Give me my Attribute mapping back for Sponsor Groups

In ISE 1.0 Cisco introduced an integrated Guest solution with a next-generation RADIUS-based policy server. That policy server was game-changing, certainly. Other companies responded to this market changing model by making some very strategic moves with their chess pieces to be similarly positioned.

图1显示了一个示例的伊势1.2。x (,low) Sponsor Group Policy.

1dot2sponsor Aaron T. Woland

Figure 1 - 1.0 - 1.2.x Sponsor Policy

虽然ISE 1.0是一个非常强大的策略服务器,它也被看作是在客户生命周期管理方面过于复杂,不够灵活。与它在来宾访问管理领域最接近的竞争对手比较时ISE这是尤其如此。

"So, let this be said: the gauntlet has been thrown down, but [Cisco] have answered, and answered with vigor."-Gerald Lambeau, Good Will Hunting

ISE 1.3 introduced a completely re-written Guest solution that greatly simplifies the deployment and allows for high-levels of customization. Things have been simplified GREATLY, but unfortunately some of the power got lost at the same time.

这个博客将专注于一个特定的功能块是丢了,和灿烂的身边工作的同事,克雷格Hyps的那一个,已制定。

The Missing Functionality

The ISE Guest solution uses Sponsor Groups to dictate the permissions the employee will have. In other words, the Sponsor Group determines which types of guest users that can be created, how long those accounts can be active, if the sponsor is allowed to create random/bulk accounts, etc. From ISE 1.0 through ISE 1.2.x, the ISE administrator had the ability to build very complex IF...THEN... type of policies to determine which Sponsor Group the employee should be mapped to. To provide some more clarity of my statement, let's put that into an IF...Then...format:

IF the LDAP/AD attribute named Manager is Yes
THEN assign them to the Manage_All_Accounts Sponsor Group in ISE.

ElseIF the LDAP/AD attribute named Manager is No
THEN assign them to the Manage_Own_Accounts Sponsor Group in ISE.

In ISE 1.3, it was simplified tremendously because (while it was powerful) it was also very complex for admins to figure out. However, during the simplification process, some of the power was also removed.

After extensive customer interviews and planning, the design decision was made to simplify Sponsor Group membership for external users (i.e. user accounts that exist in Active Directory (AD) or LDAP) by mapping to groups in that external identity store. To provide some more clarity on my statement, let's put that into an IF... Then... format:

IF sponsor is a member of the AD group named "SponsorALL"
THEN assign them to the Manage_All_Accounts Sponsor Group in ISE.

ElseIF sponsor is member of the AD group named "SponsorOwn"
THEN assign them to the Manage_Own_Accounts Sponsor Group in ISE.

Figure 2 shows the new, simplified sponsor model in ISE 1.3 and 1.4.

1dot3sponsor Aaron T. Woland

图2 - 1.3 - 1.4赞助策略

So you can see the logic behind the mapping of the external identity that exists very commonly in Active Directory and the local Sponsor Group that dictates the employee's permissions for creating guest accounts. For 90% to 95% of environments, this type of mapping is perfect. However, there are a few instances where that extra power of looking at attributes instead of or in addition to groups is needed.

"Simplicity is the Key"-Ritchie Blackmore

Well if simplicity is the key to be one of the greatest musicians of all time, maybe that makes Craig Hyps the "Ritchie Blackmore of network access" :). In my 10 years of working with him, he never fails to amaze me with some of the creative workarounds that he is able to come up with, and this blog is detailing one of those brilliant-yet-simple workarounds.

Craig's Brilliant Yet Simple Work Around

Basically,the answer to the puzzle is to "Lie to ISE". Configure a new LDAP Identity Source that points to your LDAP server, but configure the group string to be the LDAP attribute that you want to use, instead of an actual group. Think about it, it will see the attribute as the group name and the value of the attribute as the "members".

Using the example from above, it means the IF... Then... Logic would look like:

IF sponsor's group has a member named "Yes"
THEN assign them to the Manage_All_Accounts Sponsor Group in ISE.

ElseIF sponsor's group has a member named "No"
THEN assign them to the Manage_Own_Accounts Sponsor Group in ISE.

This way, ISE thinks there are groups named Yes and No, and that will be the choices in the ISE GUI.

Let's configure this

For simplicity sake, I added a value of Yes or No to an existing attribute in my LDAP server (Active Directory). I used the Job Title field, which translates to the "title" attribute via LDAP. Figure 3 shows the graphical Job Title field that I am using.

Manager1 Attributes Aaron T. Woland

Figure 3 - Job Title Attribute

Of course most organizations would have a custom attribute to use, such as "Manager", or "isManager", or something like that. However, for purposes of keeping this example easy, I am just re-using the existing attribute of "title".

Now, we need to create a new LDAP Identity Store within ISE, just for use with the sponsor portal login.

Navigate to:管理>身份管理>外部身份来源> LDAP. ClickAdd.

Provide a name that will help you identify this later as being used just for Sponsor portal login. You will see in Figure 4 that I used "SecurityDemo_Sponsor", where the _Sponsor suffix is helping me to document why this Identity Store exists.

Choose the base schema to start with (I used Active Directory), as seen in Figure 4. Then modify the Group Objectclass and the Group Map Attribute fields to be the LDAP attribute that you are mapping to. It's very important to choose Subject Objects Contain References To Groups. This is the option that will tell the LDAP connector to look for the Group within the subject (the user's account).

LDAP常规选项卡 Aaron T. Woland

Figure 4 - LDAP General Tab

You must fill in the Connection tab with the correct IP Address(es) and credentials for the LDAP bind. That is no different in this scenario, so I will skip that tab. However, the Directory Organization tab is required before you can save the connection. Figure 5 shows you the example Directory Organization tab.

LDAP Directory Organization Aaron T. Woland

Figure 5 - LDAP Directory Organization

The Groups Tab is next. Normally, you can search the directory for the groups and add them. That will not work in this case. You have to manually type the values (Yes, No) instead. ClickAdd.

Add each value (one at a time) for the attribute that you are mapping to and click. In our example, the value of title can only be Yes or No, where Yes means they get full sponsorship and No means they will get limited sponsorship capabilities. Figure 6 shows the Groups tab where the "Yes" group has already been added, and the "No" group is being added.

LDAP Groups Aaron T. Woland

Figure 6 - LDAP Groups

The LDAP portion is complete. Don't forget to clickSavewhen you are done! Now you need to configure the Sponsor portal to use the new LDAP connection. By default the Sponsor Portal will use the Identity Source Sequence (ISS) named "Sponsor_Portal_Sequence". You need to ensure the new LDAP Identity Source that you just created is used within in this sequence.

Navigate to:Administration > Identity Management > Identity Source Sequencesand click onSponsor_Portal_Sequence编辑它。确保新_Sponsor身份source is in the list, and the original LDAP join is not. Figure 7 shows the ISS.

Sponsor ISS Aaron T. Woland

Figure 7 - Sponsor Identity Source Sequence

Don't forget to clickSavewhen you're done! Now you need to assign the correct sponsor users to the Sponsor Groups. Navigate toGuest Access > Configureand select Sponsor Groups on the left-hand side.

Select the Sponsor group you are configuring, or create a new one. Click theMembersbutton. Choose the new "group" based on the LDAP attribute. In this example, I have selectedSecurityDemo_LDAP:Yesbecause this is the All_Accounts sponsor group and I want managers to be part of this sponsor group. Figure 8 shows the "Yes" group being added to the Sponsor Group.

Sponsor Group Aaron T. Woland

图8 - 赞助商组

Don't forget to clickSavewhen you're done! Repeat this process for each Sponsor group that you need to add members to.

Th-Th-Th-That's all Folks!- Porky Pig
Join the Network World communities onFacebookandLinkedInto comment on topics that are top of mind.

Copyright © 2015足球竞彩网下载

IT Salary Survey:The results are in