Cisco Identity Services Engine (ISE)
- 1 minute to read
The Cisco Identity Services Engine (ISE) adapter connects to the Cisco ISE management interface in order to enable the creation and enforcement of security and access policies for endpoint devices connected to managed routers and switches.
The Cisco ISE adapter connection requires the following parameters:
- Cisco ISE Domain – The hostname for Cisco ISE.
- User Name – The username of the service account used to interact with Cisco ISE (see following section)
- Password – The password for the service account used to interact with Cisco ISE (see following section)
- Verify SSL – Choose whether to verify the SSL certificate of the server.
- HTTPS Proxy (optional) – Connect the adapter to a proxy instead of directly connecting it to the domain.
- Choose Instance - If you are using multi-nodes, choose the Axonius node that is integrated with the adapter. By default, the 'Master' Axonius node (instance) is used. For details, see Connecting Additional Axonius Nodes
Create a Service Account for Axonius in Cisco ISE
In order to create a service account for Axonius with the sufficient permissions for calling the Cisco ISE API, do as follows:
Navigate to Administration > Admin Access > Administrators > Admin Users and click on Add:
Assign an access type. Select ReadOnly. You can choose between Read/Write or ReadOnly.
Add the user to one of the following Admin Groups: ERS Admin or ERS Operator.
Enable ERS (External RESTful Services) to allow REST calls. To do this navigate to Administration > System > Settings > ERS Settings then select Enable ERS for Read/Write under the Primary Administration Node:NOTEThe ERS setting must be enabled after each upgrade as it is reset to "disabled" during each upgrade. If you plan on utilizing this adapter, we recommend adding a note to your Cisco ISE upgrade process documentation that the REST API should be enabled at the end of each upgrade.