Skip to content
→
Skip to footer
→
Skip to search
→
Connect with
Confidence
English
Deutsch
Español
Français
中文
Blog
Sign In
How to Buy
Contact Us
Search
Popular Searches:
XCTU
XBee
AnywhereUSB
Industrial Routers
Drivers & Firmware
Solutions
Solutions Home
By Industry
Education
Energy
Industrial
Medical
Retail
Smart Cities
Transportation
All Industries
By Application
Asset and Inventory Management
Digital Signage
Environmental Monitoring
Green Technology
Public Safety and Emergency Services
Public Transit
Traffic Management
All Applications
Packaged Solutions
Digi 360
Digi LifeCycle Assurance
Managed Services
Opengear OOB Solutions
SmartSense Monitoring Solutions
Ventus Managed Network Solutions
Technologies
Technologies Home
DAL OS
Digi Accelerated Linux operating system delivers sophisticated device functionality.
Digi SureLink
Persistent network connections ensuring rapid, always-on communications.
Digi TrustFence
Integrated IoT device security framework, device identity and data privacy.
Featured Technologies
4G LTE Cellular
5G Connectivity
Bluetooth
Cellular Failover
Edge Computing
FIPS 140-2
FirstNet
Fixed Wireless Access
Gigabit-Class LTE
LoRaWAN
Out-of-Band Management
Private Networks
SD-WAN
USB Over IP
Voice Control
Zigbee Wireless Mesh
All Technologies >
Products
Products Home
Embedded Systems
Digi XBee
Digi XBee Home
Cellular Modems
LoRaWAN
RF Modules
Gateways
Development Kits
Software and Tools
XBee Studio
XCTU
Cellular Data Plans
Digi ConnectCore
Digi ConnectCore Home
System-on-Modules
Single Board Computers
Development Kits
Software and Tools
Cloud Services
Security Services
Cellular and Networking
Cellular Routers and Endpoints
Cellular Routers and Endpoints Home
Enterprise Routers
Industrial Routers
Transportation Routers
Software and Tools
Digi Remote Manager
Digi Containers
Digi Mobile VPN
Digi WAN Bonding
Digi 360
Infrastructure Management
Infrastructure Management Home
Industrial Automation
USB Connectivity
Serial Connectivity
Console Servers
Software and Tools
Digi Navigator
Digi Remote Manager
Digi Axess
Digi LifeCycle Assurance
Professional Services
Managed Connectivity Services
Implementation Services
Application Development
Wireless Design Services
Resources
Resources Home
Resource Library
Datasheets
Ebooks
Solution Briefs
Technical Briefs
Videos
White Papers
All Library Resources
Customer Stories
Events
Examples and Guides
Digi Logos and Photos
Product Certifications
Project Gallery
Security Center
Webinars
More Videos
Support
Support Home
Technical Support
Select your product for firmware, drivers, software, knowledge base articles and manuals.
Select Your Product
Customer Portal
Product Certifications
Professional Services
Security Center
Support Forum
Support Services
Company
Company Home
About Digi
Awards and Recognition
Careers
Investor Relations
Leadership
Locations
Media Coverage
Press Releases
Partners
Partner Portal Login
Network Operators
Technology Alliances
Value-Added Resellers
Opengear, A Digi Company
Smart Out-of-Band Management
Visit Opengear
SmartSense by Digi
Sensing-as-a-Service Solutions
Visit SmartSense
Ventus, A Digi Company
Managed Network-as-a-Service (MNaaS)
Visit Ventus
Blog
Sign In
How to Buy
Home
/
Support
/
Knowledge Base
/
Use RADIUS for Device Administration with Cisco ISE server
Use RADIUS for Device Administration with Cisco ISE server
With Internal users identity, you have to create an account on the Cisco ISE local users database:
With the next step, you have to add your device as a Radius client on the Cisco ISE server:
Create a new entry for the Digi device in the Vendors list:
Assign Vendor ID,attribute and name next:
Create a Network Device Profile and assign an appropriate Radius Dictionary for the Digi device.
Create an Authorization profile and assign a value of “admin” to the Radius attribute Unix-FTP-Group-Names:
Create an Authentication and Authorization Policy for this local user account:
Add Radius server IP address and password on the Digi device:
The configuration for Radius authentication is now complete.
Below are extra configurations steps to use Windows LDAP Active Directory (AD) server as an external identity source
1. Add connection to the Windows Active Directory (AD) server :
2. Add groups that you wish to use for authorization:
3. Create a Policy Set for LDAP AD authentication:
4. Create an Authentication Policy and set up AD as an external source for authentication:
5. Create an Authorization Policy to point to the right AD security group for authorization:
6. Do not forget to add the user`s account to this security group on the Windows server:
The configuration is now complete and authentication using Radius with LDAP via Windows Active Directory is operational
Below is an example log output with a successful authentication and authorization on the Cisco ISE server:
Last updated: Jan 01, 2024
Filed Under
Network
Recently Viewed
No recently viewed articles
Did you find this article helpful?