ISE Admin Portal SSO
1. Overview
ISE supports SAML 2.0 for admin portal authentication, enabling Single Sign-On with Keycloak.
|
ISE SAML IdP configuration is GUI-only. There is no REST API endpoint for SAML IdP management. |
2. Prerequisites
-
Keycloak SAML client configured (see SAML Client for ISE)
-
Keycloak IdP metadata XML downloaded
-
ISE admin access (local admin account for fallback)
-
DOMUS-ROOT-CA trusted by browser
3. Step 1: Import DOMUS-ROOT-CA into Browser
Firefox uses its own certificate store (ignores system trust store):
-
Settings → Privacy & Security → View Certificates
-
Authorities tab → Import
-
Select
/etc/ssl/certs/DOMUS-ROOT-CA.pem -
Check "Trust this CA to identify websites"
4. Step 2: Download Keycloak Metadata
curl -k https://keycloak-01.inside.domusdigitalis.dev:8443/realms/domusdigitalis/protocol/saml/descriptor \
-o /tmp/keycloak-metadata.xml
5. Step 3: Configure SAML IdP in ISE
Navigate to: Administration → Identity Management → External Identity Sources → SAML Id Providers
-
Click Add
-
IdP Name:
keycloak_01 -
Select Import metadata from file
-
Upload
/tmp/keycloak-metadata.xml -
Click Import
6. Step 4: Export ISE SP Metadata (Critical)
|
ISE generates a unique Entity ID. This must match the Keycloak client ID. |
-
Click Export Service Provider Info
-
Save the XML file
-
Note the Entity ID:
entityID="http://CiscoISE/a486c6ef-6c77-4bc1-bf6d-4e479b3aeae8"
7. Step 5: Update Keycloak Client ID
In Keycloak Admin Console:
-
Navigate to: Clients → (ISE client)
-
Update Client ID to match ISE Entity ID exactly
-
Update Valid redirect URIs:
https://ise-01.inside.domusdigitalis.dev:8443/*
|
The |
8. Step 6: Configure Group Mappings
Navigate to ISE SAML IdP → Groups tab:
| Name in Assertion (Keycloak) | Name in ISE |
|---|---|
ise-super-admin |
Super Admin |
ise-read-only |
Read Only Admin |
ise-helpdesk |
Helpdesk Admin |
ise-ers-admin |
ERS Admin |
|
ISE Admin Group names are case-sensitive. Use exact case: |
9. Step 7: Enable SAML for Admin Portal
-
Navigate to: Administration → Admin Access → Authentication → Authentication Method
-
Select Password Based or Client Certificate Based or SAML Based
-
Select IdP:
keycloak_01 -
Click Save
10. Testing
-
Select Log In With:
keycloak_01 -
Authenticate with Keycloak credentials
-
Verify ISE admin access
11. Fallback Access
Always maintain local admin access for emergencies:
https://ise-01.inside.domusdigitalis.dev/admin/LoginAction.do?local=true
12. Monitoring
ssh admin@ise-01.inside.domusdigitalis.dev
show logging application ise-psc.log tail | include SAML