Customization Admin
|
Manage sponsor, guest, and personal device portals.
|
-
Configure guest and sponsor access.
-
Manage guest access settings.
-
Customize end-user web portals.
|
|
Helpdesk Admin
|
Query monitoring and troubleshooting operations
|
|
Cannot create, update, or delete reports, troubleshooting flows, live authentications, or alarms.
|
Identity Admin
|
|
-
Add, edit, and delete user accounts and endpoints.
-
Add, edit, and delete identity sources.
-
Add, edit, and delete identity source sequences.
-
Configure general settings for user accounts (attributes and password policy).
-
View the Cisco ISE dashboard, live logs, alarms, and reports.
-
Run all troubleshooting flows.
|
Cannot perform any policy management or system-level configuration tasks in Cisco ISE.
|
MnT Admin
|
Perform all the monitoring and troubleshooting operations.
|
-
Manage all the reports (run, create, and delete).
-
Run all the troubleshooting flows.
-
View the Cisco ISE dashboard and live logs.
-
Manage alarms (create, update, view, and delete).
|
Cannot perform any policy management, identity management, or system-level configuration tasks in Cisco ISE.
|
Network Device Admin
|
Manage Cisco ISE network devices and network device repository.
|
-
Read and write permissions on network devices
-
Read and write permissions on Network Device Groups and all network resource object types.
-
View the Cisco ISE dashboard, live logs, alarms, and reports.
-
Run all the troubleshooting flows.
|
Cannot perform any policy management, identity management, or system-level configuration tasks in Cisco ISE.
|
Policy Admin
|
Create and manage policies for all the Cisco ISE services across the network, which are related to authentication, authorization,
posture, profiler, client provisioning, and work centers.
|
-
Read and write permissions on all the elements that are used in policies, such as authorization profiles, Network Device Groups
(NDGs), and conditions.
-
Read and write permissions on identities, endpoints, and identity groups (user identity groups and endpoint identity groups).
-
Read and write permissions on services policies and settings.
-
View the Cisco ISE dashboard, live logs, alarms, and reports.
-
Run all the troubleshooting flows.
-
Device Administration— Access to device administration work centers. Permission for TACACS policy conditions and results.
Network device permissions for TACACS proxy and proxy sequences.
|
Cannot perform any identity management or system-level configuration tasks in Cisco ISE.
Device Administration—Access to the work center does not guarantee access to the subordinate links.
|
RBAC Admin
|
All the tasks under the Operations menu, except for Endpoint Protection Services
Adaptive Network Control, and partial access to some menu items under Administration.
|
-
View the authentication details.
-
Enable or disable Endpoint Protection Services
Adaptive Network Control
-
Create, edit, and delete alarms; generate and view reports; and use Cisco ISE to troubleshoot problems in your network.
-
Read permissions on administrator account settings and admin group settings
-
View permissions on admin access and data access permissions in the RBAC Policy window.
-
View the Cisco ISE dashboard, live logs, alarms, and reports.
-
Run all the troubleshooting flows.
|
Cannot perform any identity management or system-level configuration tasks in Cisco ISE.
|
Read-Only Admin
|
Read-only access to the ISE GUI.
|
-
View and use the functions of the dashboard, reports, and live logs or sessions, such as filtering data, querying, saving
options, printing, and exporting data.
-
Change passwords of their own accounts.
-
Query ISE using global search, reports, and live logs or sessions.
-
Filter and save data based on the attributes.
-
Export data pertaining to authentication policies, profile policies, users, endpoints, network devices, network device groups,
identities (including groups), and other configurations.
-
Customize report queries, save, print, and export them.
-
Generate custom report queries, save, print, or export the results.
-
Save GUI settings for future reference.
-
Download logs, such as ise-psc-log from the window.
|
-
Perform any configuration changes such as create, update, delete, import, quarantine, and Mobile Device Management (MDM) actions
of objects, such as authorization policies, authentication policies, posture policies, profiler policies, endpoints, and users.
-
Perform system operations, such as backup and restore, registration or deregistration of nodes, synchronization of nodes,
creating, editing, and deleting node groups, or upgrade and installation of patches.
-
Import data pertaining to policies, network devices, network device groups, identities (including groups), and other configurations.
-
Perform operations, such as CoA, endpoint debugging, modifying collection filters, bypassing suppression on live sessions
data, modifying the PAN-HA failover settings, and editing the personas or services of Cisco ISE nodes.
-
Run commands that might have a heavy impact on performance. For example, access to the TCP Dump in the window is restricted.
-
Generate support bundles.
|
Super Admin
|
All Cisco ISE administrative functions. The default administrator account belongs to this group.
|
Create, read, update, delete, and eXecute (CRUDX) permissions on all Cisco ISE resources.
Note
|
The super admin user cannot modify the default system-generated RBAC policies and permissions. To do this, you must create
new RBAC policies with the necessary permissions based on your needs, and map these policies to an admin group.
|
Device Administration—Access to device administration work centers. Permission for TACACS policy conditions and results. Network
device permissions for TACACS proxy and proxy sequences. In addition, permission to enable TACACS global protocol settings.
|
-
Device Administration— Access to the work center does not guarantee access to the subordinate links.
-
Only an admin user from the default Super Admin Group can modify or delete other admin users. Even an externally mapped user
who is part of an Admin Group cloned with the Menu and Data Access privileges of the Super Admin Group cannot modify or delete
an admin user.
|
System Admin
|
All Cisco ISE configuration and maintenance tasks.
|
Full access (read and write permissions) to perform all the activities under the Operations tab and partial access to some menu items under the Administration tab:
-
Read permissions on administrator account settings and administrator group settings.
-
Read permissions on admin access and data access permissions along with the RBAC policy window.
-
Read and write permissions for all options under .
-
View authentication details.
-
Enable or disable Endpoint Protection Services
Adaptive Network Control
-
Create, edit, and delete alarms; generate and view reports; and use Cisco ISE to troubleshoot problems in your network.
-
Device Administration— Permission to enable TACACS global protocol settings.
|
Cannot perform any policy management or system-level configuration tasks in Cisco ISE.
|
External RESTful Services (ERS) Admin
|
Full access to all the ERS API requests such as GET, POST, DELETE, PUT
|
|
The role is meant only for ERS authorization supporting internal users, identity groups, endpoints, endpoint groups, and SGT
.
|
External RESTful Services (ERS) Operator
|
Read-only access to ERS API, only GET
|
|
The role is meant only for ERS authorization supporting internal users, identity groups, endpoints, endpoint groups, and SGT.
|
TACACS+ Admin
|
Full access
|
Access to:
|
—
|