CHAPTE R
10-1
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
10
Managing Access Policies
In ACS 5.4, policy drives all activities. Policies consist mainly of rules that determine the action of the
policy. You create access services to define authentication and authorization policies for requests. A
global service selection policy contains rules that determine which access service processes an incoming
request.
For a basic workflow for configuring policies and all their elements, see Flows for Configuring Services
and Policies, page 3-19. In general, before you can configure policy rul es, you must configure all the
elements that you will need, such as identities, conditions, and authorizations and permissions.
For information about:
Managing identities, see Chapter 8, “Managing Users and Identity Stores.”
Configuring conditions, see Managing Policy Elements, page 9-1.
Configuring authorizations and permissions, see Configuring System Operations, page17-1.
This section contains the following topics:
Policy Creation Flow, page10-1
Customizing a Policy, page 10-4
Configuring the Service Selection Policy, page10-5
Configuring Access Services, page10-11
Configuring Access Service Policies, page10-22
Configuring Compound Conditions, page 10-41
Security Group Access Control Pages, page 10-46
Maximum User Sessions, page 10-51
For information about creating Egress and NDAC policies for Cisco Security Group Access, see
Configuring an NDAC Policy, page4-25.

Policy Creation Flow

Policy creation depends on your network configuration and the degree of refineme nt that you want to
bring to individual policies. The endpoint of policy creation is the access service that runs as the result
of the service selection policy. Each policy is rule driven.