Improve Expiration date utilization #81
Replies: 4 comments 6 replies
-
This is a interesting request and when I get some time I'll look into it more. |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
I receive this error when trying to change the attribute value using ipsk-db-user. It complains about TRIGGER command being denied to ipsk-ise-user. |
Beta Was this translation helpful? Give feedback.
-
The ISE DB user is one that is used for the ISE ODBC connection. ISE shouldn't be executing updates like that. Do you have your DB accounts swapped? The error is showing its using the ISE user not db user for the call. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
As per my testing, in order to have any device expiration we will not be able to have devices with no expiration when using a single Authorization Profile. If we want to have device with expiration, we would need to have one Authorization profile setting the maximum access term, and another one setting up "No expiration". And that requires to have two Endpoint groups, one to each authorization profile. And if the user wants to put expiration to a device previously created with no expiration, he would need to delete and create again on the group with expiration, only admins are able to change the grouping, the users should be able to change the grouping based on the the grouping they have access.
Suggestion #1 - remove "Extend". It doesn't make much sense when you are, for instance, changing the expiration to a closer date...
Suggestion #2 - Add "Set expiration". And be able to choose "Never" as well as any other period, if "Never" is allowed in the authorization Profile.
Suggestion #3 - add "Edit Endpoint Grouping" to user portal, so they can change to another group also associated with his portal.
Beta Was this translation helpful? Give feedback.
All reactions