Table Of Contents
Guest Management
Overview
Functional Description
WLC Interaction for Local WebAuth
Wired NAD Interaction for Central WebAuth
Wired NAD Interaction with Local WebAuth
Cisco ISE Guest Service Components
Cisco ISE Guest Service Applications
Guest Licensing
Guest High Availability and Replication
Guest Service Control
Operating System and Browser Support
Configuring Guest Policy Conditions
Simple Conditions
Creating Simple Conditions
Compound Conditions
Creating Compound Conditions
Sponsor Group Policy
Creating a New Sponsor Group Policy
Sponsor Groups
Creating and Editing Sponsor Groups
Deleting the Sponsor Group
Mapping Active Directory Groups to Sponsor Groups
Creating Sponsor Users
Creating Guest Users
SMTP Server Settings for Email Notifications
General Settings
Setting Ports for the Sponsor and Guest Portals
Purging Guest User Records
Sponsor Settings
Authentication Source
Portal Customization
Configuring Language Templates
Adding and Editing a Language Template
Deleting an Existing Language Template
Configuring a Template to Create a Single Guest Account
Configuring a Template for Guest Notification
Guest Settings
Configuring Details Policy
MultiPortal Configurations
Hosting Multiple Portals
Sample HTML Code for Creating Portal Pages
Configuring Guest Portal Policy
Configuring Guest Password Policy
Time Profiles
Adding, Editing, or Duplicating Time Profiles
Deleting Time Profiles
Configuring Guest Username Policy
Monitoring Sponsor and Guest Activity
Audit Logging
Guest Management
This chapter provides information on how to manage guest and sponsor accounts and create guest policies. This chapter contains:
•Overview
•Functional Description
•Guest Licensing
•Guest High Availability and Replication
•Guest Service Control
•Operating System and Browser Support
•Configuring Guest Policy Conditions
•Sponsor Group Policy
•Sponsor Groups
•Mapping Active Directory Groups to Sponsor Groups
•Creating Sponsor Users
•Creating Guest Users
•SMTP Server Settings for Email Notifications
•General Settings
•Sponsor Settings
•Guest Settings
•Monitoring Sponsor and Guest Activity
•Audit Logging
Overview
The Cisco Identity Services Engine (ISE) Guest service allows guests, visitors, contractors, consultants, or customers to perform an HTTP or HTTPS login to access a network whether that network is a corporate intranet or the public Internet. The network is defined through a VLAN and downloadable access control list (DACL) configuration in the network access device (NAD).
The Cisco ISE Guest service allows any user with privileges to easily create temporary guest accounts and to sponsor guests. The Cisco ISE Guest Service performs full authentication of sponsors. The sponsors are users who create guest accounts. Cisco ISE allows sponsors to provide account details to the guest by printout, email, or short message service (SMS). The entire experience, from user account creation to guest network access, is stored for audit and reporting purposes.
When a guest user first attaches to the local network, either through a wireless or hard-wire connection, the user is placed in a segregated network with limited access. You can define this segregated network through the VLAN and DACL configuration on the wireless LAN controller (WLC) or NAD. In order for a guest user to function properly, the WLC or NAD must support captive HTTP and HTTPS portal login scenarios where login URLs can be mapped to RADIUS servers.
The Cisco ISE Guest Service offers a simple client configurable Sponsor Portal for creating and managing Guest User accounts.
Guest Service also supports default and customizable Guest Login Portals to handle Guest User login.
Guest service provisions a guest account for the amount of time specified when the account is created.
Functional Description
To gain full access to the network, the guest user uses a browser to make any HTTP or HTTPS request, for example, www.cisco.com or yahoo.com. Since the user has limited initial access, the WLC or NAD intercepts the HTTP request and redirects it to the Guest User Login portal. Here the Guest User Portal is configured as the captive portal in the case of WLC Local WebAuth. In the case of wired NAD, a URL-redirect value is returned to the NAD from Cisco ISE during an initial MAB lookup failure. The user is presented with a login page where they can enter username and password.
The Cisco ISE Guest Services support the following scenarios:
•Wireless LAN Controller with Local WebAuth
•Wired NAD with Central WebAuth
•Wired NAD with Local WebAuth
Wireless LAN Controller with Local WebAuth
In this scenario, the Guest User Login portal redirects the guest user's browser to request a login to the WLC. This request to login takes the form of an HTTP URL posted to the WLC and contains the user credentials. The WLC receives the user login request and authenticate the user using a configured RADIUS server which points to the Cisco ISE RADIUS server implementation.
For more details, see WLC Interaction for Local WebAuth.
Wired NAD with Central WebAuth
In this scenario, the guest user's credentials are added to the Cisco ISE session cache and a Change of Authorization (CoA) is requested with the NAD. The NAD makes a new authorization request to the Cisco ISE server and the session cache attributes are used to fully authenticate and authorize the guest user.
For more details, see Wired NAD Interaction for Central WebAuth.
Wired NAD with Local WebAuth
In this scenario, the Guest User Login portal redirects the guest user's browser to request a login to the switch. This request to login takes the form of an HTTP URL posted to the switch and contains the user credentials. The switch receives the user login request and authenticate the user using a configured RADIUS server which points to the Cisco ISE RADIUS server implementation.
Fro more details, see Wired NAD Interaction with Local WebAuth.
WLC Interaction for Local WebAuth
Before a user is authenticated, the WLC intercepts all HTTP request traffic and redirects the user to the guest user login portal. The admin configures the guest portal as an external web login portal with the WLC. This value points to the guest portal:
https://ip:8443/guestportal/portal.jsp.
The WLC redirects the user to this guest portal instead of it own internal portal. The guest enters the username and password into the portal, and perform the optional accept use policy (AU)P and change password. The guest portal will then redirect the client browser to the login URL supplied by the WLC in the initial portal redirection. This login URL contains the username and password of the URL and is directed to the WLC. The WLC takes these credentials and makes a RADIUS request to the Cisco ISE server to authenticate and authorize the user. The Cisco ISE then returns the network access to the user, based on the policies defined in the Cisco ISE server.
Wired NAD Interaction for Central WebAuth
If your client's machine is hard wired to a NAD, the guest service interaction takes the form of a failed MAB request that leads to a guest portal Central WebAuth login.
The Central WebAuth triggered by a MAB failure flow follows these steps:
1. The client connects to the NAD through a hard-wired connection. There is no 802.1X supplicant on the client.
2. An authentication policy with a service type for MAB allows a MAB failure to continue and return a restricted network profile containing a URL-redirect for Central WebAuth user interface.
3. The NAD is configured to post MAB requests to the Cisco ISE RADIUS server.
4. The client machine connects and the NAD initiates a MAB request.
5. The Cisco ISE server processes the MAB request and does not find an end point for the client machine. This MAB failure resolves to the restricted network profile and returns the URL-redirect value in the profile to the NAD in an access-accept. To support this function, ensure that an Authorization Policy exists featuring the appropriate "NetworkAccess:UseCase=Hostlookup" and "Session:Posture Status=Unknown" conditions.
The NAD uses this value to redirect all client HTTP/HTTPS traffic on ports 8080 or 8443 to the URL-redirect value. The standard URL value in this case is:
https://ip:port/guestportal/gateway?sessionId=NetworkSessionId&action=cwa.
6. The client initiates an HTTP or HTTPS request to any URL using the client browser.
7. The NAD redirects the request to the URL-redirect value returned from the initial access-accept.
8. The gateway URL value with action CWA redirects to the guest portal login page.
9. The client enters the username and password and submits the login form.
10. The guest action server authenticates the user credentials provided.
11. If the credentials are valid, the username and password are stored in the local session cache by the guest action server.
12. If the guest portal is configured to perform Client Provisioning, the guest action redirects the client browser to the Client Provisioning URL. (You can also optionally configure the Client Provisioning Resource Policy to feature a "NetworkAccess:UseCase=GuestFlow" condition.)
Since there is no Client Provisioning or Posture Agent for Linux, guest portal redirects to Client Provisioning, which in turn redirects back to a guest authentication servlet to perform optional IP release/renew and then CoA.
13. If the guest portal is not configured to perform Client Provisioning, the guest action server sends a CoA to the NAD through an API call. This CoA will cause the NAD to reauthenticate the client using the RADIUS server. This reauthentication makes use of the user credentials stored in the session cache. A new access-accept is returned to the NAD with the configured network access. If Client Provisioning is not configured and the VLAN is in use, the guest portal performs VLAN IP renew.
14. With redirection to the Client Provisioning URL, the Client Provisioning subsystem downloads a non-persistent web-agent to the client machine and perform posture check of the client machine. (You can optionally configure the Posture Policy with a "NetworkAccess:UseCase=GuestFlow" condition.)
15. If the client machine is non-complaint, ensure you have configured an Authorization Policy that features "NetworkAccess:UseCase=GuestFlow" and "Session:Posture Status=NonCompliant" conditions.
16. Once the client machine is compliant, ensure you have an Authorization policy configured with conditions "NetworkAccess:UseCase=GuestFlow" and "Session:Posture Status=Compliant" conditions), From here, the Client Provisioning issues a CoA to the NAD. This CoA will cause the NAD to reauthenticate the client using the RADIUS server. This reauthentication makes use of the user credentials stored in the session cache. A new access-accept is returned to the NAD with the configured network access.
Note "NetworkAccess:UseCase=GuestFlow" applies for Active Directory and LDAP users logging in as guest users.
Wired NAD Interaction with Local WebAuth
The Wired NAD with Local WebAuth flow follows these steps:
1. Cisco ISE requires a login.html file with HTML redirect, to be uploaded to the NAD. This login.html is returned to the client browser for any HTTP/HTTPS request made.
2. The client browser in turn is redirected to the Cisco ISE guest portal where the user's credentials are submitted.
3. After the AUP and change password is processed (if configured in the Multi-Portal configuration), the guest portal redirects the client browser to post the user credentials on to the NAD.
4. The NAD makes a RADIUS request to the Cisco ISE to authenticate and authorize the user.
Switch Configuration
HTML code for the login.html page is listed below. The IP address and port values must be changed to those being used by the Cisco ISE Policy Services nodes. The default port is 8443.
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<title>ISE Guest Portal</title>
<meta Http-Equiv="Cache-Control" Content="no-cache">
<meta Http-Equiv="Pragma" Content="no-cache">
<meta Http-Equiv="Expires" Content="0">
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
<meta http-equiv="REFRESH"
content="0;url=https://ip:port/guestportal/portal.jsp?switch_url=wired">
<a href="https://ip:port/guestportal/portal.jsp?switch_url=wired">ISE Guest Portal</a>
To use web-based authentication, you must enable the HTTP server within the switch. You can enable the server for either HTTP or HTTPS. To do so, use the following commands:
Command
|
Purpose
|
ip http server
|
Enables the HTTP server. The web-based authentication feature uses the HTTP server to communicate with the hosts for user authentication.
|
ip http secure-server
|
Enables HTTPS server.
|
Additional pages for success, expiry, and failure can also be upload to the NAD. These pages can contain any HTML the client desires, there are no Cisco ISE specific information required here.
Configure web authentication to display four substitute HTML pages to the user in place of the switch default HTML pages during web-based authentication.
To specify the use of your custom authentication proxy web pages, first store your custom HTML files on the switch flash memory. To copy your HTML files to the switch flash memory, run the following command on the switch:
copy tftp/ftp flash
After copying your HTML files to the switch, perform the following task in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
ip admission proxy http login page file device:login-filename
|
Specifies the location in the switch memory file system of the custom HTML file to use in place of the default login page. The device: is flash memory.
|
Step 2
|
ip admission proxy http success page file device:success-filename
|
Specifies the location of the custom HTML file to use in place of the default login success page.
|
Step 3
|
ip admission proxy http failure page file device:fail-filename
|
Specifies the location of the custom HTML file to use in place of the default login failure page.
|
Step 4
|
ip admission proxy http login expired page file device:expired-filename
|
Specifies the location of the custom HTML file to use in place of the default login expired page.
|
When configuring customized authentication proxy web pages, follow these guidelines:
•To enable the custom web pages feature, specify all four custom HTML files. If you specify fewer than four files, the internal default HTML pages are used.
•The four custom HTML files must be present on the flash memory of the switch. The maximum size of each HTML file is 8 KB.
•Any images on the custom pages must be on an accessible HTTP server. Configure an intercept ACL within the admission rule.
•Any external link from a custom page requires configuration of an intercept ACL within the admission rule.
•To access a valid DNS server, any name resolution required for external links or images requires configuration of an intercept ACL within the admission rule.
•If the custom web pages feature is enabled, a configured auth-proxy-banner is not used.
•If the custom web pages feature is enabled, the redirection URL for successful login feature is not available.
•To remove the specification of a custom file, use the no form of the command.
Because the custom login page is a public web form, consider these guidelines for the page:
•The login form must accept user entries for the username and password and must show them as uname and pwd.
•The custom login page should follow best practices for a web form, such as page timeout, hidden password, and prevention of redundant submissions.
This example shows how to configure custom authentication proxy web pages:
Switch(config)# ip admission proxy http login page file flash:login.htm
Switch(config)# ip admission proxy http success page file flash:success.htm
Switch(config)# ip admission proxy http fail page file flash:fail.htm
Switch(config)# ip admission proxy http login expired page flash flash:expired.htm
This example shows how to verify the configuration of a custom authentication proxy web pages:
Switch# show ip admission configuration
Authentication proxy webpage
Login page : flash:login.htm
Success page : flash:success.htm
Fail Page : flash:fail.htm
Login expired Page : flash:expired.htm
Authentication global cache time is 60 minutes
Authentication global absolute time is 0 minutes
Authentication global init state time is 2 minutes
Authentication Proxy Session ratelimit is 100
Authentication Proxy Watch-list is disabled
Authentication Proxy Auditing is disabled
Max Login attempts per user is 5
Cisco ISE Guest Service Components
The Cisco ISE Guest service is composed of three main components:
Guest User
The guest user is the person who needs a guest user account to access the network.
Sponsor
The sponsor user is the person who creates the guest user account. This person is often an employee of the organization. For example, a lobby ambassador who creates and manages guest user accounts through a sponsor-oriented web portal. Cisco ISE authenticates sponsors through a local database, or through external Lightweight Directory Access Protocol (LDAP) or Microsoft Active Directory identity stores.
Admin
The admin user is the administrator who configures and maintains the Cisco ISE appliance.
Cisco ISE Guest Service Applications
The Cisco ISE Guest Services consists of three applications:
•Cisco ISE Admin Portal
•Sponsor Portal
•Guest User Portal
Cisco ISE Admin Portal
The admin portal facilitates in configuring global policies for the sponsor and guest users. You can configure user groups and policies from the admin portal. From the Cisco ISE Admin portal you can configure the following:
•Sponsor Groups.
•Sponsor group policies.
•General settings like purge and port.
•Sponsor portal settings like the language templates, sponsor portal customization, sponsor authentication source.
•Guest settings like username policy, password policy, guest portal policy, guest details policy, multi-portal settings, time profiles.
•Client uploadable multi portals.
Sponsor Portal
The sponsor portal facilitates in creating and managing guest user accounts. The sponsor portal allows you to perform the following functions:
•Creating, editing, deleting, suspending, reinstating guest user accounts.
•Viewing guest details.
Guest User Portal
The Guest User Portal facilitates the guest user login and consists of the following elements.
•Guest User Login screen with username and password fields.
•Accept Use Policy screen. This is an optional Terms of Use agreement.
•Required Password Change screen, which is optional at first login and later with configurable password expiration.
•Allow Password Change screen where the user can optionally change their password.
•Self Registration screen, which is an optional screen allows guests to set up their own user account.
•Device Registration.
Guest Licensing
Guest services are available in Cisco ISE with both basic and advanced licensing. When you first install Cisco ISE, you must enter a license through the Admin user interface. Until this license is entered both the Guest and Sponsor portals will return a HTTP 503 error response, suggesting that the service is not available.
For more information on Cisco ISE licensing, see Chapter 11, "Managing Licenses."
Guest High Availability and Replication
The Cisco ISE guest services make use of the Distributed Management System of the Cisco ISE to allow multiple Cisco ISE nodes to work in a deployment. In this deployment a single node is the master or the primary node where configurations are made for all of the nodes in the deployment. Configurations made on the primary node are replicated to the secondary nodes.
You must register a secondary node with the designated primary node in the deployment. Once a node is registered the primary database is replicated to the secondary and the secondary restarts as a node in the deployment.
The Cisco ISE guest services function on either a primary or secondary. When running on a secondary, changes to the guest user accounts made through the Guest or Sponsor portals are propagated to the primary for replication to the entire deployment.
Guest portals must be located on the same secondary nodes where the Cisco ISE Network Access is configured to handle RADIUS requests in the NAD.
For example, if node A is used to handle RADIUS requests for a NAD, the Guest portal must also be enabled on the same node A for the guest services to work correctly.
See "Guest Service Control" section for details on enabling guest services on a node.
The Sponsor portal should be allowed to work on any node in a deployment, as long as that node also has Policy Services functionality enabled. For Sponsor portal updates to occur, the primary node with Administration persona must be online. If the node with Administration persona is offline, you can only view the account details. You cannot make any changes to the account.
The Guest portal can run on a node that assumes the Policy Services persona when the primary node with Administration persona is offline. However, it has the following restrictions:
•Self registration is not allowed
•Device Registration is not allowed
•The AUP is shown at every login even if first login is selected
•Change Password is not allowed and accounts are given access with the old password.
•Maximum Failed Login is not be enforced
You can make Guest administration user interface action only from the primary Admin user interface. All configuration made for guest service is the same for all nodes in the deployment.
Multiportal uploads to the primary is replicated to the secondary nodes and installed as part of the standard data replication system.
Guest and Sponsor portal port number configuration is replicated to secondary nodes and the secondary node is restarted once the replication is complete.
Note The whole deployment uses the same configuration for the portal ports.
Guest Service Control
The Guest and Sponsor portal can be disabled on a Cisco ISE node through the Cisco ISE Admin user interface.
To enable or disable Guest and Sponsor portals on any node, complete the following steps:
Step 1 From the Cisco ISE Administration interface, choose Administration > System > Deployment
Deployment Nodes page appears, displaying all the Cisco ISE nodes in the deployment.
Step 2 Select the node you wish to modify and choose Edit.
Step 3 Under the Policy Services section, check or uncheck Enable Session Service check box. This will enable or disable the Guest and Sponsor services portal.
Operating System and Browser Support
Refer to the Cisco Identity Services Engine Network Component Compatibility document for information on operating systems and browsers supported by the Cisco ISE Guest services.
Configuring Guest Policy Conditions
Cisco ISE provides a way to create conditions that are individual, reusable policy elements that can be referred from other rule-based policies. You can create conditions from within the policy pages and as separate policy elements to be reused by other types of Cisco ISE policies such as Sponsor group or Client Provisioning policies. Whenever a policy is being evaluated, the conditions that comprise it are evaluated first.
The guest simple and compound conditions are used while you create sponsor group policies.
Simple Conditions
Simple conditions consist of an attribute, an operator, and a value. You can create simple conditions from within the policy pages and also as separate policy elements that can be reused in policies. Cisco ISE allows you to create, edit, and delete simple authentication conditions. This page lists all the simple authentication policy conditions that you have defined in Cisco ISE.
See "Configuring Policy Elements Conditions" section on page 16-16, for more detailed information.
See "Creating Simple Conditions" section, for information on how to define simple conditions.
Related Topics
•Creating Simple Conditions
•Creating a New Sponsor Group Policy
Creating Simple Conditions
To create simple conditions as separate policy elements, complete the following steps:
Step 1 Choose Policy > Policy Elements > Conditions.
Step 2 From the left navigation pane, click the greater-than sign ">" next to Guest.
Step 3 From the left navigation pane, click Simple Conditions.
The Guest Simple Conditions page appears.
Step 4 Click Add to add a new condition.
Step 5 Enter the following information:
•Name—Name of the reusable condition.
•Description—An optional description for the condition.
•Attribute—Choose the attribute on which you want to build the condition. Click the drop-down arrow to select the attribute from the dictionary.
•Operator—Choose the operator from the drop-down list box. This list box is populated only after you select the attribute.
•Value—Select a value from the drop-down list box. This list box is populated only after you select the attribute.
Note For some attributes, you can enter the value.
Step 6 Click Submit.
You can now use this condition in creating Sponsor Group Policies.
Next Step
See the "Creating a New Sponsor Group Policy" section for information on how to define a sponsor group policy using the simple conditions that you have created.
Compound Conditions
Compound conditions are made up of two or more simple conditions. You can create compound conditions as reusable objects from within the policy creation page or from the Conditions page. This page lists all the compound conditions that you have defined in Cisco ISE.
See "Configuring Policy Elements Conditions" section on page 16-16, for more detailed information.
See "Creating Compound Conditions" section for information on how to create compound conditions.
Related Topics
•Creating Compound Conditions
•Creating a New Sponsor Group Policy
Creating Compound Conditions
To create a compound condition from the Conditions page, complete the following steps:
Step 1 Choose Policy > Policy Elements > Conditions.
Step 2 From the left navigation pane, click the greater-than sign ">" next to Guest.
Step 3 From the left navigation pane, click Compound Conditions.
The Guest Compound Conditions page appears. This page lists any compound conditions that have been defined.
Step 4 Click Add to add a new compound condition.
Step 5 Enter a name for the compound condition. You can enter an optional description.
Step 6 Click Select Existing Condition from Library to select an existing simple condition or click Create New Condition to select an attribute, operator, and value from the expression builder.
a. If you have chosen to create a new condition, from the Select Attribute drop-down list box, choose an attribute from the dictionary based on which you want to create a condition.
b. After you have selected an attribute:
–Choose an operator (Equals, Not Equals, Matches, and so on) from the drop-down box.
–Choose the value from the drop-down list box, if available or enter a value in the text box.
–To save this condition to be reused in other policies, click Add Condition to Library from the Actions button that appears in the same row.
–Enter a name for this condition in the Condition Name text box and click the () icon.
The condition is saved as a simple condition and will be available for use in other policies.
Step 7 To add more conditions, click Actions at the end of this row.
Step 8 Click Add Attribute/Value to create a new condition or click Add Condition from Library to add an existing simple condition.
Step 9 Select the operand from the drop-down list box. You can select either AND or OR and the same operand will be used between all the conditions in this compound condition.
Step 10 Repeat the process from Step 5 to add more conditions.
Step 11 After you have added all the conditions, click Submit to create this compound condition.
Next Step
See the "Creating a New Sponsor Group Policy" section for information on how to define a sponsor group policy using the compound conditions that you have created.
Sponsor Group Policy
The sponsor portal processes the sponsor group policy that allows you to log into the sponsor portal. The sponsor portal obtains the guest sponsor group from the matching sponsor group policy that allows you to access the sponsor portal. The guest sponsor groups contain a set of permissions and user settings that enable you to access the sponsor portal when you log into the sponsor portal. The sponsor portal uses the access permissions in the selected guest sponsor group to limit access within the portal. If your credentials fail, or if the sponsor group policy does not match the user settings that are defined for you when you log into the sponsor portal, then the portal returns you to the Sponsor Portal Login page.
A sponsor group policy contains one or more user roles and identity groups. It also contains one or more attribute conditions that allow you to assign the guest sponsor group. The conditions that are used in the sponsor group policy are the attributes that are selected from the dictionary attribute. One or more sponsor group policies assign you to the guest sponsor group.
A internal user that you create and store in the Cisco ISE database, and that is locally assigned to a user role or an identity group, can be a sponsor user. For the internal user to be identified as a sponsor user, the user needs to be assigned to a guest sponsor group. If you assign the internal user to a user role or identity group, and the internal user possesses the attribute conditions that are defined in the sponsor group policy, then the internal user is assigned to the guest sponsor group that is selected in the sponsor group policy.
Internal users are mapped to sponsor groups by assigning an identity group role that is used in a sponsor group policy. If both the identity group role and the conditions of the sponsor group policy match the internal user, that user will be mapped to the sponsor group associated with that sponsor group policy. For more information on how to map identity groups to sponsor groups, see "Mapping Active Directory Groups to Sponsor Groups" section.
The sponsor user can also originate from an external identity store like LDAP or Active Directory. For the external user to be identified as a sponsor user, the attributes from the external identity store need to match the conditions in the sponsor group policy that map the external user to a local guest sponsor group. If the external user possesses the attribute conditions that are defined in a sponsor group policy, then the user is assigned to the guest sponsor group that is selected in the sponsor group policy.
The Cisco ISE deployment contains the following guest sponsor groups by default:
•SponsorAllAccount—contains a set of permissions by default that allow you to perform the tasks on all the guest accounts.
•SponsorGroupOwnAccounts—contain a set of permissions that allow you to perform the tasks on the guest accounts that you own.
•SponsorGroupGrpAccounts—contains a set of permissions that allow you to perform the tasks on the guest accounts that you own, as well as all guest accounts that belong to the sponsors associated to the same sponsor group.
You can also create your own sponsor group and associate it to any identity group in the sponsor group policy.
Related Topics
Creating a New Sponsor Group Policy
Creating a New Sponsor Group Policy
Prerequisites:
Before you begin this procedure you should have understood and created Simple Conditions and Compound Conditions.
To create a new sponsor group policy, complete the following steps:
Step 1 Choose Administration > Guest Management > Sponsor Group Policy.
Step 2 Click Actions to select either Insert New Rule Above or Insert New Rule Below.
A new policy entry appears in the position you designated in the Sponsor Group Policy window.
Step 3 Enter values for the following sponsor policy fields:
•Rule Name—Enter a name for the new policy.
•Identity Groups—Choose a name for the identity group associated with the policy.
–Click + ("plus" sign) to display a drop-down list of group choices, or choose Any for the policy for this identity group to include all users.
•Other Conditions—Choose the types of conditions or attributes for the identity group associated with the policy. Click + next to Condition(s) to display the following list of condition and attribute choices that you can configure:
–Select Existing Condition from the Library—This lets you select a Condition Name option from the pull-down list (Simple Conditions, Compound Conditions, or Time and Date Conditions) as needed.
–Create new condition (Advanced option)—This displays a list of dictionaries that contain specific attributes related to the dictionary type.
•Sponsor Group—Choose the sponsor group to associate with this sponsor group policy.
–Click + next to Sponsor Group to display a drop-down list of sponsor group choices. Select a group option.
Step 4 Click Save to save your changes to the Cisco ISE system database and create this new sponsor group policy.
Modifying an Existing Sponsor Group Policy
To modify an existing sponsor group policy, complete the following steps:
Step 1 Choose Administration > Guest Management > Sponsor Group Policy.
Step 2 To choose the sponsor group policy you want to modify, click Actions for that policy row and select Duplicate above or Duplicate below.
A duplicate policy entry appears in the Standard panel of the Sponsor Group Policy window (either above or below the existing policy that you selected).
Step 3 Enter a new name for this policy in the Rule Name field.
Step 4 Modify the desired values to create the new sponsor group policy in the corresponding fields by selecting different option choices.
Step 5 Click Save to save your changes to the Cisco ISE database, which creates this new sponsor group policy.
Deleting an Existing Sponsor Group Policy
To delete an existing authorization policy, complete the following steps:
Step 1 Choose Administration > Guest Management > Sponsor Group Policy.
Step 2 To select the sponsor group policy you want to delete, click Actions for that policy row and choose Delete.
A confirmation dialog appears in the Standard panel of the Sponsor Group Policy window.
Step 3 Click OK to confirm that you want to delete the sponsor group policy.
Step 4 Click Save to save your changes to the Cisco ISE system database and delete this sponsor group policy.
Note If you do not click Save, you will only delete the sponsor group policy locally.
Related Topics
Sponsor Group Policy
Sponsor Groups
Guest sponsor groups contain the permissions and settings for the sponsor user. Sponsor users belonging to a particular sponsor group have a certain set of permissions and settings when logged into the sponsor portal. You can set role-based permissions for sponsors to allow or restrict access to different functions, such as creating accounts, modifying accounts, and sending account details to guests by email or short message service (SMS).
For example, if you want a set of sponsors to be unable to login for a short period of time while some configuration is being changed, you can set the sponsor group permission to prevent login. This way you can restrict a set of sponsor users from logging in without having to remove the sponsor group.
This section describes the procedures for:
•Creating and Editing Sponsor Groups
•Deleting the Sponsor Group
Creating and Editing Sponsor Groups
To create a sponsor group, complete the following steps:
Step 1 From the Cisco ISE Administration interface, choose Administration > Guest Management > Sponsor Groups, which displays the Guest Sponsor Groups page.
Step 2 Click one of the following:
•Add—To create a new sponsor group
•Edit—To edit an existing sponsor group
Step 3 Give the name and description for the new sponsor group under the General tab.
Step 4 Complete the following settings under the Authorization Levels tab:
a. Set Yes or No permission for the following:
–Allow Login
–Create Accounts
–Create Bulk Accounts
–Create Random Accounts
–Import CSV
–Send Email
–Send SMS
–View Guest Password
–Allow Printing Guest Details
b. Choose one of the following options for View/Edit Accounts:
–No—Sponsors are not allowed to edit any guest accounts.
–All Accounts—Sponsors are allowed to edit/view all guest accounts.
–Group Accounts—Sponsors are allowed to edit guest accounts created by anyone in the same sponsor user group.
–Own Account—Sponsors are allowed to edit only the guest accounts they created.
c. Choose one of the following options for Suspend/Reinstate Accounts:
–No—Sponsors are not allowed to suspend any guest accounts.
–All Accounts—Sponsors are allowed to suspend or reinstate all guest accounts.
–Group Accounts—Sponsors are allowed to suspend guest accounts created by anyone in the same sponsor user group.
–Own Account—Sponsors are allowed to suspend only the guest accounts they created.
d. Account Start Time—This setting restricts the number of days the sponsor can specify for starting the guest account. This is applicable only for the Start End type of time profile.
e. Maximum Duration of Account—This setting specifies the maximum duration for which a guest account can be active. The expiration date is based on the maximum duration of the account or the time profile duration, whichever is minimum. This value overrides the maximum duration value set by the sponsor during the creation of the guest account when this value is less than the one specified in the time profile.
Step 5 Choose the guest roles that the sponsor group user would be allowed to assign to the guest user, under the Guest Roles tab.
Guest roles allow a sponsor to assign different levels of access to a guest account. These roles are used in the authorization policies to relate guest user accounts to identity groups.
Step 6 Choose the following time profiles that the sponsor group user would be allowed to assign to the guest accounts, under the Time Profiles tab:
•DefaultOneHour—The guest user can login within one hour of the account creation, after which the account expires. This means that the account start time is equal to the user creation time and end time is one hour from the start time.
•DefaultFirstLogin—The account start time starts when the guest user first logs in to the guest portal. The end time depends on the configuration which is set in that time profile.
•DefaultStartEnd—The sponsor can select both the account start and end time.
Time profiles provide a way to give different levels of time access to different guest accounts. Sponsors under any sponsor group do not have permission to make any changes to the time profiles.
Step 7 Click Submit.
For More Information
See "Configuring Network Access and Sponsor Users" section on page 4-9 for more information on guest roles.
See "Time Profiles" section for more information on time profiles.
Related Topics
•Sponsor Groups
•Deleting the Sponsor Group
Deleting the Sponsor Group
To delete sponsor groups, complete the following steps
Step 1 From the Cisco ISE Administration interface, select Administration > Guest Management > Sponsor Groups.
Step 2 Check the check box to select the sponsor group(s) to be deleted.
Step 3 Click Delete.
Note Sponsor groups that are in use in a sponsor group policy cannot be deleted.
For More Information
See "Sponsor Group Policy" section for more information on sponsor group policy.
Related Topics
•Sponsor Groups
•Creating and Editing Sponsor Groups
Mapping Active Directory Groups to Sponsor Groups
Prerequisite
Before beginning this task, you should have successfully understood and performed Configuring Active Directory Groups, page 5-9.
To map the Active Directory (AD) groups to the sponsor groups:
Step 1 Choose Administration > Guest Management > Sponsor Group Policy.
The Sponsor Group Policies page appears.
Step 2 Enter values for the following sponsor policy fields:
•Rule Name—Enter a name for the new policy.
•Identity Groups—Choose Any as the Identity Group since there is no group mapping with the internal groups.
•Other Conditions—Create a condition that maps the external groups to one of the populated groups. When you create the condition you will find a dictionary entry for the AD identity store that you would have created while configuring AD.
•Sponsor Group—Select the Sponsor Group with you want this AD condition to map.
Step 3 Click Save.
Related Topics
•Sponsor Group Policy
•Creating a New Sponsor Group Policy
•Sponsor Groups
Creating Sponsor Users
To be able to log into the Sponsor portal, you must first create a sponsor user. There are no predefined sponsor users in Cisco ISE. You must create new sponsor user and assign them to one of the predefined sponsor groups. Refer to the section Configuring Network Access and Sponsor Users, page 4-9 for detailed steps on how to create sponsor users.
See "Sponsor Groups" section for more information on sponsor groups.
Next Step
See "Setting Ports for the Sponsor and Guest Portals" section for information on how to assign ports for the Sponsor and Guest portals.
Creating Guest Users
See the Cisco Identity Services Engine Sponsor Portal User Guide, Release 1.0 for detailed steps on how to create guest users.
SMTP Server Settings for Email Notifications
You must set up a Simple Mail Transfer Protocol (SMTP) server to send email notification to the guest user. This server is also used to send email to the short message service (SMS) gateway to deliver the SMS text message.
To set the SMTP server, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > System > Settings > SMTP Server. The SMTP Server Settings page appears.
Step 2 In the SMTP Server field, type the host name of the outbound SMTP server to which you need to deliver email. For the email notification to function appropriately, the SMTP host server must be accessible from the Cisco ISE server. The maximum length for this field is 60 characters.
Step 3 Choose the Enable Notifications option to enable mail functionality globally.
Step 4 Choose Use email address from Sponsor, to send guest notification email from the email address of the sponsor.
Step 5 If you want to specify a different email address, choose Use Default email address and type the email address from which you want guest notification emails to be sent (for example, username@domain.com).
Step 6 Click Save.
For More Information
See Cisco Identity Services Engine Sponsor Portal User Guide, Release 1.0 for more information on the sponsor portal and how to create guest users.
Related Topic
•Setting Ports for the Sponsor and Guest Portals
•Purging Guest User Records
General Settings
You can configure general settings like the port and SMTP server settings.
•Setting Ports for the Sponsor and Guest Portals
•Purging Guest User Records
Setting Ports for the Sponsor and Guest Portals
You can configure whether sponsors and guests access the portal using HTTP or HTTPS. You can also specify the port number used for each of the portals and protocols.
To configure the protocols and port numbers for the sponsor and guest portals, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > Guest Management > Settings > General > Ports.
Step 2 Under the Guest Portal Settings section, check the check box for HTTP or HTTPS protocols.
Step 3 Assign port numbers for the HTTP and HTTPS protocols.
Step 4 Repeat steps 2 and 3 for the settings in the Sponsor Portal Settings section.
Step 5 Click Save.
You must select at least one protocol for each of the portals. You must also set port numbers for the selected protocols. The default settings for each of the sponsor and guest portals are HTTP on port 8080 redirecting to HTTPS and HTTPS on port 8443. The Admin user interface runs on HTTP port 80 and HTTPS port 443.
To access the sponsor portal type:
http://ip address:8080/sponsorportal or https://ip address:8443/sponsorportal
To access the guest portal type:
http://ip address:8080/guestportal/Login.action or https://ip address:8443/guestportal/Login.action
If both HTTP and HTTPS protocols are selected within a portal section, the HTTP protocol is set to redirect to the HTTPS protocol for each client request.
Each of the Portal settings should either have unique port configurations for both the protocols or the two protocol settings must be equal to the values in another Portal.
For example, the administrator portal can be on port 80 and 443 and the sponsor portal can be on port 80 and 443, with guest running on port 8080 and 8443. But you will not be able to configure administrator portal on port 80 and 443 with sponsor and guest portals on port 80 and 8443. This configuration will cause a port conflict with the sponsor and guest portals on port 80 and 443.
For More Information
See Cisco Identity Services Engine Sponsor Portal User Guide, Release 1.0 for more information on the sponsor portal.
Related Topics
Purging Guest User Records
Purging Guest User Records
You can purge the expired guest user records from the system. You can configure the purge settings for an automatic purge at a regular interval of time or you can do a manual purge by clicking the Purge Now button.
To schedule the purge of expired guest user records, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > Guest Management > Settings > General > Purge.
The Purge Settings page is displayed.
Step 2 To schedule a purge operation, check the Enable purge settings for expired guest accounts check box.
Step 3 Configure the following available options:
a. Enter the purge interval, in number of days. Valid range is 1-365.
b. Specify the hour of the day when the purge should occur.
Date of last purge displays the date and time when the last purge operation occurred.
Date of next purge displays the date and time when the next purge operation is scheduled to occur.
Step 4 To immediately execute a purge of expired guest user records, click Purge Now.
This executes a purge manually even if Enable purge check box is not checked. This option provides you the freedom to purge records whenever you seem fit.
Step 5 Click Save.
There might be a 15 minute sleep cycle after the scheduled purge time. After this the system checks whether it is the correct hour and date to start the purge. Due to this sleep cycle, it takes up to 15 minutes for the purge to start after configured hour.
If the Cisco ISE server is down and the purge operation did not execute, it will not run again until the next time the server is running at the correct hour.
By default, the purge operation is enabled and executes every 15 days, at 23:00 hrs.
Note Purge only runs on primary or standalone nodes.
Related Topics
Setting Ports for the Sponsor and Guest Portals
Sponsor Settings
You can configure sponsor settings under this sub menu. The following configuration options are available here:
•Authentication Source
•Portal Customization
•Configuring Language Templates
Authentication Source
To allow a sponsor user to log into the sponsor portal, you have to choose an identity store sequence. This sequence is used with the login credentials of the sponsor to authenticate and authorize the sponsor for access to the sponsor portal. The sequence can include external stores as well as the local Cisco ISE identity store. The identity store sequence defines which stores should be accessed and in what order they should be accessed to resolve the authentication of a sponsor user.
There is one sequence value used for all the sponsor logins. It is up to the administrator to set up one of these sequences at install time.
By default, internal users are allowed to access the sponsor portal. You can set an identity store sequence to over ride this default setting. Also, internal NSF users must be assigned to an identity group that is related to a sponsor group through a sponsor group policy, to gain access to the sponsor portal.
Note External sponsors will not have access to the sponsor portal until the identity store sequence value is selected.
Note When the primary node with Administration persona is down, Sponsor administrators cannot create new guest user accounts. During this time, the guest and sponsor portals will provide read-only access to already created guest and sponsor users respectively. Also, a sponsor admin who has never logged into the sponsor portal before the primary Administration node went offline, will not be able to login to the sponsor portal until a secondary Administration node is promoted or the primary Administration node becomes available.
Prerequisite
Before beginning this task, you should have successfully completed Creating Identity Source Sequences, page 5-49.
To set the identity store sequence for sponsor authentication, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > Guest Management > Settings > Sponsor > Authentication Source.
Step 2 From the Identity Store Sequence drop-down list, choose the sequence to be used for the sponsor authentication.
Step 3 Click Save.
For More Information
See Cisco Identity Services Engine Sponsor Portal User Guide, Release 1.0 for more information on the sponsor portal.
Related Topics
•Portal Customization
•Configuring Language Templates
Portal Customization
You can customize the look and feel of the sponsor portal from the admin user interface. You can change settings like the background color, and the company logo of the sponsor portal.
To customize the sponsor portal, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > Guest Management > Settings > Sponsor > Portal Customization. This displays the Sponsor Portal Customization page.
Step 2 Customize the settings of the following screens:
•Login Page Logo
•Login Page Background Image
•Banner Logo
•Banner Background Image
•Login Background Color
•Banner Background Color
•Content Background Color
Step 3 Click Save.
Login Page Logo
Use this to change the logo on the Login page of the sponsor portal (Figure 20-1). You have the option to choose the default Cisco logo or upload a custom logo.
To upload a logo, complete the following steps:
Step 1 Select Upload New File from the drop-down menu.
Step 2 Click Browse and choose a file.
Step 3 Click Open.
Recommended size for the login page logo is:
•Height: 16-480 pixels
•Width: 16-480 pixels
Figure 20-1 Sponsor Portal Login Page
Login Page Background Image
Use this to change the background image on the login page of the sponsor portal. You have the option to choose the default Cisco background or upload a custom background.
To upload a background, complete the following steps:
Step 1 Select Upload New File from the drop-down menu.
Step 2 Click Browse and choose a file from your local machine.
Step 3 Click Open.
Banner Logo
Use this to change the banner logo of the Sponsor portal (Figure 20-2). You have the option to choose the default Cisco logo or upload a custom logo.
To upload a banner logo, complete the following steps:
Step 1 Select Upload New File from the drop-down menu.
Step 2 Click Browse and choose a file from your local machine.
Step 3 Click Open.
Figure 20-2 Banner in the Sponsor Portal
Banner Background Image
Use this to change the banner background image of the sponsor portal. You have the option to choose the default Cisco background image or upload a custom image.
To upload an image, complete the following steps:
Step 1 Select Upload New File from the drop-down menu.
Step 2 Click Browse and choose a file from your local machine.
Step 3 Click Open.
Login Background Color
To change the background color of the login page of the sponsor portal.
To set the login background color, complete the following steps:
Step 1 Enter the color value as a RGB (Red Green Blue) hexadecimal value in HTML color format such as FFFFFF.
Each pair of hexadecimal digits expresses an RGB value from 0-255.
Step 2 Click the Show Color button to display the representative color.
Banner Background Color
To change the background color of the banner in the sponsor portal.
To set the login background color, complete the following steps:
Step 1 Enter the color value as a RGB (Red Green Blue) hexadecimal value in HTML color format such as FFFFFF.
Each pair of hexadecimal digits expresses an RGB value from 0-255.
Step 2 Click the Show Color button to display the representative color.
Content Background Color
To change the background color of the body pages in the sponsor portal (Figure 20-3).
To set the login background color of the body pages, complete the following steps:
Step 1 Enter the color value as a RGB (Red Green Blue) hexadecimal value in HTML color format such as FFFFFF.
Each pair of hexadecimal digits expresses an RGB value from 0-255.
Step 2 Click the Show Color button to display the representative color.
Figure 20-3 Body Page in the Sponsor Portal
Note The background image of the login page or the banner will always override the background color unless the background image is transparent.
For More Information
See Cisco Identity Services Engine Sponsor Portal User Guide, Release 1.0 for more information on the sponsor portal.
Related Topics
•Authentication Source
•Configuring Language Templates
Configuring Language Templates
The administrator can use the language templates to customize the sponsor portal user interface and the guest account notification text.
A default English template is available in the Cisco ISE Admin portal. If you want to change the default language presentation of the sponsor portal or the language and text of the guest notifications, you can add new templates. You can customize the print, email, and short message service (SMS) templates and set the information that is printed, emailed, or text-messaged to guests.
To use the Language templates properly, the sponsor should map to the correct template in the Sponsor > Settings Customizations page in the sponsor portal.
For more details on sponsor portal, see the Cisco Identity Services Engine Sponsor Portal User Guide, Release 1.0.
This section describes the procedures for:
•Adding and Editing a Language Template
•Deleting an Existing Language Template
Adding and Editing a Language Template
To add or edit a language template, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > Guest Management > Settings > Sponsor > Language Template. This displays the Sponsor Portal Language Templates page.
Step 2 Click one of the following:
•Add—To create a new language template
•Edit—To edit an already existing language template
Step 3 Type the Name and Description for the new language template.
Step 4 Use the following templates to modify the text of the sponsor portal pages:
•Configure Template for View All Guest Accounts
•Configure Template for Create Single Guest Account
•Configure Template for Create Multiple Guest Accounts
•Configure Template for Create Random Guest Accounts
•Configure Template for Import Guest Accounts
•Configure Template for Bulk Create Status Display
•Configure Template for Bulk Print Tabular Display
•Configure Template for Sponsor Settings Customizations
•Configure Template for Date/Time Formats
Step 5 Use the following templates to modify the text of guest notifications:
•Configure Template for Email Notification
•Configure Template for SMS Text Message Notification
•Configure Template for Print Notification
Step 6 Use the following templates to modify the text of the error and popup messages:
•Configure template for Info/Error Messages
•Configure template for Popup Dialog Messages
Step 7 Make the desired changes in each of the templates.
Step 8 Click Submit.
Some example configurations are described in the following sections:
•Configuring a Template to Create a Single Guest Account
•Configuring a Template for Guest Notification
Related Topics
•Configuring Language Templates
•Deleting an Existing Language Template
Deleting an Existing Language Template
To delete a language template, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > Resources > Templates > Language Templates. The Sponsor Portal Language Templates page is displayed.
Step 2 Check the check box to select the template that you want to delete.
Step 3 Click Delete.
Note You cannot delete the default English language template.
Related Topics
•Configuring Language Templates
•Adding and Editing a Language Template
Configuring a Template to Create a Single Guest Account
The Create Single Guest Account template includes the fields that appear in the Create Single Guest Account page in the sponsor portal. You can customize each field name and button in the manner and language in which you want them to appear in the sponsor portal.
To configure the Create Single Guest Account template, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > Guest Management > Settings > Sponsor > Language Templates. The Sponsor Portal Language Templates page is displayed.
Step 2 Check the check box to select the template that you want to edit.
Step 3 Click Edit.
The Edit Language Template page appears.
Step 4 Click Configuring Template for Create Single Guest Account button.
Step 5 Edit the desired fields.
Step 6 Click Save.
Related Topics
•Configuring a Template for Guest Notification
•Configuring Language Templates
•Adding and Editing a Language Template
•Deleting an Existing Language Template
Configuring a Template for Guest Notification
When a guest account is created, the details of the account need to be passed from the sponsor to the guest. The Cisco ISE guest services provides the following ways to do this:
•Manually read the details to the guest from the screen.
•Print out the details out on paper.
•Send the details in an email.
•Send the details as an SMS text message.
Email and SMS text message notification require email servers to be configured.
The following sections describe how to configure different notification templates:
•Configuring a Template for Email Notification
•Configuring a Template for SMS Text Message Notification
•Configuring a Template for Print Notification
Configuring a Template for Email Notification
In the Email Notification template you can specify the subject and the body of the email that will be sent to guests for their account notification.
To configure the Email Notification template, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > Guest Management > Settings > Sponsor > Language Templates. The Sponsor Portal Language Templates page displays.
Step 2 Check the check box to select a language template.
Step 3 Click Edit.
Step 4 Click Configuring Template for Email Notification.
Step 5 Type the subject of the email in the Subject text box. This value appears as the subject of the email notification when it is sent to the guest.
Step 6 Type the email body in the Layout text box. This contains the account login information for the guest user.
The following is an example of the login information for the body of an email in an English language template:
Welcome to the Guest Portal, your username is %username% and password is %password%
The %username% and %password% strings will be replaced with the username and password values from the Guest User account.
In the email body you can use the following special variables to provide the details for the created guest account.
•%USERNAME% = The username created for the guest.
•%PASSWORD% = The password created for the guest.
•%STARTTIME% = The time from which the guest account will be valid.
•%ENDTIME% = The time at which the guest account will expire.
•%FIRSTNAME% = The first name of the guest.
•%LASTNAME% = The last name of the guest.
•%EMAIL% = The email address of the guest.
•%TIMEZONE% = The time zone of the user.
•%MOBILENUMBER% = The mobile number of the guest.
•%OPTION1% = Optional field for editing.
•%OPTION2% = Optional field for editing.
•%OPTION3% = Optional field for editing.
•%OPTION4% = Optional field for editing.
•%OPTION5% = Optional field for editing.
•%DURATION% = Duration of time for which the account will be valid.
•%RESTRICTEDWINDOW% = The time window during which the guest is not allowed to login.
•%TIMEPROFILE% = The name of the time profile assigned.
Step 7 Click Save.
Related Topics
•Configuring a Template for Print Notification
•Configuring a Template to Create a Single Guest Account
Configuring a Template for SMS Text Message Notification
In the SMS Text Message Notification template you can set the SMS gateway, the subject and the message of the SMS.
The SMS Notification uses a third-party SMS gateway that allows email messages sent to the gateway containing formatted text messages to be forwarded through SMS to the specified end user account. An example of an SMS gateway is clickatell.com. You should have a valid account with the third party. Cisco does not provide a default account. SMS messages are sent by email to this gateway with a specific format defined by the third-party gateway.
To configure the SMS Text Message Notification template, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > Guest Management > Settings > Sponsor > Language Templates.
Step 2 Select a language template.
Step 3 Click Edit.
Step 4 Click Configure Template for SMS Text Message Notification.
Step 5 Type the subject of the text SMS. This value appears as the subject of the SMS notification when it is sent to the guest.
Step 6 Type the SMS gateway in the Destination text box.
Step 7 Type the SMS body in the Layout text box. This contains the account login information for the guest user.
You can use the following special variables, which will be replaced with the details from the created guest account:
•%USERNAME% = The username created for the guest.
•%PASSWORD% = The password created for the guest.
•%STARTTIME% = The time from which the guest account will be valid.
•%ENDTIME% = The time at which the guest account will expire.
•%FIRSTNAME% = The first name of the guest.
•%LASTNAME% = The last name of the guest.
•%EMAIL% = The email address of the guest.
•%TIMEZONE% = The time zone of the user.
•%MOBILENUMBER% = The mobile number of the guest.
•%OPTION1% = Optional field for editing.
•%OPTION2% = Optional field for editing.
•%OPTION3% = Optional field for editing.
•%OPTION4% = Optional field for editing.
•%OPTION5% = Optional field for editing.
•%DURATION% = Duration of time for which the account will be valid.
•%RESTRICTEDWINDOW% = The time window during which the guest is not allowed to login.
•%TIMEPROFILE% = The name of the time profile assigned.
To send the text message to the mobile phone number of the guest, use the variable %MOBILENUMBER%. The %MOBILENUMBER% variable is replaced by the mobile phone number as entered by the sponsor.
Step 8 Click Save.
Related Topics
•Configuring a Template for Email Notification
•Configuring a Template for Print Notification
•Configuring a Template to Create a Single Guest Account
Configuring a Template for Print Notification
In the Print Notification template, you can set the guest account details, which the sponsor can bring up in a browser, print, and hand to the guest after the account is created.
To configure the SMS Text Message Notification template, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > Guest Management > Settings > Sponsor > Language Templates.
Step 2 Select a language template.
Step 3 Click Edit.
Step 4 Click Configure Template for Print Notification
Step 5 In the Page Header text box, type the header of the page that will be printed.
Step 6 In the Layout text box, type the text to be printed. This contains the account login information for the guest user.
You can use the following special variables, which will be replaced with the details from the created guest account:
•%USERNAME% = The username created for the guest.
•%PASSWORD% = The password created for the guest.
•%STARTTIME% = The time from which the guest account will be valid.
•%ENDTIME% = The time at which the guest account will expire.
•%FIRSTNAME% = The first name of the guest.
•%LASTNAME% = The last name of the guest.
•%EMAIL% = The email address of the guest.
•%TIMEZONE% = The time zone of the user.
•%MOBILENUMBER% = The mobile number of the guest.
•%OPTION1% = Optional field for editing.
•%OPTION2% = Optional field for editing.
•%OPTION3% = Optional field for editing.
•%OPTION4% = Optional field for editing.
•%OPTION5% = Optional field for editing.
•%DURATION% = Duration of time for which the account will be valid.
•%RESTRICTEDWINDOW% = The time window during which the guest is not allowed to login.
•%TIMEPROFILE% = The name of the time profile assigned.
Step 7 Click Save.
Related Topics
•Configuring a Template for Email Notification
•Configuring a Template for SMS Text Message Notification
•Configuring a Template to Create a Single Guest Account
Guest Settings
You can configure guest settings under this sub menu. The following configuration options are available here:
•Configuring Details Policy
•MultiPortal Configurations
•Configuring Guest Portal Policy
•Configuring Guest Password Policy
•Time Profiles
•Configuring Guest Username Policy
Configuring Details Policy
The details policy determines the data that the sponsor needs to enter to create a guest account. In the details page, the Cisco ISE administrator must define the fields that should appear on the Sponsor Guest User Create and Edit pages and in the Guest User Self Registration page.
To configure a details policy, complete the following steps:
Step 1 From the Cisco ISE Administration interface, select Administration > Guest Management > Settings > Guest > Details Policy.
Several fields like First Name, Last Name, Company, Email, Phone are listed as in Figure 20-4.
Step 2 Specify one of these three settings for each field:
•Mandatory—If a field is set to mandatory it is displayed on the Guest User Account Create and Edit pages and it is required for the sponsor to complete.
•Optional—If a field is set to optional it is displayed on the Guest User Account Create and Edit pages. However, the sponsor can choose not to complete the field.
•Unused—If a field is set to unused it is not displayed on the Guest User Account Create and Edit page.
There are five Additional Fields that you can use to add any additional information that you require sponsors to fill out when creating guest accounts. These are described on the Details page as Additional Fields 1 through Additional Fields 5.
Note When Create username from email address is selected in Username Policy, you can not disable Email option in Guest Details Policy. See "Configuring Guest Username Policy" section for more details.
See Dictionaries and Dictionary Attributes, page 7-1 for details on editing the field names.
Step 3 Click Submit.
Figure 20-4 Details Policy Page
Related Topics
•MultiPortal Configurations
•Configuring Guest Portal Policy
•Configuring Guest Password Policy
•Time Profiles
•Configuring Guest Username Policy
MultiPortal Configurations
Cisco ISE provides you with the ability to host multiple guest portals in the Cisco ISE server. The Guest user portal has a default Cisco look and feel. These pages are dynamically generated to offer portal features such as change password and self registration in the Login Screen.
You can use the Multi-portal configuration to upload set of GUI pages specific to your organization to handle the Login, AUP, Change Password and Self Registration. In order to access an uploaded client portal the guest portal URL must include the name of the portal specified during the upload.
You can design and upload HTML pages to define new guest portals or replace the default guest portal. These pages must use plain HTML code and must contain form actions that point to the guest portal backend servlets. You must define separate HTML pages for login, acceptable use policy (AUP), the change-password function, and self-registration.
Related Topics
•Hosting Multiple Portals
•Sample HTML Code for Creating Portal Pages
Hosting Multiple Portals
Prerequisite
Before beginning this task, you should have successfully understood and configured the following:
•Understanding Authentication Policies, page 15-1
•Configuring the Simple Authentication Policy, page 15-25
•Configuring the Rule-Based Authentication Policy, page 15-28
A predefined DefaultGuestPortal is available under Multi-Portal Configurations. This portal has the default Cisco look-and-feel and you cannot customize it. To create a customized portal, you must first begin by adding a new portal.
To host multiple portals, complete the following steps:
Step 1 From the Cisco ISE Administrator interface, choose Administration > Guest Management > Settings > Guest > Multi-Portal Configurations.
Step 2 Click Add.
Step 3 Under the General tab, give a name and description for the new portal.
The name of the portal is used to access the portal and will appear in the captive portal URL specified in the network access device (NAD) for wireless LAN controller (WLC) setups. For example, a portal with the name ClientPortal will have the following access URL:
https://ip address:port number/guestportal/portals/ClientPortal/portal.jsp
Step 4 Check or uncheck the following Guest Portal Policy Configurations:
•Allow guest users to change password. See "Change Password" section
•Require guest and internal users to change password at expiration. See "Change Password" section
•Guest users should download the posture client. See "Client Provisioning Interaction with Guest Portal" section
•Guest users should be allowed to do self service. See "Self Registration" section (If you check this option, ensure that you configure Portal policy as described in "Configuring Guest Portal Policy" section)
•Guest users should be allowed to do device registration. "Device Registration" section
Step 5 Check or uncheck Vlan Dhcp Release option and give the following values in seconds:
•Delay to Release
•Delay to CoA
•Delay to Renew
For details, see "VLAN DHCP IP Release/Renew" section
Step 6 Select one of the following options for the AUP:
•Not Used
•First Login and when AUP is changed
•Every Login
For details, see "Accept Use Policy" section
Step 7 Under the File Upload tab, upload the HTML files you have created for the Login, AUP, Change Password, and Self Registration pages. See "Sample HTML Code for Creating Portal Pages" section for creating the HTML files.
These pages can include images and other links to the upload files. All uploaded files are held in a single directory with no subdirectories. All URL references should be made as a relative reference between the upload files. You cannot run any backend scripts in the Cisco ISE server. Only HTML, HTM, JPEG, GIF, PNG, and CSS files are allowed.
Step 8 Under the File Mapping tab, identify and choose the HTML files uploaded for the particular guest pages.
This is important for the guest flow to redirect and display the appropriate client-defined portal pages during the guest login access.
The fields under File Mapping tab are grayed out or enabled based on the selections made in the General tab.
Step 9 Under the Authentication tab, choose the type of users who will be authenticated during the guest login.
Choose one of the following options:
•Guest
•Central WebAuth
•Both
In this case, Guest is the local guest user and Central WebAuth is the non-guest user. If you have a non-guest user or both a guest and non-guest user, you have to specify an identity sequence for the authentication.
If Guest is chosen the default portal only authenticates guest user accounts in the local database.
If Central WebAuth is chosen the specified identity sequence is used to check authentication for the user. This sequence can contain both a local database and external identity stores such as Lightweight Directory Access Protocol (LDAP) or Microsoft Active Directory.
If you chose to authenticate both, the user will be authenticated against the local database guest users first. If a user is not found, authentication will be attempted using the identity sequence.
For Central WebAuth to allow network access, appropriate authentication policies must be defined within Cisco ISE for the underlying RADIUS server to process authentication correctly.
Step 10 Click Submit.
The Guest portal URL for the wired and wireless local web authentication is:
https://ip:8443/guestportal/portals/NameOfPortal/portal.jsp
Where the NameOfPortal is the name of the portal as it is created during the upload.
The Guest portal redirect URL for wired CWA is:
https://ip:port/guestportal/gateway?sessionId=SessionIdValue&portal=NameOfPortal&action=cwa
The `ip' and `port' values will be updated by the RADIUS server as the URL-redirect is returned to the NAD. These values will be the IP address and port number for the Cisco ISE guest portal server.
Note The port number 8443 is configurable through Administration > Guest Management > Settings > General > Port.
Customizable Guest Portal Pages
The following are customizable Guest portal pages:
•Accept Use Policy
•Change Password
•Self Registration
•Device Registration
Accept Use Policy
This page displays the terms of use of the network, which the user must accept in order to fully enable their account. If the user does not accept the policy the user will not gain expanded network access. For guest users, the AUP can be selected to appear at first login only or at every login.
Change Password
Once the guest user or internal user has accepted the policy Cisco ISE checks if the password has expired, if so the Password Change screen is displayed. External users do not have their password expiration enforced.
To configure the guest password contents, see "Configuring Guest Password Policy" section.
To configure password policy for the internal users, see "User Password Policy" section on page 4-58.
Screens in the default portal show the password criteria for Guest or Internal Users depending on the identity of the User. You can set your own criteria in the custom portals screens.
Self Registration
The Self Registration screen appears as a link on the guest user login page. This screen allows new guest users to fill in their personal information and create a new user account. Upon submission, the user account is created and the new account information is displayed on the screen. The user can print the account information.
User accounts are created with a random generated password. This password follows the password policy that is set for the guest users. The user accounts are created with the default Guest Role and Time Profile as selected in the Guest Portal Policy page.
Device Registration
The Device Registration screen appears as a link on the guest user login page. This screen allows a guest user to register their own network devices based on the MAC address of the devices.
You can configure the maximum number of devices per user from the Guest Portal Policy page and it is a global value for the entire system. The default maximum number of devices per user is five. Lowering this value will not remove existing registered devices, it will only limit the addition of new devices. The default Device Registration page has a list of existing devices for the user. Users can add new devices or remove devices from this page.
You can also add device registration page for your custom portal. But, this page will only have the ability to add new devices. There will be no list of existing devices nor can you delete devices. These limitations exist because listing is a dynamically created page and does not allow customization.
Client Provisioning Interaction with Guest Portal
The guest user portal includes interaction with Client Provisioning application so that the client machine posture can be controlled at the time of a network access request. This interaction consists of redirecting the client browser to download a Client Provisioning agent and controlling posture before allowing full access to the network with a final user login.
You can configure custom portal to perform Client Provisioning and Posture. If you select this option, the guest login flow performs a CWA and the guest portal will be redirected to Client Provisioning after performing AUP and change password checks. In this case, the posture subsystem performs a CoA to the NAD to re-authenticate the client connection once the posture has been assessed.
Note Client Provisioning does not occur in Local Web Authentication scenarios.
If Vlan Dhcp Release is selected under Multi-Portal Configurations, posture will perform the client side IP release and renew operation.
VLAN DHCP IP Release/Renew
This affects the CWA user login flow when the network access during the final authorization switches the guest VLAN to a new VLAN. In this case, the old IP of the guest needs to be released before the VLAN change and a new guest IP needs to be requested through DHCP once the new VLAN access is in place. The Cisco ISE server redirects the guest browser to download an applet to perform the IP release renew operation.
The delay to release time should be low since it needs to occur immediately after the applet is downloaded and before the Cisco ISE server directs the NAD to re-authenticate with a CoA request. The default release value is 1 second.
The delay to CoA delays the Cisco ISE from executing the CoA. Here, enough time should be given to allow the applet to download and perform the IP release on the client. The default value is 8 seconds.
The delay to renew value is added to the IP release value and does not begin timing until the control is downloaded. The renew should be given enough time so that the CoA is allowed to process and the new VLAN access granted. The default value is 12 seconds.
For More Information
For switch configuration details and other Cisco ISE deployment information, see Chapter 9, "Setting Up Cisco ISE in a Distributed Environment."
Related Topics
•Configuring Details Policy
•MultiPortal Configurations
•Configuring Guest Portal Policy
•Configuring Guest Password Policy
•Time Profiles
•Configuring Guest Username Policy
Sample HTML Code for Creating Portal Pages
The following are some example HTML codes that you can use to create multiple guest portal pages:
•Login Form Action and Parameters
•AUP Form Action and Parameters
•Change Password Form Action and Parameters
•Self-Registration Form Action and Parameters
•Device Registration Form Action and Parameters
•Self-Service Result Form Action and Parameters
•Error Page Form Action and Parameters
•Sample style.css
Note These HTML codes reference a directory structure for a portal named demo2.
Login Form Action and Parameters
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Guest Portal Login</title>
<link href="portals/demo2/style.css" rel="stylesheet" type="text/css" />
<script language='javascript'>
<table width="100%" border="0" align="center" cellpadding="0" cellspacing="0">
<td height="107"> </td>
<td height="172" align="center" valign="middle"><table width="90%" border="0"
align="center" cellpadding="0" cellspacing="0">
<td width="45%" height="172" align="left" valign="middle"><table width="75%"
border="0" align="left" cellpadding="0" cellspacing="0">
<td width="27%"><img src="portals/demo2/logo.png" alt="" width="218"
height="63" /></td>
<td width="73%"><table width="85%" border="0" align="right"
cellpadding="0" cellspacing="0">
<td height="35" align="left" class="headding">ISE 1.0</td>
<td align="left" class="label">Guest Access</td>
<td align="left"> </td>
<td align="left" class="headding1">Version:1.0</td>
<td width="45%" align="right" valign="middle"><table width="50%" border="0"
cellspacing="0" cellpadding="0">
<form id="cuesLoginForm" method="POST"
action="/guestportal/LoginCheck.action">
<td width="32%" height="30" align="left" valign="middle"
class="label">Username :</td>
<td width="68%" align="left"><input alt="Username:" name="guestUser.name"
id="username" type="text" size="20" value=""/></td>
<td height="30" align="left" valign="middle" class="label">Password :</td>
<td align="left"><input alt="Password:" name="guestUser.password"
id="password" type="password" size="20" value=""/></td>
<td height="12" align="left" valign="middle"></td>
<td height="12" align="left"></td>
<td align="left" valign="middle"> </td>
<td align="left"><input type="submit" name="button" id="button" value="Log
In" />
<input type="hidden" name="drpPassword" id="drpPassword" />
<input type="hidden" name="drpUsername" id="drpUsername" />
<!-- <form id="doSelfService" action="/guestportal/SelfService.action">-->
<!-- <input type="hidden" id="buttonClicked" name="buttonClicked"
value=""></input>-->
<!-- <input type="hidden" id="switch_url" name="switch_url" value=""></input>-->
<!-- <input type="hidden" id="redirect" name="redirect" value=""></input>-->
<!-- <input type="hidden" id="err_flag" name="err_flag" value=""></input>-->
<!-- form for self service -->
<struts2:form id="selfServiceForm" action="SelfService.action">
<input type="hidden" id="buttonClicked" name="buttonClicked"
value="${buttonClicked}"></input>
<input type="hidden" id="switch_url" name="switch_url"
value="${switch_url}"></input>
<input type="hidden" id="redirect" name="redirect"
value="${redirect}"></input>
<input type="hidden" id="err_flag" name="err_flag"
value="${err_flag}"></input>
<struts2:form id="changePasswordForm"
action="ChangePassLoginMultiPortal.action">
<input type="hidden" id="username" name="guestUser.name"
value="${username}"></input>
<input type="hidden" id="password" name="guestUser.password"
value="${password}"></input>
<td align="left" valign="middle"> </td>
<td align="left">
<td align="left" valign="middle"> </td>
<td align="left"><a href="javascript:doChangePassword();" class="link"
>Change Password</a>
<a href="javascript:doSelf();" class="link">SelfService</a>
<a href="javascript:submitMyForm();" class="link">Device Registration</a>
<div style="padding:0 0 0 10px;">2009-2011, Sample App, Inc. All rights reserved.</div>
document.forms[0].action = "SelfService.action";
document.getElementById("buttonClicked").value =
document.getElementById("buttonClicked").value;
document.getElementById("redirect").value = document.getElementById("redirect").value;
document.getElementById("switch_url").value =
document.getElementById("switch_url").value;
document.forms[0].submit();
function doChangePassword()
//var changePasswordForm = document.getElementById("changePasswordForm");
//changePasswordForm.submit();
document.forms[0].action = "ChangePassLoginMultiPortal.action";
document.getElementById("username").value = document.getElementById("username").value;
document.getElementById("password").value = document.getElementById("password").value;
document.forms[0].submit();
document.forms[0].action = "DevRegPortalLogin.action";
document.getElementById("drpUsername").value =
document.getElementById("username").value;
document.getElementById("drpPassword").value =
document.getElementById("password").value;
document.forms[0].submit();
AUP Form Action and Parameters
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Guest Portal Login</title>
<link href="portals/demo2/style.css" rel="stylesheet" type="text/css" />
<table width="100%" border="0" align="center" cellpadding="0" cellspacing="0">
<td height="75" bgcolor="#022d4d"><table width="98%" border="0" align="center"
cellpadding="0" cellspacing="0">
<td width="15%" align="left" valign="middle"><img src="portals/demo2/logo.png"
alt="" width="157" height="44" /></td>
<td width="72%" class="headding">ISE 1.0 Guest Portal </td>
<td width="13%" align="right" valign="middle" > </td>
<td bgcolor="#ccebfe"><table width="98%" border="0" align="center" cellpadding="0"
cellspacing="0" class="content">
<td align="left" class="headding2">Acceptable Use Policy</td>
<td align="left" >Please accept the policy:<br /><br />
1. You are responsible for </br>(1) maintaining the confidentiality of the password and
</br>(2) all activities that occur under your username and password.
2. Cisco systems offers the Service for activities such as the active use of e-mail,
instant messaging, browsing the World Wide Web and accessing corporate intranets. High
volume data transfers, especially sustained high volume data transfers, are not permitted.
Hosting a web server or any other server by use of our Service is prohibited. Trying to
access someone else̢۪s account, sending unsolicited bulk e-mail, collection of other
people̢۪s personal data without their knowledge and interference with other network users
are all prohibited.
3. Cisco systems reserves the right to suspend the Service if (1) Cisco systems reasonably
believes that your use of the Service is unreasonably excessive or (2) you are using the
Service for criminal or illegal activities.
4. You do not have the right to resell this Service to a third party.
5. Cisco systems reserves the right to revise, amend or modify these Terms & Conditions,
our other policies and agreements, and aspects of the Service itself. Notice of any
revision, amendment, or modification will be posted on Cisco system̢۪s website and will
be effective as to existing users 30 days after posting same.
<form action="/guestportal/AcceptPolicy.action" method="post">
<td align="left"><input type="checkbox" name="guestUser.acceptUsePolicy"
id="guestUser.acceptUsePolicy" value="false" onclick="javascript:enableButtons()" />Accept
terms and conditions</td>
<td align="left"> </td>
<td align="left"><input type="Submit" id="acceptButton" value="Accept" />
<input type="button" id="declineButton" value="Decline"
onclick="javascript:doDeclineTerms()"/></td>
<td align="left"> </td>
<form id="declineTerms" onsubmit="return true;" action="/guestportal/DeclinePolicy.action"
method="post"><table class="wwFormTable">
<input type="hidden" id="buttonClicked" name="buttonClicked" value=""></input>
<input type="hidden" id="switch_url" name="switch_url" value=""></input>
<input type="hidden" id="redirect" name="redirect" value=""></input>
<input type="hidden" id="err_flag" name="err_flag" value=""></input>
<div style="padding:0 0 0 10px;">2009-2011, Sample App, Inc. All rights reserved.</div>
function enableButtons(){
accepttermsCheckbox = document.getElementById('guestUser.acceptUsePolicy').checked;
if (!accepttermsCheckbox) {
document.getElementById('acceptButton').disabled = true;
document.getElementById('guestUser.acceptUsePolicy').value = false;
document.getElementById('acceptButton').disabled = false;
document.getElementById('guestUser.acceptUsePolicy').value = true;
function doDeclineTerms()
var declineTermsForm = document.getElementById("declineTerms");
declineTermsForm.submit();
Change Password Form Action and Parameters
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Guest Portal Login</title>
<link href="portals/demo2/style.css" rel="stylesheet" type="text/css" />
<table width="100%" border="0" align="center" cellpadding="0" cellspacing="0">
<td height="107"> </td>
<td height="172" align="center" valign="middle"><table width="90%" border="0"
align="center" cellpadding="0" cellspacing="0">
<td width="45%" height="172" align="left" valign="middle"><table width="75%"
border="0" align="left" cellpadding="0" cellspacing="0">
<td width="27%"><img src="portals/demo2/logo.png" alt="" width="218"
height="63" /></td>
<td width="73%"><table width="85%" border="0" align="right"
cellpadding="0" cellspacing="0">
<td height="35" align="left" class="headding">ISE 1.0</td>
<td align="left" class="label">Guest Access</td>
<td align="left"> </td>
<td align="left" class="headding1">Version:1.0</td>
<td width="45%" align="right" valign="middle"><table width="65%" border="0"
cellspacing="0" cellpadding="0">
<form action="/guestportal/ChangePassword.action" method="post">
<td height="30" align="left" valign="middle" class="label">Enter current
password :</td>
<td align="left"><input alt="Password:" name="currentpassword"
id="currentpassword" type="password" size="20" value=""/></td>
<td height="30" align="left" valign="middle" class="label">Enter new
password :</td>
<td align="left"><input alt="Password:" name="newpassword"
id="newpassword" type="password" size="20" value=""/></td>
<td height="30" align="left" valign="middle" class="label">Re-enter new
password :</td>
<td align="left"><input alt="Password:" name="confirmpassword"
id="confirmpassword" type="password" size="20" value=""/></td>
<td height="12" align="left" valign="middle"></td>
<td height="12" align="left"></td>
<td align="left" valign="middle"> </td>
<td align="left"><input type="submit" name="button" id="button" value="Log
In" />
<div style="padding:0 0 0 10px;">2009-2011, Sample App, Inc. All rights reserved.</div>
Self-Registration Form Action and Parameters
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Guest Portal Login</title>
<link href="portals/demo2/style.css" rel="stylesheet" type="text/css" />
<table width="100%" border="0" align="center" cellpadding="0" cellspacing="0">
<td height="75" bgcolor="#022d4d"><table width="98%" border="0" align="center"
cellpadding="0" cellspacing="0">
<td width="15%" align="left" valign="middle"><img src="portals/demo2/logo.png"
alt="" width="157" height="44" /></td>
<td width="72%" class="headding">ISE 1.0 Guest Portal </td>
<td width="13%" align="right" valign="middle" > </td>
<td valign="top" bgcolor="#ccebfe"><table width="98%" border="0" align="center"
cellpadding="0" cellspacing="0" class="content">
<td align="left" class="headding2">Self Registration</td>
<td align="left"> </td>
<td align="left"><table width="50%" border="0" align="left" cellpadding="0"
cellspacing="0" class="content">
<form id="selfServiceForm" action="/guestportal/SelfServiceSubmit.action"
method="post">
<td width="30%" height="30" align="left" valign="middle"
class="content">First Name :</td>
<td width="70%" align="left"><input alt="Username:"
name="guestUser.firstName" id="firstName" type="text" size="20" /></td>
<td width="30%" height="30" align="left" valign="middle"
class="content">Last Name :</td>
<td width="70%" align="left"><input alt="Username:"
name="guestUser.lastName" id="lastName" type="text" size="20" /></td>
<td width="30%" height="30" align="left" valign="middle"
class="content">Email Address :</td>
<td width="70%" align="left"><input alt="Username:"
name="guestUser.emailAddress" id="emailId" type="text" size="20" /></td>
<td width="30%" height="30" align="left" valign="middle"
class="content">Phone Number :</td>
<td width="70%" align="left"><input alt="Username:"
name="guestUser.phoneNumber" id="phoneno" type="text" size="20" /></td>
<td width="30%" height="30" align="left" valign="middle"
class="content">Company :</td>
<td width="70%" align="left"><input alt="Username:"
name="guestUser.company" id="company" type="text" size="20" /></td>
<td width="30%" height="30" align="left" valign="middle"
class="content">Optional Data 1 :</td>
<td width="70%" align="left"><input alt="Username:"
name="guestUser.optionalData1" id="data1" type="text" size="20" /></td>
<td width="30%" height="30" align="left" valign="middle"
class="content">Optional Data 2 :</td>
<td width="70%" align="left"><input alt="Username:"
name="guestUser.optionalData2" id="data2" type="text" size="20" /></td>
<td width="30%" height="30" align="left" valign="middle"
class="content">Optional Data 3 :</td>
<td width="70%" align="left"><input alt="Username:"
name="guestUser.optionalData3" id="data3" type="text" size="20" /></td>
<td width="30%" height="30" align="left" valign="middle"
class="content">Optional Data 4 :</td>
<td width="70%" align="left"><input alt="Username:"
name="guestUser.optionalData4" id="data4" type="text" size="20" /></td>
<td width="30%" height="30" align="left" valign="middle"
class="content">Optional Data 5 :</td>
<td width="70%" align="left"><input alt="Username:"
name="guestUser.optionalData5" id="data5" type="text" size="20" /></td>
<td width="30%" height="30" align="left" valign="middle" class="content">TimeZone
:</td>
<td width="70%" align="left"><select name="guestUser.timezone">
<option value="UTC">UTC</option>
<option value="America\New_York">America\New_York</option>
<option value="Europe\London">Europe\London</option>
<td height="12" align="left" valign="middle"></td>
<td height="12" align="left"></td>
<td align="left" valign="middle"> </td>
<td align="left"><input type="submit" name="button" id="button"
onclick="javascript:doOnSubmit()" value="Submit" />
<input type="submit" name="button2" id="button2"
onclick="javascript:doCancel()" value="Cancel" /> </td>
<td align="left"> </td>
<td align="left"> </td>
<div style="padding:0 0 0 10px;">2009-2011, Sample App, Inc. All rights reserved.</div>
var selfServiceForm = document.getElementById("selfServiceForm");
selfServiceForm.submit();
document.forms[0].action = "Login.action";
document.forms[0].submit();
Device Registration Form Action and Parameters
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Guest Portal Login</title>
<link href="portals/demo2/style.css" rel="stylesheet" type="text/css" />
<script language='javascript'>
<form id="deviceRegistrationPortal" action="/guestportal/RegisterDevice.action"
method="post">
<input type="hidden" name="drpUsername" id="drpUsername" value="" />
<input type="hidden" name="devRegLimit" id="devRegLimit" value="" />
<input type="hidden" name="regDevices" id="regDevices" value="" />
<table width="100%" border="0" align="center" cellpadding="0" cellspacing="0">
<td height="75" bgcolor="#022d4d"><table width="98%" border="0" align="center"
cellpadding="0" cellspacing="0">
<td width="15%" align="left" valign="middle"><img src="portals/demo2/logo.png"
alt="" width="157" height="44" /></td>
<td width="72%" class="headding">ISE 1.0 Device Registration Portal</td>
<td width="13%" align="right" valign="middle" > </td>
<td align="left" valign="top" bgcolor="#ccebfe"><table width="98%" border="0"
align="center" cellpadding="0" cellspacing="0" class="content">
<td align="left"><table width="100%" border="0" cellpadding="0" cellspacing="0"
bgcolor="#abcee4" style="padding:10px; border:#6b93ac solid 1px;">
<td style="padding:10px 0 0 10px;">Please register your device :<br />
Please note that you can not register more than 5 devices</td>
<td style="padding:0 0 0 10px;"><table width="100%" border="0" cellspacing="0"
cellpadding="0">
<td width="7%">MAC Address : </td>
<td width="93%"><input id="registeredMac" name="registeredMac" type="text" /></td>
<td style="padding:0 0 0 10px;"><input type="Submit" value="Register"
/></td>
<td align="left"> </td>
<td align="left"> </td>
<div style="padding:0 0 0 10px;">2009-2011, Sample App, Inc. All rights reserved.</div>
Self-Service Result Form Action and Parameters
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Guest Portal Login</title>
<link href="portals/demo2/style.css" rel="stylesheet" type="text/css" />
<table width="100%" border="0" align="center" cellpadding="0" cellspacing="0">
<td height="75" bgcolor="#022d4d"><table width="98%" border="0" align="center"
cellpadding="0" cellspacing="0">
<td width="15%" align="left" valign="middle"><img src="portals/demo2/logo.png"
alt="" width="157" height="44" /></td>
<td width="72%" class="headding">ISE 1.0 Guest Portal </td>
<td width="13%" align="right" valign="middle" > </td>
<td valign="top" bgcolor="#ccebfe"><table width="98%" border="0" align="center"
cellpadding="0" cellspacing="0" class="content">
<!--INSERT HEADER HERE --><td align="left" class="headding2"> Self Registration
created user: fsdf</td><!--END HEADER HERE -->
<td align="left"> </td>
<td align="left"><table width="50%" border="0" align="left" cellpadding="0"
cellspacing="0" class="content">
<!--INSERT RESULTS HERE --><tr><td width="30%" align="left" class="content">
User name: fsdf</td></tr><tr><td width="30%" align="left" class="content"> Password:
9F_</td></tr><tr><td width="30%" align="left" class="content"> First Name:
fdsf</td></tr><tr><td width="30%" align="left" class="content"> Last Name:
sdf</td></tr><tr><td width="30%" align="left" class="content"> Email Address:
</td></tr><tr><td width="30%" align="left" class="content"> Phone Number:
</td></tr><tr><td width="30%" align="left" class="content"> Company: </td></tr><tr><td
width="30%" align="left" class="content"> Optional Data 1: </td></tr><tr><td width="30%"
align="left" class="content"> Optional Data 2: </td></tr><tr><td width="30%" align="left"
class="content"> Optional Data 3: </td></tr><tr><td width="30%" align="left"
class="content"> Optional Data 4: </td></tr><tr><td width="30%" align="left"
class="content"> Optional Data 5: </td></tr><!--END RESULTS HERE -->
<td height="12" align="left" valign="middle"></td>
<td height="12" align="left"></td>
<form id="loginform" action="/guestportal/Login.action" method="post">
<td align="left" valign="middle"> </td>
<td align="left"><input type="submit" name="button2" id="button2"
onclick="javascript:doOk()" value="OK" /> </td>
<td align="left"> </td>
<td align="left"> </td>
<div style="padding:0 0 0 10px;">2009-2011, Sample App, Inc. All rights reserved.</div>
document.forms[0].action = "Login.action";
document.forms[0].submit();
Error Page Form Action and Parameters
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Guest Portal Error Detected</title>
<link href="portals/demo2/style.css" rel="stylesheet" type="text/css" />
<script language='javascript'>
<table width="100%" border="0" align="center" cellpadding="0" cellspacing="0">
<td height="107"> </td>
<td height="172" align="center" valign="middle"><table width="90%" border="0"
align="center" cellpadding="0" cellspacing="0">
<td width="45%" height="172" align="left" valign="middle"><table width="75%"
border="0" align="left" cellpadding="0" cellspacing="0">
<td width="27%"><img src="portals/demo2/logo.png" alt="" width="218"
height="63" /></td>
<td width="73%"><table width="85%" border="0" align="right"
cellpadding="0" cellspacing="0">
<td height="35" align="left" class="heading">Error Detected in Guest
Portal</td>
<!--INSERT ERROR HERE -->
<td height="35" align="left" class="heading">Second</td>
<td width="45%" align="right" valign="middle"><table width="50%" border="0"
cellspacing="0" cellpadding="0">
<td align="left" valign="middle"> </td>
<td align="left">
<div style="padding:0 0 0 10px;">2009-2011, Sample App, Inc. All rights reserved.</div>
document.forms[0].action = "Login.action";
document.forms[0].submit();
Sample style.css
background:url("../demo2/pageBg.jpg") repeat-x;
font-family:Arial, Helvetica, sans-serif;
font-family:Arial, Helvetica, sans-serif;
font-family:Arial, Helvetica, sans-serif;
font-family:Arial, Helvetica, sans-serif;
font-family:Arial, Helvetica, sans-serif;
font-family:Arial, Helvetica, sans-serif;
font-family:Arial, Helvetica, sans-serif;
.link {font-family:Arial, Helvetica, sans-serif; font-size:11px; color:#ffffff;
text-decoration:none;}
a.link:link {font-family:Arial, Helvetica, sans-serif; font-size:11px; color:#ffffff;
text-decoration:none;}
a.link:hover {font-family:Arial, Helvetica, sans-serif; font-size:11px; color:#ffffff;
text-decoration:underline; }
Configuring Guest Portal Policy
The admin can use the guest portal policy page to specify the required flow for the guest user login.
To configure a guest portal policy, complete the following steps:
Step 1 From the Cisco ISE Administration interface, select Administration > Guest Management > Settings > Guest > Portal Policy.
Step 2 Configure the following available options as shown in Figure 20-5.
•Self Registration Guest Role—This option is the default guest role assigned to the guest user after self-registration. This role ties the guest user to the associated Identity Group based on the policies defined in the system. For more information on configuring identity groups, see "Configuring User Identity Groups" section on page 4-39.
•Self Registration Time Profile—This option is the default time profile assigned to the guest user after self-registration. Only CreateTime and FirstLogin type time profiles are available and both are treated as CreateTime accounts when creating a self-registered guest user account.
•Maximum Login Failures—This option is the maximum number of failed login that can occur before a Guest User account is marked as suspended. The default value is five. A user account will be suspended after five failed login attempts. If the user account is suspended, the sponsor will have to re-enable the user account for login. This is a global setting and affects all guest portals.
•Device Registration Portal Limit—This option is the maximum number of devices that can be registered for a guest user account. The device registration portal will not allow the guest user to add more devices if the maximum number has been reached. This value can be reduced to a value that is below the maximum number of devices currently registered to a guest account. Lowering the maximum number of registered devices will not affect the existing registered devices and these devices will remain registered.
•Guest Password Expiration—This option is the number of days after which the guest password will expire and the guest will have to reset their password. To set this option, Guest Password Expiration must be enabled in the Portal Configuration page.
Step 3 Click Save.
Figure 20-5 Guest Portal Policy Page
Related Topics
•Configuring Details Policy
•MultiPortal Configurations
•Configuring Guest Password Policy
•Time Profiles
•Configuring Guest Username Policy
Configuring Guest Password Policy
The guest password policy determines how the password should be generated for all guest accounts. You can create a password policy based upon a mixture of alphabetic, numeric, or special characters.
To configure a guest password policy, complete the following steps:
Step 1 From the Cisco ISE Administration interface, select Administration > Guest Management > Settings > Guest > Password Policy.
Step 2 Type the characters that will be used to generate the random characters.
Step 3 Enter the minimum number to use from each set of characters.
Step 4 Click Submit.
Note Changes to the guest password policy only affect the existing accounts until the guest user passwords have expired and need to be changed.
Figure 20-6 Password Policy Page
Related Topics
•Configuring Details Policy
•MultiPortal Configurations
•Configuring Guest Portal Policy
•Time Profiles
•Configuring Guest Username Policy
Time Profiles
Time profiles allow a sponsor to assign different levels of access time to a guest account. For example, you can assign a time profile that allows a guest access during a workweek day but not during a weekend day.
After time profiles are created, you must change the sponsor user group to allow sponsors in that group to be able to provision accounts to the appropriate time profiles that are created. You can choose the sponsor user groups that are allowed to assign certain time profiles to guests.
By default, a sponsor user group has the ability to assign guests to the default time profile. Administrators can choose which additional time profiles the sponsor can be assigned, and they can also remove the default time profile from the user group.
Each sponsor user group must have the ability to assign guests to at least one time profile.
If a sponsor user group has only one time profile selected, sponsors will be able to select that time profile alone. If sponsors can choose more than one time profile, they can view a drop-down menu from which they can choose the time profile to be assigned to the account during the account creation.
Related Topics
•Adding, Editing, or Duplicating Time Profiles
•Deleting Time Profiles
•Configuring Details Policy
•MultiPortal Configurations
•Configuring Guest Portal Policy
•Configuring Guest Password Policy
•Configuring Guest Username Policy
Adding, Editing, or Duplicating Time Profiles
To add or edit a time profile, complete the following steps:
Step 1 From the Cisco ISE Administration interface, select Administration > Guest Management > Settings > Guest > Time Profiles.
Step 2 Click one of the following:
•Add—to create a new time profile
•Edit—to edit an existing time profile
•Duplicate—to duplicate an existing time profile
Step 3 Enter the name and description of the new time profile.
Step 4 Select a Time Zone for Restrictions. Time Restrictions are a set of time periods during which a guest account associated with that time profile would not be granted access to the network or guest portal.
Step 5 From the Account Type drop- down menu, choose one of the predefined options:
•StartEnd—allows sponsors to define start and end times for account durations
•FromFirstLogin—allows sponsors to define the duration of time that guests can have access after login
•FromCreation—allows sponsors to define the duration of time that guest can have access after account creation
Step 6 Set the Duration for which the account will be active. The account expires after the duration set here has expired. This option is available only if you select the Account Type as FromFirstLogin or FromCreation.
Step 7 Set the Restrictions for the guest access.
These restrictions are composed of a day of the week and a start and end clock time. The Time Zone value specified in the time profile affects the clock times set in any of the Time Restrictions within the time profile. For example, a Time Restriction that specifies Monday 12:00 am to 8:00 am and Monday 6:00 pm to 11:59 pm would only grant system access between 8:00 am and 6:00 pm on Mondays within the time zone of the time profile. Any other day of the week would have no time restriction in this example and system access would be granted at any time.
Step 8 Click Submit.
Time profiles do not define the start and end times. This is done during the account creation. The time profile can have restrictions that fall outside the start and end time specified in a Guest account while creation. Only those restrictions that cover the start end time of the account will be applied to the account.
For a wired network the Termination-Action must be set to 0 "Default" so that the Session-Timeout is treated as a terminate session. This value must be set on the Authorization Profile as a RADIUS value.
For a WLC the Allow AAA Override must be turned on in the WLAN configuration. The RADIUS access-accept will contain a Session-Timeout value in seconds, remaining for the account. When this time has elapsed, NAD will close the connection.
At the time of Guest login the Network Access system will return the remaining time left in the guest account to the NAD that is making the access request. This is so that the NAD can enforce account expiration.
Note For the FromCreation and FromFirstLogin time profiles, the expiration date will be calculated based on the sponsor group duration or time profile duration, whichever is minimum.
Related Topics
•Time Profiles
•Deleting Time Profiles
•Configuring Details Policy
•MultiPortal Configurations
•Configuring Guest Portal Policy
•Configuring Guest Password Policy
•Configuring Guest Username Policy
Deleting Time Profiles
To delete time profiles, complete these steps:
Step 1 From the Cisco ISE Administration interface, select Administration > Guest Management > Settings > Guest > Time Profiles.
Step 2 Select the time profiles to be deleted.
Step 3 Click Delete.
Related Topics
•Time Profiles
•Adding, Editing, or Duplicating Time Profiles
•Configuring Details Policy
•MultiPortal Configurations
•Configuring Guest Portal Policy
•Configuring Guest Password Policy
•Configuring Guest Username Policy
Configuring Guest Username Policy
The Guest Username Policy Configuration page allows the Cisco ISE administrator to specify how the user names will be created for the guest accounts. Username policy configuration can be done in two ways:
•General
•Random
Configuring General Guest Username Policy
You can create a guest username based on the email address or the first and last name of the guest.
To configure general guest username policy, complete the following steps:
Step 1 From the Cisco ISE Administration interface, select Administration > Guest Management > Settings > Guest > Username Policy.
Step 2 If necessary, expand the General tab.
Step 3 Choose one of the username policy options for creating the username for the guest account:
c. Create username from email address—Select this option if you want the guest username to be formed from the guest's email address.
d. Create username from the first name and last name—Select this option if you want the guest username to be formed from the first initial of the first name combined with the last name of the guest user.
Step 4 Enter the Minimum Username length for the guest user names. Valid range is 1-20.
If the guest user names formed by the email address or by the combination of first and last name are shorter than the minimum length, the username will be appended with 0 (zero) characters and a 1 at the end. If the username is not unique, numeric characters are appended to the name to make it unique.
For example, if there are two guest users named John Smith, the first username would be jsmith and the second username would be jsmith1. Similarly, if the Minimum Username length is set to eight, then the two user names would be generated as jsmith01 and jsmith02.
Step 5 Click Submit.
Configuring Random Guest Username Policy
You can create a guest usernames based upon a random mixture of alphabetic, numeric or special characters. The random guest username policy is used when the sponsor creates random accounts.
To configure a random guest username policy, complete the following steps:
Step 1 From the Cisco ISE Administration interface, select Administration > Guest Management > Settings > Guest > Username Policy.
Step 2 If necessary, expand the Random tab.
Step 3 Type the characters that will be used to generate the random characters.
Step 4 Enter the minimum number to use from each set of characters. Valid range is 0-20 for each character set.
Step 5 Click Submit.
Random username length is the combination of the three length fields that is alphabetic, numeric and special other characters. The length of the username defines the total number of unique names that can be created. For example, if 10,000 users are to be created, you will not be able to create enough unique values with a name space that is two characters in length.
Note Changes to the guest username policy do not affect the existing accounts.
Related Topics
•Configuring Details Policy
•MultiPortal Configurations
•Configuring Guest Portal Policy
•Configuring Guest Password Policy
•Time Profiles
Monitoring Sponsor and Guest Activity
Cisco ISE provides the following ways to view and monitor sponsor and guest activities:
•Metric Meter
•Guest Activity Report
•Guest Accounting
•Guest Sponsor Summary
Metric Meter
Cisco ISE provides an at-a-glance view of active guests in the network in a metric meter that appears on the Cisco ISE dashboard.
Guest Activity Report
This report helps you to view the Guest information for a selected time period.
To view this report,
1. Go to Monitor > Reports > Catalog > User.
2. Click on Guest Activity.
Guest Accounting
This report helps you to view the logged in/out information for the particular guest for a selected time period.
To view this report,
1. Go to Monitor > Reports > Catalog > User.
2. Click on Guest Accounting.
Guest Sponsor Summary
This report helps you to view the sponsor information along with a graphical representation for a selected time period.
To view this report,
1. Go to Monitor > Reports > Catalog > User.
2. Click on Guest Sponsor Summary.
For More Information
See Chapter 23, "Reporting," for details on how to configure these reports.
See Chapter 22, "Monitoring and Troubleshooting," for details on monitoring and troubleshooting tools.
Audit Logging
During specific actions within the Guest and Sponsor portals, audit log messages are sent to the underlying audit system. By default, these messages appear in the /opt/CSCOcpm/logs/localStore/iseLocalStore.log file.
You can configure these messages to be sent by syslog to the Monitoring and Troubleshooting system and log collector. The monitoring subsystem presents the Sponsor and Guest activity logs.
See Chapter 22, "Monitoring and Troubleshooting," for more information on logging and log collection.
Guest login flow gets logged in the audit logs regardless whether the guest login has passed or failed.