Create an Identity Policy
Before you begin
An identity policy is required to use users and groups in a realm in access control policies. Create and enable one or more realms as described in Create a Realm and Realm Directory.
(Optional.) If a particular managed device monitors a large number of user groups, the system might drop user mappings based on groups due to managed device memory limitations. As a result, rules with realm or user conditions might not perform as expected. Provided the devices run version 6.7 or later, you can configure the identity rule to monitor traffic by one network or network group object only. To create a network object, see Creating Network Objects.
An identity policy is not required if all of the following are true:
-
You use the ISE/ISE-PIC identity source.
-
You do not use users or groups in access control policies.
-
You use Security Group Tags (SGT) in access control policies. For more information, see ISE SGT vs Custom SGT Rule Conditions.
Procedure
Step 1 | Log in to the Cisco Defense Orchestrator. |
Step 2 | Click and click New Policy. |
Step 3 | Enter a Name and, optionally, a Description. |
Step 4 | Click Save. |
Step 5 | To add a rule to the policy, click Add Rule as described in Create an Identity Rule. |
Step 6 | To create a rule category, click Add Category. |
Step 7 | To configure captive portal active authentication, click Active Authentication as described in Configure the Captive Portal Part 1: Create an Identity Policy. |
Step 8 | (Optional.) To filter traffic by network object, click the Identity Source tab. From the list, click the network object to use to filter traffic for this identity policy. Click Add () to create a new network object. |
Step 9 | Click Save to save the identity policy. |
What to do next
-
Add rules to your identity policy that specify which users to match and other options; see Create an Identity Rule.
-
Associate the identity policy with an access control policy to allow or block selected users from accessing specified resources; see Associating Other Policies with Access Control.
-
Deploy configuration changes to managed devices; see Deploy Configuration Changes.
If you encounter issues, see Troubleshoot User Control.