<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE AD communication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-ad-communication/m-p/2897082#M40060</link>
    <description>&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;need to understand the communication between ISE and AD for discussions with the AD guys.&lt;/P&gt;
&lt;P&gt;From what I've learnt from documentation the following different users are:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ISE machine user&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;to join AD (permissions: search AD for ISE machine, create ISE machine, set password, SPN, dnsHostname)&lt;/P&gt;
&lt;P&gt;to&amp;nbsp;leave AD (permissions: search AD for ISE machine and remove ISE machine)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Test user&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A virtual computer account with permissions just like a real existing machine to be used for troubleshooting the authentication process on ISE to easily test the communication ISE/AD.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Domain user&lt;/STRONG&gt; with permanent access without need for a password change, permissions to read user and member accounts in root domain&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Questions:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Am I right that ISE uses these above different users?&lt;/P&gt;
&lt;P&gt;Where can I find deeper information about ISE / AD communication?&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Hagen&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 06:33:29 GMT</pubDate>
    <dc:creator>Hagen Winck</dc:creator>
    <dc:date>2019-03-11T06:33:29Z</dc:date>
    <item>
      <title>ISE AD communication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-communication/m-p/2897082#M40060</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;need to understand the communication between ISE and AD for discussions with the AD guys.&lt;/P&gt;
&lt;P&gt;From what I've learnt from documentation the following different users are:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ISE machine user&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;to join AD (permissions: search AD for ISE machine, create ISE machine, set password, SPN, dnsHostname)&lt;/P&gt;
&lt;P&gt;to&amp;nbsp;leave AD (permissions: search AD for ISE machine and remove ISE machine)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Test user&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A virtual computer account with permissions just like a real existing machine to be used for troubleshooting the authentication process on ISE to easily test the communication ISE/AD.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Domain user&lt;/STRONG&gt; with permanent access without need for a password change, permissions to read user and member accounts in root domain&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Questions:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Am I right that ISE uses these above different users?&lt;/P&gt;
&lt;P&gt;Where can I find deeper information about ISE / AD communication?&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Hagen&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:33:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-communication/m-p/2897082#M40060</guid>
      <dc:creator>Hagen Winck</dc:creator>
      <dc:date>2019-03-11T06:33:29Z</dc:date>
    </item>
    <item>
      <title>This document should answer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-communication/m-p/2897083#M40061</link>
      <description>&lt;P&gt;This &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/1-3/ISE-ADIntegrationDoc/b_ISE-ADIntegration.html#reference_F19556CAD5C949B58DF89334E2C6255D"&gt;document&lt;/A&gt; should answer all your questions around ISE &amp;amp; AD communication. Let me know if you have any questions.&lt;/P&gt;
&lt;P&gt;~ Jatin&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 10:02:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-communication/m-p/2897083#M40061</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2016-03-09T10:02:25Z</dc:date>
    </item>
    <item>
      <title>Hi Jatin,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-communication/m-p/2897084#M40062</link>
      <description>&lt;P&gt;Hi Jatin,&lt;/P&gt;
&lt;P&gt;thanks for link posted, but that information is not sufficient.&lt;/P&gt;
&lt;P&gt;To authenticate any client user/machine against AD an ordinary domain user with read access seems to be sufficient.&lt;/P&gt;
&lt;P&gt;The documentation is speaking about join/leave/configuring ISE machine account (which could be done without AD administrator rights). It seems that the role of ISE is something like a member server of AD forest, but isn't described exactly.&lt;/P&gt;
&lt;P&gt;To discuss this with AD administrators you need more precise information and that is what I'm looking for.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Hagen&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 10:22:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-communication/m-p/2897084#M40062</guid>
      <dc:creator>Hagen Winck</dc:creator>
      <dc:date>2016-03-09T10:22:33Z</dc:date>
    </item>
  </channel>
</rss>

