An administrator must configure Cisco ISE to authenticate a user accessing a Cisco Adaptive Security Appliance firewall using SSH. The solution must meet these requirements:
• The local Cisco ISE database must be used for user authentication
• ASA commands run by users must be validated
The configurations were performed:
• added the Cisco Adaptive Security Appliance firewall
• configured user accounts
• enabled Device Admin Service in Cisco ISE
• configured a TACACS profile
• configured an authorization policy
• configured the Cisco Adaptive Security Appliance firewall for authentication and authorization
Which two actions must be taken in Cisco ISE? (Choose two.)