Cisco Acs 57 User Guide
Here you can view all the pages of manual Cisco Acs 57 User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 281
25 Managing Access Policies Configuring Access Service Policies To configure a rule-based policy, see these topics: Creating Policy Rules, page 37 Duplicating a Rule, page 38 Editing Policy Rules, page 39 Deleting Policy Rules, page 39 For information about configuring an identity policy for Host Lookup requests, see Configuring an Authorization Policy for Host Lookup Requests, page 18. Table 89 Rule-based Identity Policy Page Option Description Policy type Defines the type of policy to...
Page 282
26 Managing Access Policies Configuring Access Service Policies Related Topics Configuring a Group Mapping Policy, page 27 Configuring a Session Authorization Policy for Network Access, page 30 Configuring a Session Authorization Policy for Network Access, page 30 Configuring Shell/Command Authorization Policies for Device Administration, page 35 Configuring Identity Policy Rule Properties You can create, duplicate, or edit an identity policy rule to determine the identity databases that are used...
Page 283
27 Managing Access Policies Configuring Access Service Policies Configuring a Group Mapping Policy Configure a group mapping policy to map groups and attributes that are retrieved from external identity stores to ACS identity groups. When ACS processes a request for a user or host, this policy retrieves the relevant identity group which can be used in authorization policy rules. If you created an access service that includes a group mapping policy, you can configure and modify this policy. You can...
Page 284
28 Managing Access Policies Configuring Access Service Policies 2.Select an identity group. Table 91 Simple Group Mapping Policy Page Option Description Policy type Defines the type of policy to configure: Simple—Specifies the results to apply to all requests. Rule-based—Configure rules to apply different results depending on the request. Caution: If you switch between policy types, you will lose your previously saved policy configuration. Identity Group Identity group to which attributes and groups...
Page 285
29 Managing Access Policies Configuring Access Service Policies 3.Click Save Changes to save the policy. To configure a rule-based policy, see these topics: Creating Policy Rules, page 37 Duplicating a Rule, page 38 Editing Policy Rules, page 39 Deleting Policy Rules, page 39 Related Topics Viewing Identity Policies, page 23 Configuring a Session Authorization Policy for Network Access, page 30 Configuring a Session Authorization Policy for Network Access, page 30 Configuring Shell/Command...
Page 286
30 Managing Access Policies Configuring Access Service Policies Configuring a Session Authorization Policy for Network Access When you create an access service for network access authorization, it creates a Session Authorization policy. You can then add and modify rules to this policy to determine the access permissions for the client session. You can create a standalone authorization policy for an access service, which is a standard first-match rule table. You can also create an authorization...
Page 287
31 Managing Access Policies Configuring Access Service Policies Configuring Network Access Authorization Rule Properties Use this page to create, duplicate, and edit the rules to determine access permissions in a network access service. 1.Select Access Policies > Access Services > > Authorization, and click Create, Edit, or Duplicate. Table 94 Network Access Authorization Policy Page Option Description Status Rule statuses are: Enabled—The rule is active. Disabled—ACS does not apply the results of...
Page 288
32 Managing Access Policies Configuring Access Service Policies 2.Complete the fields as described in Table 95 on page 32: Note: ACS allows you to create an internal user account using the identity string attribute to match a particular NDG:location only by configuring the detailed path of the NDG. Configuring Device Administration Authorization Policies A device administration authorization policy determines the authorizations and permissions for network administrators. You create an authorization...
Page 289
33 Managing Access Policies Configuring Access Service Policies The Device Administration Authorization Policy page appears as described in Table 96 on page 33. Configuring Device Administration Authorization Rule Properties Use this page to create, duplicate, and edit the rules to determine authorizations and permissions in a device administration access service. Select Access Policies > Access Services > service > Authorization, and click Create, Edit, or Duplicate. The Device Administration...
Page 290
34 Managing Access Policies Configuring Access Service Policies Configuring Device Administration Authorization Exception Policies You can create a device administration authorization exception policy for a defined authorization policy. Results from the exception rules always override authorization policy rules. Use this page to: View exception rules. Delete exception rules. Open pages that create, duplicate, edit, and customize exception rules. Select Access Policies > Access Services > service...