<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access policy for MyDevices Portal in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/4431324#M6205</link>
    <description>&lt;P&gt;Oh, thank you very much!&lt;/P&gt;&lt;P&gt;I have already been prompted for a similar solution.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-sponsor-amp-my-devices-authorization-on-secondary-attributes/ta-p/3641379" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-sponsor-amp-my-devices-authorization-on-secondary-attributes/ta-p/3641379&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This solution is really from the category of hacking skill )) But it works!&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 12 Jul 2021 06:22:10 GMT</pubDate>
    <dc:creator>vigogne</dc:creator>
    <dc:date>2021-07-12T06:22:10Z</dc:date>
    <item>
      <title>Access policy for MyDevices Portal</title>
      <link>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/4312770#M6055</link>
      <description>&lt;P&gt;Tell me please. Is it is possible to create an access policy for the MyDevices portal to allow access only to a certain group in AD?&lt;BR /&gt;At the moment, I have done this way:&lt;/P&gt;&lt;P&gt;In the Identity Source Sequences at MyDevice_Portal_Sequence I left "Internal Users" Identity Source only. Then I added the Network Access User with the same name as in the AD Database and password type as AD Sequence.&lt;/P&gt;&lt;P&gt;It works, but it is very inconvenient and not flexible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And second question. How can I modify MyDevices Portal for add in standard form combo-box with selecting endpoint group?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 05:59:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/4312770#M6055</guid>
      <dc:creator>vigogne</dc:creator>
      <dc:date>2021-03-24T05:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: Access policy for MyDevices Portal</title>
      <link>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/4314253#M6062</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can post your query in the below community channel:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/bd-p/discussions-network-access-control" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/bd-p/discussions-network-access-control&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Pratham&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 05:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/4314253#M6062</guid>
      <dc:creator>ppreenja</dc:creator>
      <dc:date>2021-03-26T05:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: Access policy for MyDevices Portal</title>
      <link>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/4314260#M6063</link>
      <description>&lt;P&gt;Thank you!&amp;nbsp;Perhaps this is what I will do )&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 05:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/4314260#M6063</guid>
      <dc:creator>vigogne</dc:creator>
      <dc:date>2021-03-26T05:46:25Z</dc:date>
    </item>
    <item>
      <title>Re: Access policy for MyDevices Portal</title>
      <link>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/4431307#M6204</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/585622"&gt;@vigogne&lt;/a&gt;&amp;nbsp; and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/813487"&gt;@ppreenja&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have not scanned the Community questions in a little while and this one passed me by. But I have a solution for you. Did you find a solution in the end?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It so happens that I saw this work in a customer and it's quite unbelievable.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The trick is to tell the MyDevices Portal to NOT use AD or ISE Local users as the Authentication source, but use ISE Loopback addresses instead.&amp;nbsp; WHAT? ISE has loopback addresses as an Identity Source?&amp;nbsp; No, not by default, but this is where the hack starts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create a Loopback by defining ISE as a "RADIUS Token Server" - you're telling ISE that there is a token server (which is itself … max up to 2 servers can be defined.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The RADIUS shared secret must be the same as the shared secret mentioned further below … it's not used anywhere else other than here (in the token server definition) and later on, in the ISE NAD definition.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Then use that ISE Loopback definition to modify the standard My Devices Sequence&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hilarious isn't it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; You have to create RADIUS Clients (NAD) definitions for each of the token servers (which in production would be most likely dedicated PSN nodes) - create a new Device TYPE called ISE_MyDevicesPortal (or whatever) and then use the same RADIUS shared secret as used before in the Token server definition.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have some screenshots but they are taken from a customer setup&amp;nbsp; -I have not sanitised them for this Community - but I think you should be ok with the information above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The bottom line is that with this hack, The My Devices Portal will cause ISE to make RADIUS requests to ITSELF and you can catch these requests in the standard Policy Set.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know how you get on&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jul 2021 05:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/4431307#M6204</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-07-12T05:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Access policy for MyDevices Portal</title>
      <link>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/4431324#M6205</link>
      <description>&lt;P&gt;Oh, thank you very much!&lt;/P&gt;&lt;P&gt;I have already been prompted for a similar solution.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-sponsor-amp-my-devices-authorization-on-secondary-attributes/ta-p/3641379" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-sponsor-amp-my-devices-authorization-on-secondary-attributes/ta-p/3641379&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This solution is really from the category of hacking skill )) But it works!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jul 2021 06:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/4431324#M6205</guid>
      <dc:creator>vigogne</dc:creator>
      <dc:date>2021-07-12T06:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: Access policy for MyDevices Portal</title>
      <link>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/5318309#M8944</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;I had question, I can get this solution to work in 3.4 however it is saying PAP not allowed, is there a way to change the auth type for my device portal to something more secure?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 20:13:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/access-policy-for-mydevices-portal/m-p/5318309#M8944</guid>
      <dc:creator>spartan78</dc:creator>
      <dc:date>2025-08-06T20:13:28Z</dc:date>
    </item>
  </channel>
</rss>

