This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC!
We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.
With current configuration setup for ISE and ID-PSK, using Cisco AV Pairs in the Authorization profile to hold the network key - these attributes in the Authorization profile are shown in clear text in the Live log details. The ISE Live Logs are accessible - typically by lowest level admins in ISE (i.e. HelpDesk). Is there a way to hide or block these components of the Authz Profile from showing in the live logs? Looking for something similar to how invalid user credentials/identity can be blocked via RADIUS protocol settings from showing in live logs and Live log details
Thanks!
Solved! Go to Solution.
I kind of figured as much. For corporations leveraging this feature, this can put lower-tier support team enablement at odds with the security of the wireless network. (As secure as WPA2-PSK is in this day and age). One of the great benefits of ISE is the HelpDesk/Operations role can be given to anyone within the organization in the Endpoint management/support path and with very quick tutorial they can become more efficient at resolving issues faster and within lower support bands. This exposure of the network keys changes that.