<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289686#M108078</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why can't ISE check user authorization when the laptop connects via WLAN? Don't you use 802.1X user auth on WLAN? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the first rule you mentioned that allows computer access?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 25 Aug 2013 19:02:24 GMT</pubDate>
    <dc:creator>Peter Koltl</dc:creator>
    <dc:date>2013-08-25T19:02:24Z</dc:date>
    <item>
      <title>ISE authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289682#M108074</link>
      <description>&lt;P&gt;HI All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope someone is able to help with the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We currently use ISE to authenticate domain users connecting to our corporate wifi. ISE checks Windows AD for the wireless policy. The issue is that once a machine connects to the wifi, it allows any user to connect regardless of whether that user is allowed access in a later policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We would like to configure authorization so that it uses Computer and User authorization, ie only if the computer and users are in AD, can the user successfully authenticate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem with this config is that I can log onto a Corp laptop as a local user, and still get access to the Corporate Wifi.&lt;/P&gt;&lt;P&gt;The reason being that the connection hits the first rule which allows computer access, and doesn't check that the user authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd therefore like to configure ISE so that it checks for computer and user authentication together, so that both parts need to be met before access is allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Craig&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289682#M108074</guid>
      <dc:creator>craig bache</dc:creator>
      <dc:date>2019-03-11T03:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289683#M108075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Craig&lt;BR /&gt;&lt;BR /&gt;Eap chaining will do what you want. But there are limitations ..&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.1.1/user_guide/ise_auth_pol.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/ise/1.1.1/user_guide/ise_auth_pol.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 02:11:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289683#M108075</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2013-08-23T02:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289684#M108076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Craig&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"&gt;Authentication policies define the protocols that Cisco ISE should use to communicate with the network&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"&gt;devices, and the identity sources that it should use for authentication. A policy is a set of conditions and&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"&gt;a result. A policy condition consists of an operand (attribute), an operator (equal to, not equal to, greater&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"&gt;than, and so on), and a value. Compound conditions are made up of one or more simple conditions that&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"&gt;are connected by the AND or OR operator. At runtime, Cisco ISE evaluates the policy condition and then&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"&gt;applies the result that you have defined based on whether the policy evaluation returns a true or a false&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"&gt;value.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;During policy condition evaluation, Cisco ISE compares an attribute with a value. It is possible to run&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"&gt;into a situation where the attribute specified in the policy condition may not have a value assigned in the&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"&gt;request. In such cases, if the operator that is used for comparison is “not equal to,” then the condition&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"&gt;will evaluate to true. In all other cases, the condition will evaluate to false.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 09:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289684#M108076</guid>
      <dc:creator>Muhammad Munir</dc:creator>
      <dc:date>2013-08-23T09:15:02Z</dc:date>
    </item>
    <item>
      <title>ISE authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289685#M108077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV id="__tbSetup"&gt; &lt;/DIV&gt;&lt;P&gt;EAP Chaining which uses a machine certificate or a machine username / password locked to the device through the Microsoft domain enrollment process. When the device boots, it is authenticated to the network using 802.1X. When the user logs onto the device, the session information from the machine authentication and the user credentials are sent up to the network as part of the same user authentication. The combination of the two indicates that the device belongs to the corporation and the user is an employee.&lt;/P&gt;&lt;P&gt;If the device is not a member of the domain, then the machine authentication fails and the device is not a corporate device. If the device does not support EAP Chaining, then the device is also not a corporate device. In either case, the result would be to treat these devices differently than the corporate device. That could be limited access for employee owned devices and out to the Internet for non-employee devices depending on corporate policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For&amp;nbsp; EAP Chaining configuration (trustsec design guide)&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/solutions/collateral/ns340/ns414/ns742/ns744/docs/howto_80_eapchaining_deployment.pdf"&gt;http://www.cisco.com/en/US/solutions/collateral/ns340/ns414/ns742/ns744/docs/howto_80_eapchaining_deployment.pdf&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Aug 2013 14:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289685#M108077</guid>
      <dc:creator>Venkatesh Attuluri</dc:creator>
      <dc:date>2013-08-25T14:27:58Z</dc:date>
    </item>
    <item>
      <title>ISE authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289686#M108078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why can't ISE check user authorization when the laptop connects via WLAN? Don't you use 802.1X user auth on WLAN? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the first rule you mentioned that allows computer access?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Aug 2013 19:02:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289686#M108078</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2013-08-25T19:02:24Z</dc:date>
    </item>
    <item>
      <title>ISE authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289687#M108079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would request you to share the your ISE policy with us so that we can come to know how you implemented the authorization policies and check what is going wrong.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 03:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-authentication/m-p/2289687#M108079</guid>
      <dc:creator>Ravi Singh</dc:creator>
      <dc:date>2013-08-29T03:33:22Z</dc:date>
    </item>
  </channel>
</rss>

