<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi NenoFurther to my previous in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606298#M72291</link>
    <description>&lt;P&gt;Hi Neno&lt;/P&gt;&lt;P&gt;Further to my previous post. The attached capture shows what I'm trying to make work.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Nov 2014 11:31:04 GMT</pubDate>
    <dc:creator>Roger Alderman</dc:creator>
    <dc:date>2014-11-05T11:31:04Z</dc:date>
    <item>
      <title>ISE Authorization Policies</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606295#M72288</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;Has anyone successfully used a Guest Role in an ISE authorization policy?&lt;/P&gt;&lt;P&gt;I'm using 2 different Guest Roles that get assigned by the Sponsor on the account creation page.&lt;/P&gt;&lt;P&gt;I want to differentiate between the 2 roles in my authorization policies to ensure separation between the 2 types of user.&lt;/P&gt;&lt;P&gt;I've had a suggestion to use an Option field on the sponsor's account creation page - this will work but it would be more secure if the Guest Role could be used.&lt;/P&gt;&lt;P&gt;ISE version is 1.2.198.0&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 00:43:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606295#M72288</guid>
      <dc:creator>Roger Alderman</dc:creator>
      <dc:date>2019-03-13T00:43:38Z</dc:date>
    </item>
    <item>
      <title>Hi Roger-Yes, I have done</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606296#M72289</link>
      <description>&lt;P&gt;Hi Roger-&lt;/P&gt;&lt;P&gt;Yes, I have done this before without any problems. What are the issues that you are having? If possible please share some screenshots of your authorization policies.&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I have done in the past is:&lt;/P&gt;&lt;P&gt;-&lt;STRONG&gt; If &lt;/STRONG&gt;guest account = Contractors &lt;STRONG&gt;then&lt;/STRONG&gt; use "Guest_Contractors" &lt;STRONG&gt;Authorization Profile&lt;/STRONG&gt; which had an WLC ACL "ISE-Guest-Contractors" attached to it&lt;/P&gt;&lt;P&gt;-&lt;STRONG&gt;&amp;nbsp;If&amp;nbsp;&lt;/STRONG&gt;guest account = Regular_Guests&amp;nbsp;&lt;STRONG&gt;then&lt;/STRONG&gt;&amp;nbsp;use "Regular_Guests"&amp;nbsp;&lt;STRONG&gt;Authorization Profile&lt;/STRONG&gt;&amp;nbsp;which had an WLC ACL "ISE-Regular-Guests" attached to it&lt;/P&gt;&lt;P&gt;I hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Nov 2014 21:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606296#M72289</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-11-03T21:53:45Z</dc:date>
    </item>
    <item>
      <title>Hi NenoI have attached 2</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606297#M72290</link>
      <description>&lt;P&gt;Hi Neno&lt;/P&gt;&lt;P&gt;I have attached 2 screen shots.&lt;/P&gt;&lt;P&gt;The first is a standard authentication section for wireless MAB.&lt;/P&gt;&lt;P&gt;The condition for the policy set is using device location, device type, nas-port type and the WLAN Index.&lt;/P&gt;&lt;P&gt;The authorization policy is where I'm having issues.&lt;/P&gt;&lt;P&gt;I have created 2 groups called PublicGuest and ContractorGuest.&lt;/P&gt;&lt;P&gt;I have used these 2 groups as guest roles in the sponsor group. Basically, when the sponsor creates an account he will assign the user into 1 of the 2 groups.&lt;/P&gt;&lt;P&gt;In my authorization policy I want to check either that the user is in the PublicGuest Group and is using WLAN Index 3 or that the user is in the ContractorGuest Group and is using WLAN Index 4.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 11:20:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606297#M72290</guid>
      <dc:creator>Roger Alderman</dc:creator>
      <dc:date>2014-11-05T11:20:56Z</dc:date>
    </item>
    <item>
      <title>Hi NenoFurther to my previous</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606298#M72291</link>
      <description>&lt;P&gt;Hi Neno&lt;/P&gt;&lt;P&gt;Further to my previous post. The attached capture shows what I'm trying to make work.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 11:31:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606298#M72291</guid>
      <dc:creator>Roger Alderman</dc:creator>
      <dc:date>2014-11-05T11:31:04Z</dc:date>
    </item>
    <item>
      <title>So from a high level your</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606299#M72292</link>
      <description>&lt;P&gt;So from a high level your policies look correct. What is the issue(s) that you are having?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 18:28:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606299#M72292</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-11-05T18:28:04Z</dc:date>
    </item>
    <item>
      <title>Hi NenoI have sponsored</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606300#M72293</link>
      <description>&lt;P&gt;Hi Neno&lt;/P&gt;&lt;P&gt;I have sponsored accounts which assign a guest role of 'member'.&lt;/P&gt;&lt;P&gt;I have a guest service which is self service and assigns a guest role of 'guest'.&lt;/P&gt;&lt;P&gt;I have identity groups called 'member' and 'guest'.&lt;/P&gt;&lt;P&gt;The problem I have is that if I create a sponsored account that user can login to the member SSID and also to the guest SSID. The policy authorization rules are using guest flow and the WLAN ID but it is not stopping the client from logging onto to either SSID. If I add the identity group to the authorization rule I still get the same problem.&lt;/P&gt;&lt;P&gt;I cannot seem to separate the client types.&lt;/P&gt;&lt;P&gt;I'm obviously missing something but can't see what. When the accounts are created you can never see them in the identity groups.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2014 16:16:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606300#M72293</guid>
      <dc:creator>Roger Alderman</dc:creator>
      <dc:date>2014-12-02T16:16:00Z</dc:date>
    </item>
    <item>
      <title>Hmm, are you saying that a</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606301#M72294</link>
      <description>&lt;P&gt;Hmm, are you saying that a user that is member of the "PublicGuest" user group is able to login to the "member" SSID?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2014 16:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606301#M72294</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-12-04T16:43:40Z</dc:date>
    </item>
    <item>
      <title>Exactly.If I create a</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606302#M72295</link>
      <description>&lt;P&gt;Exactly.&lt;/P&gt;&lt;P&gt;If I create a sponsored account I can use the credentials to authenticate to either SSID.&lt;/P&gt;&lt;P&gt;Similarly if I create a self-registered account I can use the credentials to authenticate to either SSID.&lt;/P&gt;&lt;P&gt;The correct policy set is selected each time based on the SSID.&lt;/P&gt;&lt;P&gt;It seems to me as if the guest roles effectively do nothing and that all users get assigned to a single group. Of course, as an administrator you simply can't ever see the accounts and where the user has been assigned to. Any attempts to differentiate based on the group simply fail.&lt;/P&gt;&lt;P&gt;It looks like the assignment of a guest role for self-registration is actually a global setting that is applied to all portals and therefore over-rides the guest role assigned within the sponsor group settings. See the attached image.&lt;/P&gt;</description>
      <pubDate>Sun, 07 Dec 2014 11:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606302#M72295</guid>
      <dc:creator>Roger Alderman</dc:creator>
      <dc:date>2014-12-07T11:33:15Z</dc:date>
    </item>
    <item>
      <title>The information about the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606303#M72296</link>
      <description>&lt;P&gt;The information about the "self-registered" guests is news to me. Thank you for sharing that. Now I want to test this and see the behavior for myself, however, I am on vacation for the next two weeks so it will have to wait &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Now, with that being said, i still believe that you should be able to provide deferential type of access for guests that fall in two different guest identity groups. I would suggest that you open a case with TAC and have them examine all of the rules/logs, etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Dec 2014 11:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authorization-policies/m-p/2606303#M72296</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-12-08T11:34:01Z</dc:date>
    </item>
  </channel>
</rss>

