Settings on the CISCO side
In Cisco ISE, you will need to enable the “ERS API service” setting.
In Cisco ISE, login to your ISE PAN
Go to Administration > System > Settings > ERS Settings
Turn on ERS API by enabling ERS for Read/Write
For some ISE versions, you may need to select Disable CSRF For ERS Request (compatible with ERS clients older than ISE 2.3)
Save your changes
You will now be able to use the local endpoint “https:// ISE IP address>:9060/ers/”
Create a Sponsor
A sponsor is the user's proxy that does the provisioning of the new visitorsIn ISE, go to Administration > Identity Management > Identities.
Select “Users” and click “Add”
Give the sponsor a name (Something like “VisitorManagementSponsor”)
Set Status to Enabled
Set Password Type to “Internal Users”. Create a password (you will need this later in step 6)
Assign User Groups. Best practice is “ALL_ACCOUNTS” unless you have a specific reason not to.
Create a Guest Type
The Guest Type will determine the permissions the visitor will have.Go to Work Centers > Guest Access > Portals and Components.
Select “Guest Types” and click “Create”
Name the Visitor type to whatever you wish (Something like “VisitorManagementVisitor”)
Set the field “Account duration starts” to “From First Login”
Set the “Maximum account Duration” to however long you want (recommended 1 day)
Set the “Sponsor Groups” to the same group that you assigned to the sponsor in step 2. (Recommended “ALL_ACCOUNTS”)
Go back to Work Centers > Guest Access > Portals and Components and select “Sponsor Groups” and select the group you are using. Make sure this group can create accounts using the Guest Type we just created.
4. Make sure to Enable Access Cisco ISE guest accounts using the programmatic interface
(Guest REST API)
4. Copy the Portal ID
Go to Work Centers > Guest Access
Select “Sponsor Portals” and choose the “Sponsor Portal (default)” unless you have a specific reason to use a custom portal.
Right click on “Portal Test URL” and select “Copy Link Address” or click on the link to open the sponsor portal.
Paste this link somewhere safe to reference later.In the URL will be the Portal Identifier number. It is an alphanumeric string at the end. For example. in a URL of https://{sponsor URL}/sponsorportal/PortalSetup.action?portal= 23k4jq52-34k4-3lkj-534lkj540012 the Portal ID would be “23k4jq52-34k4-3lkj-534lkj540012”.Paste this Portal ID string
5. Copy location name
Go to Work Centers > Guest Access > Settings
Select “Guest Locations and SSID”
Choose your location and copy it and paste the name to same place you pasted the Portal ID.
6. Prep Authorization token
Take the Sponsor Username and Password, format them as “username:password" (ex: rcanby:123abc)
Encode in Base 64 (https://www.base64decode.org/)
Copy the encoded result and paste into same place as Portal ID and location name
Setting up GuestConnect to hit Cisco ISE
Push visitor data into Cisco ISE
In the Experience Editor, add a Guest Connect action. Set as “Device” based instead of “Server”.
Add input tokens for email, first name, last name, company, phone number. Map their respective values.
Configure HTTP action, set to POST
Enter URL “https://:9060/ers/config/guestuser/”
Set Headers:
{
"Accept" : "application/vnd.com.cisco.ise.identity.guestuser.2.0+xml",
"Authorization": "Basic Encrypted Authorization Token from Step 6 above",
"Content-Type" : "application/xml"
}
2. Set Body type to XML and fill with:
identity.ers.ise.cisco.com">
Location that was copied in Step 5 above
1
Company Token
Email Token
true
First Name Token
Last Name Token
Phone Number Token
Use a unique identifier (email or phone tokens would work)/userName>
Guest Type from Step 3 above
Portal ID from Step 4 above
Pull Password back from created Cisco Visitor
After the first GuestConnect action, add another one. Set as “Device” action
Configure HTTP action, set to GET
Enter URL “https://:9060/ers/config/guestuser/name/”
Set Headers:
{
"Accept" : "application/vnd.com.cisco.ise.identity.guestuser.2.0+xml",
"Authorization": "Basic Encrypted Authorization Token from Step 6 above",
"Content-Type" : "application/xml"|
}
Add OutPut token:
Parse LOCATION OF PASSWORD
2. Use a third Guest Connect Action to tokenize the WiFi password
Add a third device based Guest Connect action, create input token
Map out put from second action into input of third action
Use the token in third action wherever you wish to use the WiFi password
See badge example for printing the password
To learn more about the badge editor, check out THIS article.