ERS Authorization Profiles
Synopsis
netapi ise get-authz-profiles [OPTIONS]
netapi ise get-authz-profile <NAME> [OPTIONS]
netapi ise create-authz-profiles-from-file <YAML_FILE>
netapi ise update-authz-profiles-from-file <YAML_FILE>
Description
Manage ISE authorization profiles. These define what network access is granted after successful authentication.
Commands
get-authz-profiles
List all authorization profiles.
netapi ise get-authz-profiles
netapi ise get-authz-profiles --size 50 --page 2
Options
--size, -s INTEGER Results per page (default: 100)
--page, -p INTEGER Page number (default: 1)
create-authz-profile
Create a single authorization profile.
# Basic profile with VLAN
netapi ise create-authz-profile Domus_Admin_Profile --vlan ADMIN_VLAN
# Profile with VLAN and DACL
netapi ise create-authz-profile Domus_Secure_Profile --vlan DATA_VLAN --dacl DACL_SECURE_FULL
# With description
netapi ise create-authz-profile Domus_Guest --vlan GUEST_VLAN --descr "Guest internet only"
update-authz-profile
Update an existing authorization profile.
# Update VLAN
netapi ise update-authz-profile Domus_Secure_Profile --vlan NEW_VLAN
# Update DACL
netapi ise update-authz-profile Domus_Secure_Profile --dacl DACL_NEW
# Remove DACL
netapi ise update-authz-profile Domus_Secure_Profile --no-dacl
# Update reauth timer (8 hours)
netapi ise update-authz-profile Domus_Secure_Profile --reauth-timer 28800
Sample Output
{
"id": "2e165c10-f5ad-11f0-b76e-52c54a1d1f56",
"name": "Domus_Secure_Profile",
"description": "Trusted users - deny management subnet",
"accessType": "ACCESS_ACCEPT",
"authzProfileType": "SWITCH",
"vlan": {
"nameID": "DATA_VLAN",
"tagID": 1
},
"daclName": "DACL_SECURE_FULL",
"reauth": {
"timer": 28800,
"connectivity": "DEFAULT"
}
}
create-authz-profiles-from-file
Create profiles from YAML definition.
netapi ise create-authz-profiles-from-file profiles.yaml
profiles.yaml
profiles:
- name: Domus_Secure_Profile
description: "Trusted users - full network access"
access_type: ACCESS_ACCEPT
vlan:
name: DATA_VLAN
tag: 1
dacl_name: DACL_SECURE_FULL
reauth_timer: 28800
- name: Domus_IoT_Profile
description: "IoT devices - restricted access"
access_type: ACCESS_ACCEPT
vlan:
name: IOT_VLAN
tag: 1
dacl_name: DACL_IOT_RESTRICTED
reauth_timer: 3600
- name: Domus_Guest_Profile
description: "Guest users - internet only"
access_type: ACCESS_ACCEPT
vlan:
name: GUEST_VLAN
tag: 1
dacl_name: DACL_GUEST_INTERNET
Profile Attributes
| Attribute | Description | Example |
|---|---|---|
|
Accept or reject |
|
|
VLAN name (must exist on switch) |
|
|
Downloadable ACL name |
|
|
Re-authentication interval (seconds) |
|
|
WLC ACL name (wireless) |
|
CI/CD Pipeline Example
# GitOps: Profile changes trigger ISE update
name: Update ISE Authz Profiles
on:
push:
paths:
- 'ise/profiles/*.yaml'
jobs:
deploy:
runs-on: self-hosted
steps:
- uses: actions/checkout@v4
- name: Load credentials
run: eval "$(dsource d000 dev/network)"
- name: Update profiles
run: |
for file in ise/profiles/*.yaml; do
netapi ise update-authz-profiles-from-file "$file"
done