<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic for cisco recommended method in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365878#M118995</link>
    <description>&lt;P&gt;for cisco recommended method of deployment with Multiple AD Domains check&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_45_multiple_active_directories.pdf&lt;/P&gt;</description>
    <pubDate>Fri, 18 Apr 2014 12:20:13 GMT</pubDate>
    <dc:creator>Venkatesh Attuluri</dc:creator>
    <dc:date>2014-04-18T12:20:13Z</dc:date>
    <item>
      <title>Cisco ISE - multiple AD - trust relationships</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365876#M118993</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a customer who has multple AD forests and an ISE deployment running 1.1.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The customer scenario is as follows - there is an Internal AD forest (internal users) and an External AD forest (external users such as consultants). The objective is to use Cisco ISE to authenticate and authorize the users in both AD forests. CIsco ISE is connected to the Internal AD forest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We know that multiple AD support is coming in 2014 with versioon 1.3 - other options such as LDAP/EAP-TLS are not a viable option for the customer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Currently&amp;nbsp; – the Internal AD forest has an External, Non-transitive – one-way trust with the External Forest &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The objective here is to use a feature called Selective Authentication&amp;nbsp; in order to filter the outgoing requests from the External Forest to the Internal Forest – this is a selective trust feature that can be used to control access to specific resources in Internal Forest and for authentication between Internal/External Forest via Cisco ISE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Preliminary testing has shown that a one way trust seems to work for Cisco ISE authentication/authorization&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Further testing is underway to test the Selective Authentication feature (ie restrict access to specific resources etc…)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question : has any one used this and is this a supported method by Cisco (I know they mention a mutual trust relationship is required)? &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; We are exploring a second scenario - the Internal AD forest will have an External, Non-transitive – two-way trust with the External Forest &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Same objectives as in&amp;nbsp; 1 – we would attempt to use the Selective Authentication in the following fashion (this is an example) &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; External Forest has outgoing filter to allow access to specific resources in Internal Forest, and for authentication&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ii.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Internal Forest has incoming filter to deny access to all resources in External Forest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case we would filter so it resembles a 1 way trust relationship - anyone try this, anyone know if this would be a supported method by Cisco?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your replies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert C.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:09:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365876#M118993</guid>
      <dc:creator>rcianci</dc:creator>
      <dc:date>2019-03-11T04:09:53Z</dc:date>
    </item>
    <item>
      <title>Multiple AD functionality</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365877#M118994</link>
      <description>&lt;P&gt;Multiple AD functionality will be supported in ISE 1.3 release and it would be available in July 2013.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 16:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365877#M118994</guid>
      <dc:creator>manjeets</dc:creator>
      <dc:date>2014-04-16T16:17:23Z</dc:date>
    </item>
    <item>
      <title>for cisco recommended method</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365878#M118995</link>
      <description>&lt;P&gt;for cisco recommended method of deployment with Multiple AD Domains check&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_45_multiple_active_directories.pdf&lt;/P&gt;</description>
      <pubDate>Fri, 18 Apr 2014 12:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365878#M118995</guid>
      <dc:creator>Venkatesh Attuluri</dc:creator>
      <dc:date>2014-04-18T12:20:13Z</dc:date>
    </item>
    <item>
      <title>This functionality will be</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365879#M118996</link>
      <description>&lt;P&gt;This functionality will be added in cisco ISE 1.3 expected to be release mid of September and yes two way trust in the interm solution&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2014 13:28:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365879#M118996</guid>
      <dc:creator>kaaftab</dc:creator>
      <dc:date>2014-05-20T13:28:18Z</dc:date>
    </item>
    <item>
      <title>ISE 1.3 is availble now and</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365880#M118997</link>
      <description>&lt;P&gt;&lt;STRONG&gt;ISE 1.3 is availble now and its support multiple AD integration.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2014 06:48:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365880#M118997</guid>
      <dc:creator>manjeets</dc:creator>
      <dc:date>2014-11-20T06:48:46Z</dc:date>
    </item>
    <item>
      <title>HI,Is there some</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365881#M118998</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;Is there some configuration step by step about multiple AD integration?. Is it necessary a trust relationship between the ADs?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2014 19:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365881#M118998</guid>
      <dc:creator>cyndialarconc</dc:creator>
      <dc:date>2014-11-24T19:23:29Z</dc:date>
    </item>
    <item>
      <title>Cisco has published a nice</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365882#M118999</link>
      <description>&lt;P&gt;Cisco has published a &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/1-3/ISE-ADIntegrationDoc/b_ISE-ADIntegration.html"&gt;nice new guide&lt;/A&gt; on Active Directory integration with ISE 1.3. As noted there:&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14.3999996185303px;"&gt;Cisco ISE can connect with multiple Active Directory domains that do not have a two-way trust or have zero trust between them. Active Directory multi-domain join comprises a set of distinct Active Directory domains with their own groups, attributes, and authorization policies for each join.&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;I've setup one such deployment just recently and found it quite simple to just add the second domain and use it an en external identity source accordingly.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2014 21:43:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365882#M118999</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-11-24T21:43:15Z</dc:date>
    </item>
    <item>
      <title>Find the attachment  of step</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365883#M119000</link>
      <description>&lt;P&gt;Find the attachment&amp;nbsp; of &lt;STRONG&gt;step by step configuration of multiple AD integration with the ISE.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Nov 2014 05:16:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365883#M119000</guid>
      <dc:creator>manjeets</dc:creator>
      <dc:date>2014-11-25T05:16:48Z</dc:date>
    </item>
    <item>
      <title>Have you tried this scenario</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365884#M119001</link>
      <description>&lt;P&gt;Have you tried this scenario in 1.3 yet? I notice you stated that one way trust seems to work in 1.1.3? Basically it would appear that a two way trust is still a requirement for multidomain forests in 1.3.&lt;/P&gt;&lt;P&gt;I am curious about why a two way trust is required to authenticate users in this type of setup. Not sure why an external one way trust wouldn't suffice. Does anyone have any experience with this in 1.3 as I am unable to join one of the required forests directly (due to internal policy) and the client is unwilling to configure a two way trust.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2014 04:38:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-multiple-ad-trust-relationships/m-p/2365884#M119001</guid>
      <dc:creator>Stephen McBride</dc:creator>
      <dc:date>2014-11-26T04:38:50Z</dc:date>
    </item>
  </channel>
</rss>

