<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Posturing with SAML in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/posturing-with-saml/m-p/4001113#M454905</link>
    <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;I have a customer who wants to simplify auth experience for salespeople. he asked whether he could federate AnyConnect with SSO (Okta)… Told him yes, but he’d have to migrate AnyConnect from RADIUS to SAML. But he’s also posturing devices via ISE. Question is: would migrating AnyConnect from RADIUS to SAML auth change anything about how ISE postures devices accessing the network?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 19 Dec 2019 08:22:08 GMT</pubDate>
    <dc:creator>ashvaras</dc:creator>
    <dc:date>2019-12-19T08:22:08Z</dc:date>
    <item>
      <title>Posturing with SAML</title>
      <link>https://community.cisco.com/t5/network-access-control/posturing-with-saml/m-p/4001113#M454905</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;I have a customer who wants to simplify auth experience for salespeople. he asked whether he could federate AnyConnect with SSO (Okta)… Told him yes, but he’d have to migrate AnyConnect from RADIUS to SAML. But he’s also posturing devices via ISE. Question is: would migrating AnyConnect from RADIUS to SAML auth change anything about how ISE postures devices accessing the network?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2019 08:22:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/posturing-with-saml/m-p/4001113#M454905</guid>
      <dc:creator>ashvaras</dc:creator>
      <dc:date>2019-12-19T08:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: Posturing with SAML</title>
      <link>https://community.cisco.com/t5/network-access-control/posturing-with-saml/m-p/4002326#M454987</link>
      <description>&lt;P class="p1"&gt;I'd recommend proofing and seeing if it works, theoretically it may work but there is no official testing. SAML SSO has been focused on guest, sponsor and my devices portal access&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-guest-amp-web-authentication/ta-p/3657224#toc-hId--1748277323" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-guest-amp-web-authentication/ta-p/3657224#toc-hId--1748277323&lt;/A&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;All technical questions from customers/partners should be directed to our public &lt;A href="http://cs.co/ise-community" target="_blank"&gt;&lt;SPAN class="s1"&gt;http://cs.co/ise-community&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;for widest coverage and experience of SMEs. As many partners customers have done stuff that we haven’t.&lt;/P&gt;
&lt;P class="p1"&gt;Before asking any question please search our public forum.&lt;/P&gt;
&lt;P class="p1"&gt;This also allows for archival for the next person that has the same ask. Employees are welcome to add documents contribute to conversations only. Not post questions externally.&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;If there is a critical reason they can't ask there then Cisco employees are welcome to ask internally at &lt;A href="http://cs.co/cs-ise" target="_blank"&gt;&lt;SPAN class="s1"&gt;http://cs.co/cs-ise&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Dec 2019 14:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/posturing-with-saml/m-p/4002326#M454987</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-12-21T14:53:55Z</dc:date>
    </item>
  </channel>
</rss>

