp;portal=404e0f70-2e02-11e8-ba71-005056872c7f&amp;amp;action=cwa&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The references ip, port and&amp;nbsp;SessionIdValue are populated at runtime.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is there some Cisco overlord out there that can tell us if something like this has ever been considered?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Best regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Silla&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 18:58:35 GMT</pubDate>
    <dc:creator>silla</dc:creator>
    <dc:date>2020-02-21T18:58:35Z</dc:date>
    <item>
      <title>Two Cisco ISE feature requests</title>
      <link>https://community.cisco.com/t5/network-access-control/two-cisco-ise-feature-requests/m-p/3400275#M548363</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I'd like to share a couple of ideas for features I'd like to see in the next versions of ISE: as far as I know, they are not available, but feel free to correct me if I'm wrong!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) Ability to modify Policy Sets via REST API:&amp;nbsp; it is already possible to modify lots of things via API (complete list &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/api_ref_guide/api_ref_book/ise_api_ref_ers1.html" target="_blank"&gt;here&lt;/A&gt;); however, policy sets cannot be created/modified/deleted via API. This is like having a bathtub full of lego bricks and not being able to play with them!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Ability to use references to attributes in authorization profiles: that would allow for some pretty neat tricks. Let's suppose, for example, that you want to use the Identity PSK feature of Cisco WLC 8.5; this is a new feature that allows you to set different pre-shared keys for different clients for an SSID using WPA-PSK (see &lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-5/b_Identity_PSK_Feature_Deployment_Guide.html" target="_blank"&gt;here&lt;/A&gt; for an overview). However, if I'm not mistaken, you have to write a new authorization rule and a new authorization profile for every different PSK.&lt;/P&gt;
&lt;P&gt;It would be much better, in my opinion, to simply add an attribute to the Endpoints (let's call it ipsk) and reference it in a single authorization profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Instead of having multiple authorization profiles like these, each with its own authorization rule...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;cisco-av-pair = psk-mode=ascii&lt;BR /&gt;cisco-av-pair = psk=SharedPassword1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;cisco-av-pair = psk-mode=ascii&lt;BR /&gt;cisco-av-pair = psk=SharedPassword2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;cisco-av-pair = psk-mode=ascii&lt;BR /&gt;cisco-av-pair = psk=SharedPassword3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You would have a single authorization profile, with a reference to the attribute and a single authorization rule, referencing the "dynamic" authorization profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Access Type = ACCESS_ACCEPT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;cisco-av-pair = psk-mode=ascii&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;cisco-av-pair = psk=&lt;U&gt;&lt;STRONG&gt;$InternalEndpoint.ipsk&lt;/STRONG&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This feature would not be strictly necessary if we had feature #1, but would still allow for much more compact authorization rules.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The predefined authorization profile Cisco_WebAuth already has something like that:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;cisco-av-pair = url-redirect-acl=ACL_WEBAUTH_REDIRECT&lt;BR /&gt;cisco-av-pair = url-redirect=https://ip:port/portal/gateway?sessionId=SessionIdValue&amp;amp;portal=404e0f70-2e02-11e8-ba71-005056872c7f&amp;amp;action=cwa&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The references ip, port and&amp;nbsp;SessionIdValue are populated at runtime.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is there some Cisco overlord out there that can tell us if something like this has ever been considered?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Best regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Silla&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:58:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-cisco-ise-feature-requests/m-p/3400275#M548363</guid>
      <dc:creator>silla</dc:creator>
      <dc:date>2020-02-21T18:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: Two Cisco ISE feature requests</title>
      <link>https://community.cisco.com/t5/network-access-control/two-cisco-ise-feature-requests/m-p/3400300#M548365</link>
      <description>&lt;P&gt;&lt;FONT size="3" face="arial,helvetica,sans-serif"&gt;Hi,&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3" face="arial,helvetica,sans-serif"&gt;You might have better luck reaching out to Cisco &lt;A href="https://communities.cisco.com/community/technology/security/pa/ise/content?filterID=contentstatus[published]~objecttype~objecttype[thread]" target="_self"&gt;here&lt;/A&gt;.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;FONT size="3" face="arial,helvetica,sans-serif"&gt;In regard to your scenario you mentioned, I previously labbed a similar scenario for management of FlexVPN PSK, normally I'd have created a unique Authorization Profile per VPN peer which can become very tedious. What you can do is create a User Custom Attribute e.g VPN-PSK, then create an Internal ISE user, fill in the string value as your PSK in the custom attribute field VPN-PSK. Create 1 Authorization Profile and define an advanced attribute setting:- Radius:Tunnel-Password = InternalUser:VPN-PSK. You would then use this Authorization Profile in a rule and it would query the defined in the VPN-PSK field under the user/vpn peer being authorized.&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;FONT size="3" face="arial,helvetica,sans-serif"&gt;This may be helpful to you.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jun 2018 16:00:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-cisco-ise-feature-requests/m-p/3400300#M548365</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-06-15T16:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: Two Cisco ISE feature requests</title>
      <link>https://community.cisco.com/t5/network-access-control/two-cisco-ise-feature-requests/m-p/3400312#M548366</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;thank you very much for your answer!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;What you can do is create a User Custom Attribute e.g VPN-PSK, then create an Internal ISE user, fill in the string value as your PSK in the custom attribute field VPN-PSK. Create 1 Authorization Profile and define an advanced attribute setting:- Radius:Tunnel-Password = InternalUser:VPN-PSK. You would then use this Authorization Profile in a rule and it would query the defined in the VPN-PSK field under the user/vpn peer being authorized.&lt;BR /&gt;&lt;/FONT&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I've tried doing something very similar using a custom attribute for an endpoint, instead of a user, but I couldn't get it to work. But if it works in your case, maybe I can get it to work in mine!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Silla Rizzoli&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jun 2018 16:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-cisco-ise-feature-requests/m-p/3400312#M548366</guid>
      <dc:creator>silla</dc:creator>
      <dc:date>2018-06-15T16:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: Two Cisco ISE feature requests</title>
      <link>https://community.cisco.com/t5/network-access-control/two-cisco-ise-feature-requests/m-p/3404123#M548367</link>
      <description>&lt;P&gt;I got it to work in my case too! So I guess we already have feature #1, so #2 is not strictly needed...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ciao!&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jun 2018 17:03:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-cisco-ise-feature-requests/m-p/3404123#M548367</guid>
      <dc:creator>silla</dc:creator>
      <dc:date>2018-06-22T17:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: Two Cisco ISE feature requests</title>
      <link>https://community.cisco.com/t5/network-access-control/two-cisco-ise-feature-requests/m-p/3769451#M548368</link>
      <description>&lt;P&gt;I think this will help you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-amp-wlc-wpa2-psk-wlan-per-device-passphrase-ipsk/ta-p/3644425" target="_blank"&gt;https://community.cisco.com/t5/security-documents/cisco-ise-amp-wlc-wpa2-psk-wlan-per-device-passphrase-ipsk/ta-p/3644425&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings&lt;/P&gt;
&lt;P&gt;Philip&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Dec 2018 11:52:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-cisco-ise-feature-requests/m-p/3769451#M548368</guid>
      <dc:creator>Philip91</dc:creator>
      <dc:date>2018-12-27T11:52:51Z</dc:date>
    </item>
  </channel>
</rss>

