Create an Identity Policy
This task discusses how to create an identity policy.
Before you begin
An identity policy is required to use users and groups in a realm in access control policies. Create and enable one or more realms as described in Create an LDAP Realm or an Active Directory Realm and Realm Directory.
(Optional.) If a particular managed device monitors a large number of user groups, the system might drop user mappings based on groups due to managed device memory limitations. As a result, rules with realm or user conditions might not perform as expected. Provided the devices run version 6.7 or later, you can configure the identity rule to monitor traffic by one network or network group object only. To create a network object, see Creating Network Objects.
An identity policy is not required if all of the following are true:
-
You use the ISE/ISE-PIC identity source.
-
You do not use users or groups in access control policies.
-
You use Security Group Tags (SGT) in access control policies. For more information, see ISE SGT vs Custom SGT Rule Conditions.
Procedure
Step 1 | Log in to the management center. |
Step 2 | Click and click New Policy. |
Step 3 | Enter a Name and, optionally, a Description. |
Step 4 | Click Save. |
Step 5 | To add a rule to the policy, click Add Rule as described in Create an Identity Rule. |
Step 6 | To create a rule category, click Add Category. |
Step 7 | To configure captive portal active authentication, click Active Authentication and see Configure the Captive Portal Part 2: Create an Identity Policy and Active Authentication Rule. |
Step 8 | (Optional.) To filter traffic by network object, click the Identity Source tab. From the list, click the network object to use to filter traffic for this identity policy. Click Add () to create a new network object. |
Step 9 | Click Save to save the identity policy. |
What to do next
-
Add rules to your identity policy that specify which users to match and other options; see Create an Identity Rule.
-
Associate the identity policy with an access control policy to allow or block selected users from accessing specified resources; see Associating Other Policies with Access Control.
-
(Not required for Microsoft Azure AD realms.) Deploy configuration changes to managed devices; see Deploy Configuration Changes.
If you encounter issues, see Troubleshoot User Control.