<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access rights in ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564070#M573161</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a two node ISE deployment, version 3.0 Patch 4.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a requirement where a team needs to have Identity Admin access and read only for all other components.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been trying to add a user to the Identity Admin group plus System Admin Menu Access in the hope that they can continue to do the Identity Admin function and see everything else (read-only, for troubleshooting) but it gives the user Full Access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this possible to do in ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Anthony.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Mar 2022 12:00:23 GMT</pubDate>
    <dc:creator>Anthony O'Reilly</dc:creator>
    <dc:date>2022-03-04T12:00:23Z</dc:date>
    <item>
      <title>Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564070#M573161</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a two node ISE deployment, version 3.0 Patch 4.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a requirement where a team needs to have Identity Admin access and read only for all other components.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been trying to add a user to the Identity Admin group plus System Admin Menu Access in the hope that they can continue to do the Identity Admin function and see everything else (read-only, for troubleshooting) but it gives the user Full Access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this possible to do in ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Anthony.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 12:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564070#M573161</guid>
      <dc:creator>Anthony O'Reilly</dc:creator>
      <dc:date>2022-03-04T12:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564087#M573162</link>
      <description>&lt;P&gt;You can do this. Best is to prepare your own Access-Permission as needed and use them in a new RBAC policy.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 12:31:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564087#M573162</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2022-03-04T12:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564088#M573163</link>
      <description>&lt;P&gt;I believe you need to do some tweaking to achieve this and testing: below document can help you :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200891-Understanding-Admin-Access-and-RBAC-Poli.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200891-Understanding-Admin-Access-and-RBAC-Poli.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 12:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564088#M573163</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-03-04T12:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564110#M573165</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I have been trying to add a user to the Identity Admin group plus System Admin Menu Access in the hope that they can continue to do the Identity Admin function and see everything else (read-only, for troubleshooting) but it gives the user Full Access.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-Your best bet is to create duplicates of the default menu/data access types then tweak the copied policies to meet your need and tie the two together.&amp;nbsp; This may better fit your desire and is something you will have to test.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 13:12:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564110#M573165</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2022-03-04T13:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564189#M573169</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/833210"&gt;@Mike.Cifelli&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325766"&gt;@Karsten Iwen&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I really don't think this is possible.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried the following:&lt;/P&gt;&lt;P&gt;1. Super Admin Menu access with Identity Admin Data, the result is I can edit everything.&lt;/P&gt;&lt;P&gt;2. Copied Identity Admin Data, called it Test and changed Data Access Privileges for Admin and Network Device Groups to Read Only,&amp;nbsp; the result is I can edit everything.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My test was to see if I could update any Policy Sets, I should only be able to read them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 14:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564189#M573169</guid>
      <dc:creator>Anthony O'Reilly</dc:creator>
      <dc:date>2022-03-04T14:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564485#M573181</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/202309"&gt;@Anthony O'Reilly&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;it's a BUG !!! : )&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;Note: please take a look at&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw90961" target="_blank" rel="noopener"&gt;CSCvw90961 RBAC rules not enforced in 2.7&lt;/A&gt; and&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvb55884" target="_blank" rel="noopener"&gt;CSCvb55884 ISE RBAC Network Device Type/Location View not working&lt;/A&gt;. for similar references.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 23:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564485#M573181</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-03-04T23:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564647#M573196</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't think this bug is applicable to my issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an issue where if I have given a user super admin menu access with identity admin data access, the user can see everything and edit everything.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I make a copy of super admin data access and only select the same data access as Identity admin, the user can still edit everything.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe I have read it wrong or don't understand.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as I can see, the user will have two accounts: Identity Admin to do his job and a Read Only a/c to do his troubleshooting.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Mar 2022 17:49:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564647#M573196</guid>
      <dc:creator>Anthony O'Reilly</dc:creator>
      <dc:date>2022-03-05T17:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564717#M573213</link>
      <description>&lt;P&gt;Sounds like you want SuperAdmin Menu Access (read everything) but Identity Admin Data Access (only change identities). OK.&lt;/P&gt;
&lt;P&gt;Navigate to &lt;STRONG&gt;Administration &amp;gt; System &amp;gt; Admin Access &amp;gt; Administrators &amp;gt; Admin Groups &lt;/STRONG&gt;and create a new Admin Group "Identity_Admin_with_ReadOnly"&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 461px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145433i0CE2FD2DBF525BB3/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="tinyMceEditor_b182452d7c1d5fthomas_2" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;Navigate to &lt;STRONG&gt;Administration &amp;gt; System &amp;gt; Admin Access &amp;gt; Administrators &amp;gt; Admin Users &lt;/STRONG&gt;and create a new Admin Users "Identity_admin_ro" in the "Identity_Admin_with_ReadOnly" group :&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 497px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145434i28C43998888C5C42/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Navigate to &lt;STRONG&gt;Administration &amp;gt; System &amp;gt; Admin Access &amp;gt; Authorization &amp;gt; RBAC Policy &lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;and use Actions &amp;gt; Insert a New Policy to add your SuperAdmin menus with Identity Admin Data:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 807px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145436iD0B2EBCC6295C34A/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Don't forget to Save.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Logout and login as &lt;FONT face="courier new,courier"&gt;identityadmin_ro&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Go add a new Identity (Network Access User):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 300px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145437iF444C356A66F7A02/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then try to change anything else like adding a Network Device and it should be &lt;EM&gt;&lt;STRONG&gt;DISABLED&lt;/STRONG&gt;&lt;/EM&gt; (+Add is disabled and cannot be changed):&lt;/P&gt;
&lt;DIV id="tinyMceEditor_b182452d7c1d5fthomas_4" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 235px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/145438i0077CAAA1372B812/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Mar 2022 23:32:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4564717#M573213</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-03-05T23:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4565956#M573290</link>
      <description>&lt;P&gt;&lt;A id="link_30" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://community.cisco.com/t5/user/viewprofilepage/user-id/202309" target="_self" aria-label="View Profile of Anthony O'Reilly"&gt;&lt;SPAN class=""&gt;Anthony O'Reilly&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;is correct. See&amp;nbsp;&lt;SPAN&gt;CSCvm01451&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 02:59:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4565956#M573290</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-03-08T02:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4566065#M573294</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your details response with screen shot, I was doing exactly as you stated and the result is full-access for the user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did exactly as you said with the same naming conventions and I can edit policies. I only want the user to have read-only to all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Anthony.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 08:31:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4566065#M573294</guid>
      <dc:creator>Anthony O'Reilly</dc:creator>
      <dc:date>2022-03-08T08:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4566068#M573295</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, this does look like a bug that explains my issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My solution is to have a user_ro account and a user_identity account for the customer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks everyone for your help and advice, much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Anthony.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 08:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4566068#M573295</guid>
      <dc:creator>Anthony O'Reilly</dc:creator>
      <dc:date>2022-03-08T08:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4572585#M573526</link>
      <description>&lt;P&gt;Hello Anthony,&lt;/P&gt;&lt;P&gt;Did you find a solution?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;T&amp;amp;R&lt;/P&gt;&lt;P&gt;Arjun&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 12:54:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4572585#M573526</guid>
      <dc:creator>Arjun Kumar</dc:creator>
      <dc:date>2022-03-17T12:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Access rights in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4574918#M573565</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is not possiuble to do under one account due to the read-only setup within ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had to create two account, one with read-only and the other one with Identity Admin.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Anthony.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 09:25:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/access-rights-in-ise/m-p/4574918#M573565</guid>
      <dc:creator>Anthony O'Reilly</dc:creator>
      <dc:date>2022-03-21T09:25:30Z</dc:date>
    </item>
  </channel>
</rss>

