06-15-2020 10:31 AM
Is it possible for 2 users to access the same ISE portal, authenticate, get assigned to two different groups and be mapped to two separate router VRFs based on these group attributes? Thank you,
Solved! Go to Solution.
06-15-2020 06:12 PM
ISE portal is defined with the Endpoint identity group, so the users authenticating via that portal become part of that group.
In my view, It is not possible with the same portal to assign users in 2 different groups.
06-15-2020 09:12 PM
This might be possible, but it depends on more detail about your flow and requirements.
What kind of portal authentication is it? Guest (Sponsored or Self-Registered) with internal users, Web Auth for external AD/LDAP user, etc?
With Sponsored Guests, you can create separate Guest Types and ISE auto-creates a User Identity Group for each of those Guest Types. Any Guest accounts created are associated with that Guest Type UIG and that can be used a Condition match in your AuthZ Policy.
All Self-Registered Guest accounts for a single Portal, however, can only be associated to a single Guest Type.
If you're using Web Auth with external AD/LDAP user accounts, you should be able to use group membership of those users as a matching condition in the AuthZ Policy.
For each of the above examples where you have different matching conditions, the AuthZ Profile could assign a dynamic VLAN that would be mapped to your VRF.
06-15-2020 06:12 PM
ISE portal is defined with the Endpoint identity group, so the users authenticating via that portal become part of that group.
In my view, It is not possible with the same portal to assign users in 2 different groups.
06-15-2020 09:12 PM
This might be possible, but it depends on more detail about your flow and requirements.
What kind of portal authentication is it? Guest (Sponsored or Self-Registered) with internal users, Web Auth for external AD/LDAP user, etc?
With Sponsored Guests, you can create separate Guest Types and ISE auto-creates a User Identity Group for each of those Guest Types. Any Guest accounts created are associated with that Guest Type UIG and that can be used a Condition match in your AuthZ Policy.
All Self-Registered Guest accounts for a single Portal, however, can only be associated to a single Guest Type.
If you're using Web Auth with external AD/LDAP user accounts, you should be able to use group membership of those users as a matching condition in the AuthZ Policy.
For each of the above examples where you have different matching conditions, the AuthZ Profile could assign a dynamic VLAN that would be mapped to your VRF.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide