<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Machine and User Auth on ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/machine-and-user-auth-on-ise/m-p/2137021#M184021</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rajan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This might help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-27927"&gt;https://supportforums.cisco.com/docs/DOC-27927&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if you want to allow only DOMAIN COMPUTERS to be able to join the wireless you can set an Authorization Rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if &lt;/P&gt;&lt;P&gt;AD1:ExternalGroups equals Your.AD.Domain/Domain Computers AND &lt;/P&gt;&lt;P&gt;AD1:ExternalGroups equals Your.AD.Domain/Domain Users&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = ALLOW ACCESS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you will just need to go to Administration and add these groups to the store.&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/9/0/117091-groups.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Dec 2012 17:37:02 GMT</pubDate>
    <dc:creator>edondurguti</dc:creator>
    <dc:date>2012-12-03T17:37:02Z</dc:date>
    <item>
      <title>Machine and User Auth on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-and-user-auth-on-ise/m-p/2137020#M183986</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im using ISE for 802.1x auth of wireless users coming from a cisco WLC, all working perfectly fine, except I want to be able to restrict the authorisation to both active directory domain users AND computers, ie to use wireless you have to have a corporate computer that is on the domain. Having a real struggle with this, cant find a way to profile computers based on domain membership, or any way to authenticate both user and computer concurrently. Any help gratefully appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-and-user-auth-on-ise/m-p/2137020#M183986</guid>
      <dc:creator>rajan.pradhan</dc:creator>
      <dc:date>2019-03-11T02:51:01Z</dc:date>
    </item>
    <item>
      <title>Machine and User Auth on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-and-user-auth-on-ise/m-p/2137021#M184021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rajan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This might help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-27927"&gt;https://supportforums.cisco.com/docs/DOC-27927&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if you want to allow only DOMAIN COMPUTERS to be able to join the wireless you can set an Authorization Rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if &lt;/P&gt;&lt;P&gt;AD1:ExternalGroups equals Your.AD.Domain/Domain Computers AND &lt;/P&gt;&lt;P&gt;AD1:ExternalGroups equals Your.AD.Domain/Domain Users&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = ALLOW ACCESS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you will just need to go to Administration and add these groups to the store.&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/9/0/117091-groups.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2012 17:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-and-user-auth-on-ise/m-p/2137021#M184021</guid>
      <dc:creator>edondurguti</dc:creator>
      <dc:date>2012-12-03T17:37:02Z</dc:date>
    </item>
    <item>
      <title>Machine and User Auth on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-and-user-auth-on-ise/m-p/2137022#M184042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for that. Your suggestion is the first thing I tried originally, but it does not work. The problem is that after a user logs on to the PC, windows sends PEAP authentication for USER only, it does not authenticate the machine any more (under WindowsXP). So any Auth policy which tries to match machine AND user attirbutes causes auth to fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I need a way to force the client to authenticate by machine, or ISE to profile the endpoint by domain membership...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2012 08:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-and-user-auth-on-ise/m-p/2137022#M184042</guid>
      <dc:creator>rajan.pradhan</dc:creator>
      <dc:date>2012-12-04T08:04:58Z</dc:date>
    </item>
    <item>
      <title>Machine and User Auth on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-and-user-auth-on-ise/m-p/2137023#M184092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rajan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Windows does not natively support this.&amp;nbsp; Machine&amp;nbsp; Authentication via domain lookup occurs only during user login, and then&amp;nbsp; you need to set as PEAP after the fact.&amp;nbsp; In order to achieve the same affect, I deployed Cisco AnyConnect Secure Mobility client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It&amp;nbsp; will seem confusing at first, but what you'll want to do is download&amp;nbsp; the AnyConnect 3.1 Standalone Profile Editor, and take a look at setting&amp;nbsp; up a profile with it.&amp;nbsp; Then you'll see what you can do in order to make&amp;nbsp; the authorization rules in ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I opted to use EAP-FAST and EAP-CHAINING in ISE 1.1.1 to do it.&amp;nbsp; I then&amp;nbsp; had my domain machines authenticate via machine certificate pushed out&amp;nbsp; via GPO and then username/password discovered during login process.&amp;nbsp; If&amp;nbsp; it isn't cached from that process, it'll prompt the user again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2012 21:20:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-and-user-auth-on-ise/m-p/2137023#M184092</guid>
      <dc:creator>spellluck</dc:creator>
      <dc:date>2012-12-05T21:20:35Z</dc:date>
    </item>
  </channel>
</rss>

