All Collections
Cisco ISE Application
Cisco ISE Application
Cisco Identity Services Engine (ISE) helps businesses control and monitor network access.
Updated over a week ago

Cisco Identity Services Engine (ISE) helps businesses control and monitor network access. It also allows companies to set up specific Wi-Fi rules for temporary users such as visitors or contractors.

How does this application work?

When a visitor signs in using Visitors, they will be automatically created as a visitor in Cisco ISE as well. If the visitor provided an email address and/or phone number, they will receive an email and/or SMS that shares instructions on how to access your company’s guest Wi-Fi network.

Enabling the Envoy + Cisco ISE application

Step 1: Setting up a sponsor

To provision Wi-Fi using Cisco ISE, every user must have a sponsor. In this step, you’ll create a new sponsor that will be the sponsor for every visitor that signs in with Envoy.

  1. Open your ISE instance and log in with an admin account.

  2. Go to Administration > Identity management > Identities.

  3. Select Users from the sidebar, and click “Add.” 

  4. In the Name field, choose a name for your sponsor. You can use any name, but we recommend choosing something like Envoy_Sponsor. Under Status, choose “Enabled.” Under Password Type, choose “Internal users.” Then, create a password. Make a note of this password, since you’ll need it later. Under User Groups, choose your preferred user group. We recommend choosing ALL_ACCOUNTS unless you have already configured a special user group for Envoy visitors.

Step 2: Setting up a guest type

The Cisco ISE guest type will determine the level of access that users will have. In this step, you’ll create a guest type for visitors that sign in with Envoy.

  1. With Cisco ISE, go to Work Centers > Guest Access > Portals and Components.

  2. Select Guest Types from the sidebar, and click “Create.” 

  3. In the Guest type name field, choose a name for your guest type. You can use any name, but we recommend using something like Envoy_Visitor.

  4. Under Maximum Access Time, find Account duration starts and select “From first login.” Login Options – The system administrator can allow guest types to bypass the Guest portal (if applicable). In this case, the guest accounts created using this guest type are enabled automatically, and their states display as Active, even if the guests have not yet logged into a Cisco ISE web portal. If this option is not configured, the accounts are not enabled until the guests actually log into a web portal, and their initial states display as Created.

  5. Directly below, under Maximum account duration, select the number of days you’d like to allow Wi-Fi access to your visitors. Please note, the number of days designated here must be less than the number of days set in your general Password Lifetime. You can find Password Lifetime settings under Admin > Identity Management > Settings. In the sidebar, choose User Authentication Settings. Check your password lifetime under Password Lifetime.  

  6. Under Account Expiration Notification, do not select email or SMS. Leave these boxes unchecked. Do not configure notifications within Cisco ISE, because all notifications are sent through Envoy.

  7. Under Sponsor Groups, select the user group you assigned to the sponsor you created above. We recommended using ALL_ACCOUNTS, but you may have configured a special user group for Envoy visitors.

  8. Ensure the sponsor group that your sponsor is in (likely ALL_ACCOUNTS) has the ability to create accounts that include the Guest Type you created. To do so, go to Work Centers > Guest Access > Portals and Components. From the sidebar, choose Sponsor Groups and choose your sponsor group. Find “This sponsor group can create accounts using these guest types,” and ensure the guest type you just created (here, you’ll see Envoy_Visitor is in this list). Ensure “Access CISCO ISE guest accounts using the programmatic interface (Guest REST API)” box is checked.

    1. Note: You do not need to give the sponsor user admin privileges to the ERS API; in fact, it will cause errors if you do so.

Step 3: Find your Portal ID

  1. Within Cisco ISE, go to Work Centers > Guest Access.

  2. Select Sponsor Portals from the sidebar, then choose the portal you plan to use. You can use the default [called (Sponsor Portal (default)] or your own preferred portal.

  3. Find Portal Test URL. Right-click on the text and choose “Copy link address.” This will copy the URL. Paste this URL into a note on your computer. You’ll need it later. 

Step 4: Find your location name

  1. Within Cisco ISE, go to Work Centers > Guest Access > Settings.

  2. Select Guest Locations and SSID from the sidebar.

  3. Choose any location, and make a note of the exact spelling and capitalization of the location name. You’ll need this later.

Step 5: Whitelist IP addresses (if applicable)

If your Cisco ISE instance is behind a firewall, you’ll need to whitelist two IP addresses. If not, please skip to step 6.

  • (Envoy production)

  • (development & troubleshooting)

You will need to NAT your ISE Policy administration node on port 9060 to allow communication from the Envoy system at IP addresses.

Step 6: Enable ERS API service

In order to access Cisco ISE’s API, you’ll need to enable ERS API service. The ERS APIs are disabled by default for security so you must enable it.

  1. In Cisco ISE, login to your ISE PAN. 

  2. Navigate to Administration > System > Settings and select ERS Settings from the left panel.

  3. Enable the ERS APIs by selecting Enable ERS for Read/Write.

    1. Click the Enable ERS for Read for All Other Nodes radio button if there are any secondary nodes in your deployment.

      1. External RESTful Service requests of all types are valid only for primary Cisco ISE nodes. Secondary nodes have read-access (GET requests).

  4. Select “Save” to save your changes.

  5. You may use the default admin account to view the ISE ERS Software Development Kit (SDK) at

    1. Note: You do not need to give the sponsor user admin privileges to the ERS API; in fact, it will cause errors if you do so.

Step 7: Enable Cisco ISE application in Envoy

  1. Find Cisco ISE under the "Wi-Fi" category and click “Configure.”

  2. Reference the notes you took earlier to fill in the fields on the Configure Server step. Enter the location name you noted in Step 4 above.

    1. Note: it must match the exact spelling and capitalization shown in Cisco ISE. Enter your ISE IP or domain and your ISE port.

  3. Under "Sponsor" enter your sponsor name and password created in Step 1 above.

  4. Under "Guest Type" select or enter your Guest Type dependent on the ISE version deployed. Guest Type would have been created in Step 2 above.

  5. Enter your Guest Type credential duration period in days, if using ISE 2.2 or greater we will inherit the default duration configured under the Guest Type.

    1. Note: If your ISE version is v.2.1 or lower, you will need to manually enter your guest type name from your ISE instance (must match exactly) in the second field listed, and then in the third field you can input your desired duration for that guest type.

  6. Enter a comma-separated list of visitor names, emails, or other keywords that you want to block from receiving credentials. Example keywords: “Friends & Family, Delivery, Shipping Dock Visitor”

  7. Optional: Enter a custom message and logo.


  • When credential creation fails after successfully completing set up within Envoy, confirm the following ISE settings are updated: change the maximum account duration to at least 1 day and also ensure that the account duration starts setting is checked for “From first login”.

Did this answer your question?