Cisco ISE Administrator Accounts: CLI and GUI Access
Introduction
During the installation of a Cisco ISE node, whether virtualized or deployed on a physical SNS appliance, an initial administrator account must be created. This account is subsequently used to generate two distinct user identities: one for Command Line Interface (CLI) access and one for Graphical User Interface (GUI) access. These accounts are specifically intended for the administration and management of the ISE environment.
The GUI account provides access to the web interface, giving a comprehensive view of the ISE deployment, with visibility tailored to the deployment type and, in distributed environments, to the specific role of each node. The CLI account, on the other hand, is primarily used to access ISE nodes via SSH. Initially, both accounts share the same credentials, allowing the same username and password to authenticate to both interfaces. Once all parameters for the initial configuration set have been entered, the output displays the following entry, confirming the behavior just described.
1Copying first CLI user to be first ISE admin GUI user...ISE implements a Role-Based Access Control (RBAC) model to categorize users according to their responsibilities, defining both the scope of their actions and the level of visibility they require. For each access method, administrators can configure, with fine-grained control, which commands or menus a user may access and which data they are allowed to view. By default, the CLI account is assigned the Admin role, while the GUI account is part of the Super Admin group.
In general, the roles available depend on the access method: the CLI supports only two predefined roles, whereas the GUI provides a broader set of built-in groups and allows the creation of custom groups to meet specific operational requirements.
CLI Access and Privileges
CLI access to ISE can be achieved through multiple methods:
- Local access through the console port.
- Remote connection over SSH.
- Remote connection through the Cisco Integrated Management Controller (CIMC).
Two types of user accounts are available for CLI access: Admin and User, each granting a distinct set of privileges. The Admin account provides elevated privileges for system-level operations, including:
- Start and stop the ISE application.
- Apply software patches and upgrades.
- Reload or shut down the ISE appliance.
- View all system and application logs.
When logged in with an Admin account, a wide range of commands becomes available, as shown below.
1ISE-NODE-2/adminCLI#?
2Possible completions:
3 application Application Install and Administration
4 backup Backup system
5 backup-logs Backup system and application logs
6 clear Reset functions
7 clock Set the System Clock
8 configure cfg
9 copy Enter URL (use disk:/path/file for local) (Max Size - 2048)
10 crypto Crypto operations
11 debug Debugging functions (see also 'undebug')
12 delete Delete a file
13 dir List files on local filesystem
14 esr Enter the Embedded Services Router console
15 exit Exit the management session
16 forceout Force Logout all the sessions of a specific system user
17 generate-password Username for which password has to be generated
18 halt Shutdown the system
19 idle-timeout Idle timeout for all the sessions of a specific system user
20 license License operations
21 mkdir Create new directory
22 nslookup DNS lookup for an IP address or hostname
23 password Update Password
24 patch Install System or Application Patch
25 permit List cli for Secure Tunnel
26 ping Ping a remote ip address
27 ping6 Ping a remote ipv6 address
28 reload Reload the system
29 reset-config Reset network and time settings
30 restore Restore system
31 rmdir Remove existing directory
32 screen-length Configure screen length
33 screen-width Configure screen width
34 show Show information about the system
35 ssh SSH to a remote ip address
36 tech TAC commands
37 terminal Set terminal line parameters
38 traceroute Trace the route to a remote ip address
39 undebug Disable debugging functions (see also 'debug')
40 who Display currently logged on usersThe show command, in particular, grants access to the following system sections.
1ISE-NODE-2/adminCLI#show ?
2Possible completions:
3 application Display application(s) information
4 backup Show backup information
5 banner Show login banners
6 cdp CDP show commands
7 clock Show clock information
8 container Show container information
9 cpu Display CPU information
10 crypto Display Crypto operations
11 disks Display disk and filesystem information
12 esr Show Embedded Services Router information
13 firewall Show firewall rules
14 history Display CLI command history
15 icmp_status Display icmp echo response configuration information
16 interface Display interface info
17 inventory Display hardware inventory information
18 ip Show IP info
19 ipv6 Show IPv6 info
20 logging Display system logging information
21 logins List login history
22 memory Display memory information
23 ntp Show NTP servers
24 ports Display all processes listening on open ports
25 process Display system processes
26 repository Show repository contents
27 restore Show restore information
28 running-config Display current configuration
29 snmp-server Show snmp-server information
30 tech-support Show tech-support details
31 terminal Display terminal configuration parameters
32 timezone Show timezone
33 timezones Show timezones
34 udi Show udi information
35 uptime Display system uptime
36 users Display logged-in users information
37 version Show version infoThe second type of CLI user is the User account, which has limited privileges. Consequently, it cannot perform configuration changes, monitor the status of ISE application processes, and is restricted to a subset of basic operational commands, as illustrated below.
1ISE-NODE-2/userTest#?
2Possible completions:
3 crypto Crypto operations
4 exit Exit the management session
5 license License operations
6 nslookup DNS lookup for an IP address or hostname
7 password Update Password
8 ping Ping a remote ip address
9 ping6 Ping a remote ipv6 address
10 show Show information about the system
11 terminal Set terminal line parameters
12 traceroute Trace the route to a remote ip addressThis limitation also applies to the information accessible via the show command.
1ISE-NODE-2/adminCLI#show ?
2Possible completions:
3 cdp CDP show commands
4 clock Show clock information
5 cpu Display CPU information
6 crypto Display Crypto operations
7 disks Display disk and filesystem information
8 icmp_status Display icmp echo response configuration information
9 interface Display interface info
10 inventory Display hardware inventory information
11 logins List login history
12 memory Display memory information
13 ntp Show NTP servers
14 ports Display all processes listening on open ports
15 process Display system processes
16 terminal Display terminal configuration parameters
17 timezone Show timezone
18 udi Show udi information
19 uptime Display system uptime
20 version Show version infoCLI Account Creation
Local CLI accounts can be created by entering configuration mode and executing the following command.
1ISE-NODE-2/adminCLI(config)#username <user-name> password <plain | hash> <password> role <admin | user> email <user-email> <disabled>The parameters that must be specified are:
- Username: The name associated with the account being created. During the initial ISE configuration, the Admin account is assigned the default name admin.
- Password: The password associated with the account. It can be provided either in plain text or as a hash. When entering a plain-text password, characters such as ! and # must be escaped with a backslash. In the running configuration, the password is automatically displayed as a SHA-256 hash.
- Role: The type of role assigned to the user, either Admin or User.
Other parameters that can be specified include:
- Email: Associates an email address with the account. This value may be used to notify the user when their password is approaching expiration, provided the feature is enabled and correctly configured.
- Disabled: Creates the account in a disabled state, meaning it cannot be used until explicitly enabled.
To guarantee that a password meets the required policy on the first attempt, the generate-password <user-name> command can be used to generate a compliant password, as illustrated in the example below.
1ISE-NODE-2/adminCLI#generate-password userTest3
23Uj&onheThe generated password should then be used within the username command.
Once an account has been created, all locally configured CLI accounts, along with their respective statuses, can be verified using the show users status command, as illustrated in the example below.
1ISE-NODE-2/adminCLI#show users status
2
3USERNAME ROLE DISABLED LOCKED
4adminCLI Admin
5userTest User The previous output indicates that, in addition to the Disabled state, a Locked state can also be applied to an account. In the scenario shown in the following figure, if a user attempts to log in multiple times with an incorrect password (three attempts in this example), the CLI account is automatically locked. While rebooting the node could theoretically unlock the account, this would require a scheduled maintenance window in a production environment. Consequently, it is preferable to rely on the temporary suspension mechanism, which locks the account for a defined period (15 minutes in this example) before it automatically becomes available again.

For example, the output below illustrates the result when the user userTest attempts to log in 3 consecutive times with an incorrect password.
1ISE-NODE-2/adminCLI#show users status
2
3USERNAME ROLE DISABLED LOCKED
4adminCLI Admin
5userTest User *The difference between Disabled and Locked modes in the CLI can be clearly verified using the show running-config password-policy command. When the Suspend account for X minutes option is selected in the GUI, the running configuration includes the password-lock-timeout entry. Conversely, if the Lock account option is selected, this entry is absent from the configuration.
1ISE-NODE-2/adminCLI#show running-config password-policy | include password-lock
2 password-lock-enabled
3 password-lock-retry-count 3
4 password-lock-timeout 15The above settings are part of ISE’s password policies and will be explained in detail later.
As with accounts created through the CLI, internal administrator accounts created via the GUI can also be viewed. To do this, ISE configuration mode must be accessed by entering the application configure ise command from EXEC mode. The following lists all options available to the Admin CLI users; for the context of this guide, option 15 is the relevant selection.
1ISE-NODE-2/adminCLI#application configure ise
2
3Selection configuration option
4[1]Reset M&T Session Database
5[2]Rebuild M&T Unusable Indexes
6[3]Purge M&T Operational Data
7[4]Reset M&T Database
8[5]Refresh Database Statistics
9[6]Display Profiler Statistics
10[7]Export Internal CA Store
11[8]Import Internal CA Store
12[9]Create Missing Config Indexes
13[10]Create Missing M&T Indexes
14[12]Generate Daily KPM Stats
15[13]Generate KPM Stats for last 8 Weeks
16[14]Enable/Disable Counter Attribute Collection
17[15]View Admin Users
18[16]Get all Endpoints
19[19]Establish Trust with controller
20[20]Reset Context Visibility
21[21]Synchronize Context Visibility With Database
22[22]Generate Heap Dump
23[23]Generate Thread Dump
24[24]Force Backup Cancellation
25[25]CleanUp ESR 5921 IOS Crash Info Files
26[26]Recreate undotablespace
27[27]Reset Upgrade Tables
28[28]Recreate Temp tablespace
29[29]Clear Sysaux tablespace
30[30]Fetch SGA/PGA Memory usage
31[31]Generate Self-Signed Admin Certificate
32[32]View Certificates in NSSDB or CA_NSSDB
33[33]Recreate REPLOGNS tablespace
34[34]View Native IPSec status
35[35]Enable/Disable/Current_status of Audit-Session-ID Uniqueness
36[36]Check and Repair Filesystem
37[37]Enable/Disable/Current_status of RSA_PSS signature for EAP-TLS
38[0]ExitBy entering 15 and pressing Enter, the following output is displayed.
1Admin User Report
2
3User Name Description Enabled First Name Last Name Email Groups
4=============== ==================== ======== =============== =============== ========================= ========================================
5ERSGUIOper ENABLED ["ERS Operator"]
6
7adminGUI Default Admin User ENABLED ["Super Admin"]
8
9testGui ENABLED ["Super Admin"]Regarding account creation, when a new account is added, the event can be verified in the CLI logs using the command show logging system ade/ADE.log | include 1018.
12025-11-09T19:10:18.829491+01:00 ISE-NODE-2 CARSSetup[4215]: ADEAUDIT 1018, type=USER, name=USER CONFIGURATION MODIFIED, username=adminCLI, cause=CLI User configuration has been modified, adminipaddress=10.0.0.1, interface=CLI, detail=Added user test with role: Admin state: Enabled successfullyThe output displays a log entry containing several details about the newly created account, excluding the password. The information is presented in the following order:
- Log ID, in this case is 1018.
- Description of the logged event, in this case USER CONFIGURATION MODIFIED.
- Administrator account that performed the action, adminCLI in this example.
- IP address from which the administrator was connected when creating the user, in this case 10.0.0.1.
- Type of account that was created, shown in the detail field (here, an Admin user)
- State associated with the account, which in this example is enabled. Using the disabled keyword creates an account in a non-enabled state, making it temporarily unavailable.
The same event can also be verified in an alternative log file, with an example output shown below.
12025-11-09 19:10:18,873 INFO [AdeSyslogProcessor][[]] cpm.infrastructure.systemconfig.syslogproc.AdeSyslogContent -:::::- SCH: InfraTCPMessage: msg: InfraUdpMessage: <130>Nov 9 19:10:18 ISE-NODE-2 CARSSetup[2990]: ADEAUDIT 1018, type=ADMIN, name=USER CONFIGURATION MODIFIED, username=adminCLI, cause=CLI User configuration has been modified, adminipaddress=10.0.0.1, interface=CLI, detail=Added user test with role: Admin state: Enabled successfullyAdditionally, the content of a specific log file can be displayed by appending the file name to this command. For example, to view the contents of the ise-psc.log file, which is closely related to the ISE application server, the show logging application ise-psc.log command can be used. Log files can also be downloaded directly from the GUI by following the path Operations → Troubleshoot → Download Logs → Node → Debug Logs. Once the affected node and the log file to be consulted have been identified, click on the file name to download it to the local machine. For further information, please refer to the References section at the end of the article.
For completeness, an example of the log entry generated for a User-level account is provided below.
12025-11-09T19:19:15.602889+01:00 ISE-NODE-2 CARSSetup[4215]: ADEAUDIT 1018, type=USER, name=USER CONFIGURATION MODIFIED, username=adminCLI, cause=CLI User configuration has been modified, adminipaddress=10.0.0.1, interface=CLI, detail=Added user userTest2 with role: User state: Enabled successfullyStarting with ISE Release 3.3, any user account created via the CLI is required to change its password at first login. The corresponding output is shown below.
1login as: userTest2
2userTest2@10.0.0.2's password:
3Pre-authentication banner message from server:
4| You are required to change your password immediately (administrator enforced)
5
6<div class="callout callout-info">.</div>
7
8
9End of banner message from server
10You are required to change your password immediately (administrator enforced).
11WARNING: Your password has expired.
12You must change your password now and login again!
13Changing password for user userTest2.
14Current password:
15New password:
16Retype new password:Once the new password is entered and confirmed, the session is terminated. At the next login, the same user account, userTest2, can be used along with the newly configured password. It is also useful to examine how the node behaves when a user sets a new password. The following logs illustrate this process.
12025-11-09T19:36:09.169359+01:00 ISE-NODE-2 CARSSetup[4215]: ADEAUDIT 1018, type=USER, name=USER CONFIGURATION MODIFIED, username=system, cause=CLI User configuration has been modified, adminipaddress=127.0.0.1, interface=CLI, detail=User userTest2 has been modified with password, role: User state: Enabled successfullyUnlike the previous example, the Username and Source IP Address fields are different. In this case, they are populated with system and 127.0.0.1, which corresponds to the local address of the machine. This occurs because the update is triggered internally by ISE itself. In general, following the creation of an account, whether Admin or User, its password can be changed at any time. A password reset can be performed either directly by the user or by an administrator. For a User account, the password can be reset using the password command from EXEC mode. For an Admin account, the password can be reset not only using the previous method but also with the username... command in configuration mode.
Administrators can modify or delete any account, regardless of role. The recommended procedure for removing an account is as follows:
- Execute the command show running-config username and copy the entry corresponding to the account to be removed.
- Enter configuration mode and issue the same command using the negated form (ie., no username...). This operation is not available to User-level accounts, as access to configuration mode is restricted.
CLI Account Verification
With multiple accounts configured, an administrator may want to review the most recent CLI access attempts on ISE. This can be done using the show logins cli command, which by default displays the last 10 recorded entries. If needed, additional results can be shown by specifying a higher value with show logins cli count <entries-number>.
1ISE-NODE-2/adminCLI#show logins cli
2userTest2 pts/1 10.0.0.4 Sun Nov 9 16:21 still logged in
3userTest2 pts/1 10.0.0.4 Sun Nov 9 16:20 - 16:20 (00:00)
4userTest2 pts/1 10.0.0.4 Sun Nov 9 16:20 - 16:20 (00:00)
5userTest2 pts/1 10.0.0.4 Sun Nov 9 16:19 - 16:19 (00:00)
6userTest2 pts/1 10.0.0.4 Sun Nov 9 16:19 - 16:19 (00:00)
7adminCLI pts/0 10.0.0.4 Sun Nov 9 15:53 still logged in
8adminCLI pts/0 10.0.0.5 Sat Nov 8 12:40 - 12:52 (00:12)
9adminCLI pts/0 10.0.0.5 Sat Nov 8 12:38 - 12:38 (00:00)
10adminCLI pts/0 10.0.0.5 Sat Nov 8 12:38 - 12:38 (00:00)
11reboot system boot 4.18.0-425.10.1. Sat Nov 8 12:37 still running
12
13wtmp begins Wed Sep 20 11:56:55 2023To verify which users are currently connected, the show users command can be used. An example of the output is shown below.
1ISE-NODE-2/adminCLI#show users
2
3USERNAME ROLE HOST TTY LOGIN DATETIME
4
5adminCLI Admin 10.0.0.5 pts/0 Sun Nov 9 15:53:33 2025
6
7userTest2 User 10.0.0.4 pts/1 Sun Nov 9 17:27:21 2025
8
9-------------------
10DETACHED SESSIONS:
11-------------------
12
13USERNAME ROLE STARTDATE
14
15% No disconnected user sessions presentIf it becomes necessary to forcibly terminate the session of a specific user who is currently active and appears in the previous output, the command forceout <user-name> can be used.
ISE-NODE-2/adminCLI(config)#no username userTest2 password hash $6$bYHkcsJ.vJ1rN4cK$ubRSzaKjeqSglxLrt4icoZDPlb4uGz.Lw6KSXD/CZVGfF2$qbSm8piUyf/hxQcXFswcmSRurNe6vjyBabb5uJ1 role user % Error: Cannot delete user while active session exist. Use 'forceout' CLI to remove active session of the user.
The log generated by executing the forceout userTest2 command is shown below.
12025-11-09T19:52:31.694783+01:00 ISE-NODE-2 CARSSetup[94927]: ADEAUDIT 2040, type=FORCEOUT, name=FORCEOUT USER, username=system, cause=Forced logout of all the sessions of a CLI user, adminipaddress=127.0.0.1, interface=CLI, detail=Forced logout of user userTest2 successful
22025-11-09T19:52:31.582890+01:00 ISE-NODE-2 ADE-SERVICE[1336]: [94927]:[info] user: user.c[3319] [system]: Invoked force logout for user: userTest2
32025-11-09T19:52:31.683127+01:00 ISE-NODE-2 ADE-SERVICE[1336]: [94927]:[info] user: user.c[3355] [system]: force logout: CLI user found a match userTest2
42025-11-09T19:52:31.695540+01:00 ISE-NODE-2 ADE-SERVICE[1336]: [94927]:[info] user: user.c[3395] [system]: Force logout on userTest2 successfulIn this case, the log ID differs from the previous example, changing from 1018 to 2040. The log also specifies the username that was forcibly logged out, shown in the detail field. As in the earlier scenario, the source IP address is the local address of the node.
In addition to runtime display commands and the show user status command, the generic show running-config username command can be used to view all locally created users directly from the configuration. An example of the output is shown below.
1ISE-NODE-2/adminCLI#show running-config username
2username adminCLI password hash $6$QN/U7Lie5UN1GsP8$lrsMB0go3C9s6jcGs52GgP3bSAOzznLGOEBIItoYIxcskVXYBQVgl6YqKyZLgJG9IrDDS/cTpBQvLhMYiXcjd. role admin
3username userTest2 password hash $6$RGUzlAPxOVStv963$kgD3h3XGJYu56zq65v0jfqkOkyGEJtFSSM0wO3fYN27/z7yUC2.jlhFoLFpITTXN.UjLj/BcwW/TZzz2wOXdl. role adminAdditional options are available to further refine the search:
1ISE-NODE-2/adminCLI#show running-config username ?
2Possible completions:
3 admin Username (Max Size - 31)
4 userTest2 Username (Max Size - 31)
5 | Output modifiers
6 <cr>
7Possible match completions:
8 disabled User is disabled
9 email User email address
10 password Password and user role
11 role Specify user roleCLI Account Password Policy
As demonstrated earlier, creating a local user account from the CLI is a straightforward process. One of the most critical attributes of any account is its password. To strengthen overall security, ISE enforces a set of password policies that must be followed when defining a password. These policies can be reviewed using the show running-config password-policy command. An example of the output is provided below.
1ISE-NODE-2/adminCLI#show running-config password-policy
2password-policy
3 digit-required
4 lower-case-required
5 min-password-length 8
6 no-username
7 password-expiration-days 45
8 password-expiration-enabled
9 password-lock-enabled
10 password-lock-retry-count 3
11 upper-case-required
12!Contrary to what might be assumed, these policies are read-only when accessed from the CLI. Any modifications must be performed through the GUI. Attempting to make changes from the CLI results in the following error message.
1ISE-NODE-2/adminCLI(config-password-policy)#password-expiration-days 12
2% Error: Configuration changes ignored. Password policy is replicated from ISE administration node. Please set CLI password policy using the ISE web UI on the primary administration node.Therefore, all changes to password policies must be performed from the GUI using an administrator-level account, such as Super Admin or System Admin. It should be noted that not all GUI configuration options apply to accounts created via the CLI (for instance, the policy Password must not contain → This word or any of its characters in reverse order). The configuration menu for password policies can be found under Administration → System → Admin Access → Authentication → Password Policy. For policies applied to accounts created through the CLI, any modifications are automatically reflected in the corresponding CLI output. For example, if the maximum password lifetime is changed from its default value to a custom setting, such as 78 days, this updated value will also appear in the CLI output, as shown below.

1ISE-NODE-2/adminCLI#show running-config password-policy
2password-policy
3 digit-required
4 lower-case-required
5 min-password-length 8
6 no-username
7 password-expiration-days 78
8 password-expiration-enabled
9 password-lock-enabled
10 password-lock-retry-count 3
11 upper-case-required
12!Having reviewed the creation, management, and monitoring of accounts via the CLI, the next section examines these same operations from the GUI perspective.
GUI Access and Privileges
The second, and most frequently used, method for managing ISE is through the GUI. From there, administrators can:
- Manage deployments, help desk operations, network devices, and node monitoring and troubleshooting.
- Manage ISE services, policies, administrator accounts, and overall system configuration and operations.
- Change administrator and user passwords.
GUI Account Creation
Administrator accounts can be managed under Administration → System → Admin Access → Administrators → Admin Users. From this page, new accounts can be created and all available attributes can be assigned to them.

In addition to creating users, the same interface allows them to be deleted or disabled. When a user is disabled, any attempt to log in with the associated credentials will be denied access to the ISE GUI. It is important to note that these users are stored internally within the ISE cluster. Unlike those created via the CLI, GUI-based users can access the individual graphical interfaces of each node in a distributed deployment.
Particular attention should be given to the administrator account created during the initial setup. This account cannot be deleted or disabled, unlike the default CLI account. Consequently, only a limited subset of its attributes can be modified. The figure below shows all configurable attributes for each administrator account.

As mentioned, among these attributes, the ones that cannot be modified for the administrator (Super Admin) account created during the node setup are the following:
- Account status
- Read-only setting
- Requirement to change the password at the next login
- Administrator groups assigned to the account
Administrator access in ISE is governed by the Role-Based Access Control (RBAC) model. Access permissions are determined by the group to which the administrator belongs when accessing the GUI. These groups may include local accounts defined within the ISE cluster or external groups, such as those defined in Active Directory. Based on group membership, ISE determines which features, pages, and information are accessible to each administrator.
In contrast to the CLI, which supports only two role types, the GUI offers a significantly broader range of administrator groups and also supports the creation of custom groups.
The image below illustrates all default groups available in the GUI.

The option to create custom groups is particularly useful when there is a need to define profiles with specific levels of access or visibility. For example, a group may be configured to block access to all TACACS-related information. As a result, both the corresponding menus and data remain hidden to any user belonging to that group.

As mentioned earlier, administrator groups can be either internal or external. Internal groups consist of local administrator accounts created within ISE, whereas external groups are mapped to users who belong to groups defined in an external identity source, such as Active Directory. When a custom group is created, it is defined as internal by default. To associate it with one or more external groups, the External option must be selected and the appropriate AD groups mapped to the local group.
To better illustrate how RBAC and administrator groups interact, a temporary test group named groupTest is created. This group will be used shortly when defining the RBAC policy.

Once the group has been created, it is possible to associate a new user named testUserRBAC with it.

The next step is to define which resources the group can access. This requires two components: RBAC policies and permission objects. Permission objects determine which menus and data are visible in the GUI for users in a specific group, while RBAC policies, created at the final stage of the workflow, integrate all components. ISE provides a number of default permission objects for both menu and data visibility. The Menu Access interface shown below allows administrators to specify which menus are accessible. The drop-down list mirrors the structure of the ISE GUI, and menu visibility can be controlled using the Show and Hide options.
For demonstration purposes, a new permission object named testMenuAccess is created. In this example, visibility is restricted to the Live Logs page, allowing access to information about network access attempts by endpoints.

The same approach applies to data masking through the Data Access tab. A new permission object is created by selecting Add and naming it testDataAccess. All information available in ISE can be shown or hidden according to the visibility requirements of the selected group. In this example, only information related to network devices associated with the location All Locations → IT → Veneto has been made visible.

After creating these permission objects, the final step is to combine them into an RBAC policy. RBAC policies associate a group with the defined visibility settings. As in other areas of ISE, several default RBAC policies are available and can be applied simply by assigning newly created users to the corresponding default groups. Note that the default RBAC policies cannot be modified or disabled.

The logic behind RBAC is straightforward. For each policy, ISE checks whether a user belongs to the specified group. If the condition is met, the associated Menu Access and Data Access objects are applied to that user. To create the final policy, select Actions from any existing policy and choose Insert New Policy. Assign a name, such as RBAC Group Test Policy, and specify the group to which the policy applies, in this case groupTest. The last step is to associate the visibility settings we prepared earlier, testMenuAccess and testDataAccess.

The final result is shown in the figure below. The user’s visibility is restricted according to the settings defined in the previous steps, both for menus and data. Specifically, the user can access only the interface dedicated to Network Devices. Within this interface, visibility is limited to devices associated with the IT -> Veneto location, while devices associated with other locations, such as IT -> Lombardia, remain hidden.

This shows the visibility of the admin user belonging to the Super Admin group.

GUI Account Verification
The GUI also allows viewing currently logged-in users, similar to the CLI. This information can be accessed by navigating to Administration → System → Admin Access → Settings → Session → Session Info.

This view displays the following details:
- The username of the active session, in this example admin.
- The IP address from which the user is connected, here 10.0.0.1.
- The timestamp indicating when the current session was established, shown as 09 November.
- The timestamp of the previously created session, shown as 09 November.
As with the CLI, the GUI also allows a Super Admin to forcibly terminate another user’s session. This can be done by navigating to Administration → System → Settings → Session → Session Info. The session to be ended can be selected on this page, and clicking Invalidate will terminate it. In addition to viewing currently active sessions, it is also possible to review the historical record of user sessions, similar to using the show logins cli command in the CLI. The figure below shows a summary. Both users created via CLI and those created through the GUI are included. To access this summary, navigate to Operations → Reports → Reports → Reports → Audit → Administrator Logins.

GUI Account Password Policy
As discussed in the CLI section, password policies can only be configured through the GUI. These policies govern the composition of user passwords and are organized into 4 subsections within the interface:
- Password must not contain

- Password must contain at least one character of each selected type

- Password History

- Password Lifetime

In addition, it is possible to specify the minimum password length. Configuration entries marked with the ^ symbol do not apply to CLI-created accounts. For instance, the system cannot check for the presence of a specific word (or its reverse) within a password. Beyond password policies, the GUI also allows administrators to configure account inactivity and suspension settings. For inactivity, an account can be automatically disabled after X days, as illustrated in the figure. Consecutive failed login attempts can be managed by:
- Suspending the account for X minutes.
- Locking the account, thereby rendering it disabled; to re-enable it, an administrator with the appropriate permissions must manually reactivate the account via the GUI as well.
Takeaways
The creation of local accounts on ISE nodes is generally not recommended in production environments. Instead, it is preferable to manage accounts through the GUI, which provides a comprehensive set of configuration options. I hope this post has been helpful. If you have any additional information to share, feel free to reach out via social media. See you in the next one!