Configure ISE Role-Based Access Control with LDAP
Step-by-Step Guide to Configuring Cisco ISE Role-Based Access Control with LDAP
Prerequisites
- Familiarity with Cisco ISE configuration
- Cisco ISE Version 3.0
- Windows Server 2016 environment
- Administrative credentials for LDAP/Active Directory
Configuration Steps
1. Join ISE to LDAP
- Navigate to Administration > Identity Management > External Identity Sources > LDAP.
- Configure the Hostname of the primary LDAP server and port (389 for LDAP, 636 for LDAP-Secure).
- Enter the Admin Distinguished Name (DN) and password.
- Click Test Bind Server to verify connectivity.
- Select the correct Organization group based on LDAP hierarchy.
2. Enable Administrative Access for LDAP Users
- Go to Administration > System > Admin Access > Authentication.
- Under Authentication Method, select Password-Based.
- Choose LDAP from the Identity Source drop-down.
- Save changes.
3. Map Admin Group to LDAP Group
- Create an Admin Group in ISE.
- Map it to the corresponding Active Directory group.
- This ensures RBAC permissions are applied based on group membership.
4. Set Permissions
Menu Access
- Navigate to System > Authorization > Permissions > Menu Access.
- Define which menus/sub-entities are visible to the admin group.
- Save changes.
Data Access
- Navigate to System > Authorization > Permissions > Data Access.
- Configure full or read-only access to identity groups.
- Save changes.
5. Configure RBAC Policy
- Go to System > Admin Access > Authorization > Policy.
- Insert a new policy (e.g.,
LDAP_RBAC_policy). - Map it to the Admin Group.
- Assign menu and data access permissions.
- Save changes.
Note: Default system-generated RBAC policies cannot be modified. Only Super Admin users can manage other admin accounts cisco.com.
Verification
- Log in to ISE GUI using LDAP credentials.
- Select LDAP_Server as the Identity Source.
- Verify successful login in Operations > Reports > Audit > Administrators Logins.
- Confirm limited/custom access menus are applied as expected.
Troubleshooting
-
Enable Debugging:
- RBAC logs:
ise-psc.log - Access filter logs:
ise-psc.log - LDAP interaction logs:
prrt-server.log
- RBAC logs:
-
Packet Capture & Log Analysis:
- Verify LDAP authentication events.
- Confirm RBAC policy enforcement in logs.