16.4 ISE 2.3: ISE Authentication and Authentication Policy

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
11 hours
Difficulty
Intermediate
CEU/CPE
15
Video Transcription
00:00
Hello. Welcome back. Cisco Certified Design Associate Demo to Ice 2.3. Scenario six. Ice authentication on authorization policy. Okay, let's start lab
00:13
being nice to 0.3. All policies were converted to policy sets because this is a more scalable and efficient way to view the large numbers of the policies
00:25
drill down into the ice. Authentication on the all tradition policies health scaleable crump attacks as T t's are a fine and on how many Hiten they have in a counter
00:37
in the ice navigated policy
00:40
policy states
00:43
to see all policy sites
00:46
right for demo proposal only have our default policy
00:51
to keep things simple
00:52
quick to the viewer
00:56
for the default policy to see its authentication policies
01:00
on the authorization policies.
01:03
Authentication policies came made very granular with conditions
01:10
down to a space of the user or en pointe.
01:11
They generally are used to future authentications by and they d profiles 100 functionality access methods. Where'd wireless
01:23
the he n authentication types A 2.1 acts I may be right authentication Prada goes P A. P. M s a chap version to ta ke terrorists
01:36
or of entity stores, right? It could be an internal Adie token, et cetera. Write their authorization policies
01:46
on they. D attributes authentication Medford's identity groups and appoint attributes. Other informations can all be tied together to lease out in a sadistic authorization profile. Let's take a look at the coyote and a point like this. If it is cameras,
02:04
it's the rule. Name is the camera.
02:07
The conditions are implants. Logical profile Eco's camera.
02:13
Then I give you the results. It's I'll give you the off camera access, but put it in the groups of a camera. Right there is The heat comes on. Employees in active directory with the condition wired or wireless were in this A D group.
02:31
I get permit our access. I put you in a secret group of employees
02:38
on his Here's the here. Calm
02:40
on for the D for authorization. If there's no other policy marriages,
02:46
I give you the limited access. Only
02:51
right now here's the heat come summary in ice 2.3. All policies were converted to policy sets because this is, ah more scalable and efficient way to build a large numbers of policies. As we discovered a previously in this lab,
03:08
any questions Feel free to contact me. Otherwise I was seeing an axe. A video bye for now
Up Next