Skip to main content
Skip table of contents

How to Integrate Cisco Identity Services Engine (ISE) pxGrid Direct Connect and IGEL UMS

Cisco ISE (Identity Services Engine) is a comprehensive, policy-based access control and identity management system developed by Cisco. It is widely used in enterprise networks to enhance security, streamline network access, and ensure compliance.

Key Features of Cisco ISE

Network Access Control (NAC)

  • Authenticates and authorizes users and devices before granting access to the network

  • Supports wired, wireless, and VPN access

Policy Enforcement

  • Allows administrators to define granular access policies based on user roles, device types, location, and other contextual data.

Guest Access Management

  • Provides secure guest access with customizable portals and self-registration options

BYOD (Bring Your Own Device) Support

  • Enables secure onboarding and management of personal devices without compromising network security

Posture Assessment

  • Evaluates the security posture of endpoints (e.g., antivirus status, OS updates) before allowing access

Integration with Other Cisco Products

  • Works seamlessly with Cisco switches, routers, wireless controllers, and firewalls

  • Integrates with Cisco TrustSec for scalable security policies

Visibility and Reporting

  • Offers detailed visibility into who and what is on the network

  • Provides rich reporting and analytics for compliance and troubleshooting

Use Cases

  • Enterprises looking to secure access to their networks

  • Organizations implementing Zero Trust architectures

  • Compliance-driven industries like healthcare, finance, and government

What Is Cisco ISE pxGrid Direct with CMDB?

Cisco ISE pxGrid Direct Connect with CMDB allows Cisco Identity Services Engine (ISE) to connect directly to external Configuration Management Databases (CMDBs), such as IGEL Universal Management Suite (UMS), using REST APIs. This enables real-time sharing and enrichment of endpoint data for improved network visibility, policy enforcement, and asset management.

What Does pxGrid Direct Do?

Introduced in Cisco ISE 3.2 and enhanced in subsequent versions, pxGrid Direct allows ISE to:

  • Connect directly to external REST APIs, such as those provided by CMDBs to fetch JSON-formatted endpoint data

  • Use that data in authorization policies without querying the external system every time.

This integration eliminates the need for custom connectors or intermediary platforms, streamlining the process of enriching ISE's context database with valuable asset information. This is especially useful for integrating with CMDBs, where device attributes (e.g., OS version, asset tags, compliance status) are stored.

By integrating Cisco ISE with CMDBs through pxGrid Direct, organizations can achieve a more comprehensive and dynamic security posture, leveraging detailed asset information to inform and enforce network access policies.

How It Works with CMDBs

  1. Connector configuration: Within ISE, administrators can set up a pxGrid Direct connector by specifying the REST API endpoint of the CMDB, along with authentication credentials.

  2. Data mapping: The connector is configured to identify and map relevant attributes from the CMDB's JSON data - such as asset tags, operating systems, IP addresses, and more - into ISE's dictionary. (See "Configure and Troubleshoot ISE 3.3 pxGrid Direct" by Cisco)

  3. Identifier specification: Two critical identifiers are defined:

    • Unique identifier: A distinct attribute in the CMDB (e.g., a system ID) that uniquely identifies each asset.

    • Correlation identifier: An attribute used to match CMDB records with ISE's existing endpoint data (e.g., MAC address or hostname). (See "Configure and Troubleshoot ISE 3.3 pxGrid Direct" by Cisco)

  4. Data synchronization: ISE can be configured to perform full or incremental data synchronizations at defined intervals, ensuring that the imported asset information remains current.

  5. Policy enforcement: The enriched data from the CMDB can then be utilized in ISE's authorization policies, allowing for more granular and informed access control decisions.

Integration Overview: Cisco ISE pxGrid Direct + IGEL UMS via IMI

Cisco ISE’s pxGrid Direct can integrate with IGEL Universal Management Suite (UMS) via its RESTful API, known as the IGEL Management Interface (IMI). By enabling this integration, organizations can retrieve detailed endpoint information from IGEL-managed devices, enhancing ISE’s network visibility and enabling policy-based access control for IGEL-managed devices.

A screenshot of a computer  AI-generated content may be incorrect.

What Is IMI?

The IGEL Management Interface (IMI) is a RESTful API that allows external systems to interact with IGEL UMS. IMI is platform-agnostic and designed for interoperability. It supports operations like:

  • Listing endpoint devices

  • Reading device attributes (e.g., MAC address, IP address, firmware version)

  • Managing device states (e.g., reboot, move between directories)

For more information, see these articles on the IGEL KB: IGEL Management Interface (IMI)

Requirements

  • Cisco ISE version 3.2 Patch 2 or higher

  • IGEL UMS 12.08.130 or higher

  • An appropriate license. Please note that add-on licenses may be required for certain features within IGEL OS (e.g., 90Meter). UMS Standard, Enterprise, Healthcare, or Government editions include the IMI feature; for details, see IGEL OS Editions.

Integration

By configuring pxGrid Direct to communicate with IGEL’s IMI, ISE can import asset information like MAC addresses, device names, firmware versions, enrollment status, and more. This data can then be used to inform and enforce network access policies within ISE.

Implementation Steps – IGEL UMS

  1. Install or upgrade to UMS version 12.08.130 or higher.

  1. Ensure that IGEL UMS is accessible via its IMI REST API, typically on port 8443. See this KB article - Prerequisites

  1. Create a UMS admin account with Read/Browse permission at the Devices level. No global UMS admin permissions are required.

A screenshot of a computer  AI-generated content may be incorrect.

  1. To enable direct authorization for IMI calls, open <INSTALLATION DIRECTORY>\rmguiserver\conf\catalina.properties and add the following line to it: de.igel.imi.directAuthorization=true

  1. Restart the UMS.

IMI uses HTTPS to ensure the integrity and confidentiality of the network traffic. It is good practice to use a valid server certificate with a verifiable signature. Most clients and ibraries can be configured to work with self-signed or invalid certificates, but that should not be done in a production environment.

If certificate validation is required, ISE must trust the root chain that signs the UMS certificate.

Integration Steps – Cisco ISE pXGrid Direct Connect

This procedure involves a script that derives a structure tag from the device’s MAC address. It also works with devices that have multiple network devices (Ethernet, Wifi). The script is deployed on the device via a UMS profile.

  1. In ISE, create a pxGrid Direct connector pointing to the IGEL IMI endpoint. This can be either of these two options:

Important: Wrapper/Category Required

ISE needs a wrapper/category to show the results in a dictionary. For the thinclient and thinclientview endpoint URL, use the wrapper results in ISE to direct to these results.

Example request:

CODE
GET {{url}}/umsapi/v3/thinclients?facets=details&response-wrapper=true
Authorization: Basic {{authBasic}}

Example Response (snippet):

CODE
{
 "results": [
  {
   "unitID": "0050569373B6",
   "mac": "0050569373B6",
   ...
   "registrationDate": "04.06.2025 08:09:56",
   "isThinClientRegistered": "true",
   ...
  }
 ]
}

  1. Identify and map the relevant attributes from IGEL’s IMI to ISE’s endpoint attributes.

Mandatory

Optional (but key for C2C/Compliance)

  • umsStructuralTag

  • unitID

  • isThinClientRegistered

  • configChanges

  • osType

  • memorySize

  • deviceType

  • deviceSerialNumber

  • cpuType

  • cpuSpeed

  • biosVendor

  • biosVersion

  • biosDate

  • firmwareID

  1. In the UMS, create a profile and go to System > System Customization > Custom Commands > Network.

  1. Enable the field Final network command and enter the following script into it:

CODE
rmagent-set-structure-tag -t $(ip addr show | awk '
  /^[0-9]+: [^:]+:/ {
    iface = $2; sub(":", "", iface)
    state = /state UP/ ? "UP" : "DOWN"
  }
  /link\/ether/ && state == "UP" && iface != "lo" {
    if (iface ~ /^en/ || iface ~ /^eth/) {
      print toupper($2); exit
    } else if (!wifi) {
      wifi = toupper($2)
    }
  }
  END { if (!mac) print wifi }
')

sleep 2

rmagent-update-device-info
image-20260121-105433.png
image-20260121-105702.png
image-20260121-105717.png

  1. Configure pxGrid Direct to perform regular data synchronizations, ensuring that ISE has up-to-date information from IGEL UMS.

Currently, the lowest automated setting is 12 hours, but it can be run manually.

Considerations

  • Data accuracy: Regularly verify that the data imported from IGEL UMS is accurate and reflects the current state of your endpoints.

  • Security: Ensure secure communication between Cisco ISE and IGEL UMS by using HTTPS and proper authentication mechanisms.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.