cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2672
Views
5
Helpful
9
Replies

User logged in via AD cannot see Network Devices

roger perkin
Level 2
Level 2

I have setup login access on ISE 2.3 to use AD 

Under Authentication - Password Based > Identity Source AD 

Under Authorisation / Policy I have created a new Rule saying IT Admins - mapped to AD IT Admin group gets Super admin Menu Access 

 

However when logged in I cannot see any network devices? It shows Total 6 but they are not visible?

If I log in as local Admin locally they are there. 

 

Any ideas?

1 Accepted Solution

Accepted Solutions

How did you create that ADMIN GROUP = IT-ISE-ADMINS?. Did you duplicate an existing default group? If it so, there is an identified bug when doing that.

 

However, let's assume that your issue has nothing to do with that bug. Then, looks like you are missing the DATA ACCESS option in the RBAC Policy. See example next.

 

RBCA.png

 

View solution in original post

9 Replies 9

Francesco Molino
VIP Alumni
VIP Alumni

Hi

 

Can you share screenshots of your config?

 

Never add any issues like that on 2.3 or any other versions. This works well.


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

ajc
Level 7
Level 7

Please check that you AD IT Admin Group was NOT a duplicated copy of the default SUPER ADMIN Group on which you checked the EXTERNAL box to include the AD Group = IT ADMINS because there is a bug when creating those copies from default groups. Create it from scratch.

 

If the previous was created from scratch then you probably have a misconfiguration on the RBAC Policies in the permissions part. I mean, you created a rule name pointing to the customized ADMIN Group BUT the menu and data access probably do not include all the information/options you need.

 

Let's recall local admin user has super admin privileges and that's why it worked fine for you.

 

Hi braham, Thanks for your reply however I am not exactly sure what you mean about a duplicated copy of the default Super Admin group? 

 

within RBAC policies I created a new line and added the following 

 

rbac.PNGIT-ISE-ADMINS maps to an AD group with the same name. 

However when logging in with an AD user in this group you cannot see any network devices, and also all the dashboards show zero Total Endpoints and zero Active endpoints. 

 

 

 

 

Can I ask you please to give snapshots on Admin group config and the permissions (we see Menu access Super Admin but what for Data?)
You should have Super Admin Menu and Super Admin Data under permissions.


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

How did you create that ADMIN GROUP = IT-ISE-ADMINS?. Did you duplicate an existing default group? If it so, there is an identified bug when doing that.

 

However, let's assume that your issue has nothing to do with that bug. Then, looks like you are missing the DATA ACCESS option in the RBAC Policy. See example next.

 

RBCA.png

 

Perfect, this is the solution, checking the built in Super Admin User - it's all there to see!

 

Admin.PNG

sujanyakj
Spotlight
Spotlight

Hi,

 

Even I am facing the same issue in my ISE box 2.4 release.

 

Not able to see the network devices and network device type.

 

In the policy i have given both the super user menu and data access for the admin group which i have created (external groups)

 

Please help me here

share screenshots about what you did

There are a number of RBAC related bugs fixed in various patches for ISE 2.4. If you have not already installed the latest (patch 14), I would suggest trying that first. If the issue still exists, you will likely need to open a TAC case.

You should also note that ISE 2.4 reaches end of support in December 2022. You should strongly consider upgrading to a newer version that will continue to be supported.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: