About the pxGrid Cloud Identity Source
The Cisco Identity Services Engine (Cisco ISE) pxGrid Cloud Identity Source enables you to use subscription and user data from Cisco ISE in cloud-delivered Firewall Management Center access control rules.
The pxGrid cloud identity source enables the use of constantly changing dynamic objects from ISE to be used for user control in access control policies in the cloud-delivered Firewall Management Center.
The pxGrid cloud identity source also uses:
-
The Cisco Platform Exchange Grid (pxGrid), which enables multivendor, cross-platform network system collaboration in things like security monitoring and detection systems, network policy platforms, asset and configuration management, identity, and access management. pxGrid Cloud is the cloud-based interface to Cisco ISE.
More information about pxGrid can be found in resources such as:
-
Cisco Platform Exchange Grid (pxGrid) on cisco.com
-
What is PxGrid? on devnet
-
-
The Cisco Digital Network Architecture (Cisco DNA) delivers automation, security, predictive monitoring, and a policy-driven approach. It provides end-to-end network visibility and uses network insights to optimize network performance and deliver the best user and application experience.
To use the pxGrid cloud identity source with the Cisco Security Cloud Control, you must Create a Cisco DNA Portal account.
-
Cisco Platform Exchange Grid (pxGrid) on cisco.com
-
What is pxGrid? on devnet
-
Cisco Platform Exchange Grid Cloud on devnet
-
Prerequisites:
-
ISE-PIC is not supported
-
Cisco ISE 3.1 patch 3 and all later patches and versions
What to do next
See How the pxGrid Cloud Identity Source Identity Source Works
Limitations of the pxGrid Cloud Identity Source
Before you set up the pxGrid cloud identity source, note the following:
-
pxGrid Cloud supports only the
us-west-2
region -
You cannot use the following in access control rules: SGT, endpoint, and location IP.
How the pxGrid Cloud Identity Source Identity Source Works
The following figure shows how the identity source works.
Your cloud-delivered Firewall Management Center uses the pxGrid Cloud SDK to programmatically retrieve user information from an on-premises Cisco ISE server so these users can be used in identity policies on the cloud-delivered Firewall Management Center.
To authorize and authenticate this data exchange, you must:
-
In Cisco ISE, enable the use of pxGrid Cloud.
-
Register Cisco ISE as a product in pxGrid Cloud, which authenticates Cisco ISE and pxGrid Cloud and enables them to communicate with each other.
The authentication process requires you to paste a one-time password (OTP) from pxGrid Cloud into Cisco ISE.
-
In pxGrid Cloud, create an "app instance" that generates an OTP for you to use in the cloud-delivered Firewall Management Center to authenticate the two with each other.
-
After completing all the preceding tasks, the cloud-delivered Firewall Management Center (which includes the pxGrid Cloud SDK) can query ISE using pxGrid Cloud and retrieve sessions containing user information.
-
Many types of dynamic objects can be filtered and sent to the cloud-delivered Firewall Management Center as dynamic objects to be used in access control rules. These include: SGT, endpoint profile, posture status, and machine authentication.
We retrieve user information from Cisco ISE and group information from either Microsoft Active Directory or Azure Active Directory.