<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Active Directory enrollment authentication in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/active-directory-enrollment-authentication/m-p/5442895#M12765</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am still confused about the changelog entry of the current agent version 4.2.2.&lt;BR /&gt;It says the following:&lt;BR /&gt;[Update] Removed support for Active Directory enrollment authentication (local unencrypted LDAP proxy).&lt;/P&gt;&lt;P&gt;Does this mean that the connection to the AD no longer works?&lt;BR /&gt;I had opened a ticket and was told that LDAPS (secure) would work. On my test client, however, I don't see a single request going out to the domain controller in Wireshark.&lt;/P&gt;</description>
    <pubDate>Fri, 02 Aug 2024 06:44:03 GMT</pubDate>
    <dc:creator>Marcel Kamenz</dc:creator>
    <dc:date>2024-08-02T06:44:03Z</dc:date>
    <item>
      <title>Active Directory enrollment authentication</title>
      <link>https://community.cisco.com/t5/endpoint-security/active-directory-enrollment-authentication/m-p/5442895#M12765</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am still confused about the changelog entry of the current agent version 4.2.2.&lt;BR /&gt;It says the following:&lt;BR /&gt;[Update] Removed support for Active Directory enrollment authentication (local unencrypted LDAP proxy).&lt;/P&gt;&lt;P&gt;Does this mean that the connection to the AD no longer works?&lt;BR /&gt;I had opened a ticket and was told that LDAPS (secure) would work. On my test client, however, I don't see a single request going out to the domain controller in Wireshark.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2024 06:44:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/active-directory-enrollment-authentication/m-p/5442895#M12765</guid>
      <dc:creator>Marcel Kamenz</dc:creator>
      <dc:date>2024-08-02T06:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory enrollment authentication</title>
      <link>https://community.cisco.com/t5/endpoint-security/active-directory-enrollment-authentication/m-p/5442896#M12766</link>
      <description>&lt;P&gt;Nobody out there using the AD enrollment auth? Any suggestions how to automate the enrollment without this?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 20:48:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/active-directory-enrollment-authentication/m-p/5442896#M12766</guid>
      <dc:creator>Marcel Kamenz</dc:creator>
      <dc:date>2024-08-26T20:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory enrollment authentication</title>
      <link>https://community.cisco.com/t5/endpoint-security/active-directory-enrollment-authentication/m-p/5442897#M12767</link>
      <description>&lt;P&gt;I don't use AD enrollment but, updating your LDAP proxy and/or your AD servers (if they're not already) to use LDAPS is probably the easiest. Especially if you were already using AD authentication. Running it with a certificate and turning on SSL/TLS over port 636 is kind of the basis of that.&lt;/P&gt;&lt;P&gt;If you don't want to bother with that, you can still fully manage devices inside of Systems Manager. Configure your enrollment settings with a certificate authority cert, create automated enrollment profiles, assign profiles to computers or to users you create in Meraki, use tags to manage device and software deployments, and create profiles inside of Meraki and assign those to your tags.&lt;/P&gt;&lt;P&gt;Not sure what your current setup is but, there's a few ways get the end result depending on what you're wanting. Enabling LDAPS sounds like the cleanest option in your case since your basically there already without the encryption.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 22:07:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/active-directory-enrollment-authentication/m-p/5442897#M12767</guid>
      <dc:creator>nbv1</dc:creator>
      <dc:date>2024-08-27T22:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory enrollment authentication</title>
      <link>https://community.cisco.com/t5/endpoint-security/active-directory-enrollment-authentication/m-p/5442898#M12768</link>
      <description>&lt;P&gt;It doesn't mean AD connections no longer work. The update just removed support for unencrypted LDAP. Secure connections via LDAPS should still be fine. If you're not seeing any traffic, maybe double-check the LDAPS configuration or make sure the correct ports are open?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 16:33:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/active-directory-enrollment-authentication/m-p/5442898#M12768</guid>
      <dc:creator>Gelo1</dc:creator>
      <dc:date>2024-09-19T16:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory enrollment authentication</title>
      <link>https://community.cisco.com/t5/endpoint-security/active-directory-enrollment-authentication/m-p/5442899#M12769</link>
      <description>&lt;P&gt;Certificate was good hint, I hadn't thought of that. &lt;SPAN class="lia-unicode-emoji" title=":dizzy_face:"&gt;&lt;span class="lia-unicode-emoji" title=":dizzy_face:"&gt;😵&lt;/span&gt;&lt;/SPAN&gt;&lt;BR /&gt;But sure, it's encrypted -&amp;gt; cert needed.&lt;/P&gt;&lt;P&gt;Test will follow....&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 06:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/active-directory-enrollment-authentication/m-p/5442899#M12769</guid>
      <dc:creator>Marcel Kamenz</dc:creator>
      <dc:date>2024-09-23T06:28:16Z</dc:date>
    </item>
  </channel>
</rss>

