cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Announcements

This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC! We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.

326
Views
0
Helpful
5
Replies
Larry Smith
Beginner

How to add attribute to ISE 1.2

The authentication details page shows under "Other Attributes" an attribute called SelectedAuthenticationIdentityStores

Is there a way I can create rules based on this attribute? I can't find it anywhere in the policy conditions options.

 

Thanks in advance!

5 REPLIES 5
Venkatesh Attuluri
Cisco Employee

this is where you select identity store

If you are looking to use identity store or group for authorization you can user following

I need to create an authorization condition that includes an external identity source. That does not appear to be an option so I want to add the SelectedAuthenticationIdentityStores attribute so I can create authorization conditions based on which identity store is used.

 

This would be very simple if ISE would let you choose an external identity source in your second screenshot, but unfortunately it only allows you to select internal identity groups.

Unless I'm missing something? Thank you for the help.

 

EDIT:

I actually need to create a authorization policy based on the "Identity Store" attribute, see picture. Is there a way to add this to the dictionary?

 

You can do this.

First, you need to create the Authorization profiles to allow the permissions you want in your Authorization Policies.

Go to Policy > Policy Elements > Results, then from the Left Menu, choose Authorization > Authorization Profiles.  Click the +Add button and create your profile.  Choose the VLAN, dACL and any other attributes you want for this specific group and click Submit at the bottom of the page.

 

Then you can build your Authorization Policy.  From the screenshots above it looks like you know how to get there (Policy > Authorization).  Insert a new rule and Create New Condition.

In the Select Attribute dropbox, select your Identity Store

Then Choose ExternalGroups

Finally, choose your group in the third dropbox.  The middle defaults to Equals, but you can change it if you need to.

Then, in the Permissions field, choose Standard Authorization Profile

Choose the Authorization Profile you created for this specific group

Click Done and then Save

Your new rule is in place.

 

The Identity Source that you select in this process becomes the Identity Store from which you authenticate.

 

Please Rate Helpful posts and mark this question as answered if, in fact, this does answer your question.  Otherwise, feel free to post follow-up questions.

Charles Moreton

Thank you for the response.

In my case I am dealing with two external identity sources (AD and RSA SecurID) to which some users can authenticate to both. I need to force certain AD groups to authenticate ONLY to the RSA SecurID identity source and disallow access via their AD credentials.

Your response and screenshots are what we already do for access based on AD groups.

 

Sounds like you are going about this the wrong way, creating an authorization rule with some identitystore condtions, won't make the user authenticate to that store, it will only be used to lookup the user, for group matching, but for that to happen, they already have to be authenticated. Maybe you could explain what it is exactly your scenario is ?

- are those radius requests it coming from the same radius client ?

- what is it used for ?

- How does the user select to use rsa and not ad, or vice-versa ?

Create
Recognize Your Peers
Content for Community-Ad

ISE Webinars


Miss a previous ISE webinar?
Never miss one again!

CiscoISE on YouTube