<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE and Azure AD in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3985882#M455582</link>
    <description>&lt;P&gt;Thanks for the reply.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;They are using machine based certificates. Is that the same as machine authentication? And if not what would machine authentication look like in ISE?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 19 Nov 2019 13:30:50 GMT</pubDate>
    <dc:creator>boclabor</dc:creator>
    <dc:date>2019-11-19T13:30:50Z</dc:date>
    <item>
      <title>ISE and Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3985587#M455580</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I would like to ask a question about ISE and Azure AD. Today ISE use’s traditional AD DC controllers for account lookup and attributes to measure the user with for network access. The company is moving to Azure AD in the cloud. There will still be on premises AD controllers specifically where ever there is a PSN. For obvious reasons that’s takes care of any latency problems. The differences is the on premises AD controllers will not contain any of the user’s computer objects. Does an on prem AD controller that gets its feed via the AD connector from AZURE AD and contains Zero computer objects affect ISE in any way?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2019 22:37:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3985587#M455580</guid>
      <dc:creator>boclabor</dc:creator>
      <dc:date>2019-11-18T22:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3985593#M455581</link>
      <description>&lt;P&gt;The Azure AD Connector running as a Service on the on-prem AD can receive objects from Azure. This means you create accounts in Azure portal and then they appear on the on-prem server. The opposite is true too - you can create objects on-prem and have them sync'd to Azure AD.&lt;/P&gt;
&lt;P&gt;Not sure what you mean by "Zero computer objects"? If you're authenticating users via AD then I suppose you don't need the computer objects. But if you're doing machine authentication then I would argue that those accounts should reside on the on-prem AD servers??? It's been a while since I set up our Sync, but perhaps you can also sync machine objects to Azure AD.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2019 22:47:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3985593#M455581</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-11-18T22:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3985882#M455582</link>
      <description>&lt;P&gt;Thanks for the reply.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;They are using machine based certificates. Is that the same as machine authentication? And if not what would machine authentication look like in ISE?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 13:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3985882#M455582</guid>
      <dc:creator>boclabor</dc:creator>
      <dc:date>2019-11-19T13:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3986005#M455583</link>
      <description>&lt;P&gt;No, machine authentication requires a computer object in AD, and a successful directory user authentication to that machine. It is specifically enabled in the ISE AD connector on the advanced tab.&amp;nbsp; Machine certificates would be used for (typically) EAP-TLS authentication outside of Active Directory.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 15:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3986005#M455583</guid>
      <dc:creator>msmith101</dc:creator>
      <dc:date>2019-11-19T15:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3986172#M455584</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Thanks for the machine object clarification.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Will ISE integrate with Azure AD with on &lt;/SPAN&gt;&lt;SPAN class="SpellE"&gt;prem&lt;/SPAN&gt;&lt;SPAN&gt; ISE and how. For example is that with on &lt;/SPAN&gt;&lt;SPAN class="SpellE"&gt;prem&lt;/SPAN&gt;&lt;SPAN&gt; AD controllers or ISE can talk directly with Azure AD in the cloud?&amp;nbsp; I have heard for some time ISE is on the cusp of integrating with Azure AD.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 19:32:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3986172#M455584</guid>
      <dc:creator>boclabor</dc:creator>
      <dc:date>2019-11-19T19:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3986230#M455585</link>
      <description>&lt;P&gt;Let's define "integrate with" : in terms of an external identity source, ISE can be configured with an on-prem Active Directory Controller using the AD Integration or LDAP. If you use LDAP, then you're limited in terms of the password authentication that LDAP will support. There &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01110.html#concept_BD3A270FEC0C411DA10FB808C14B48D5" target="_self"&gt;is a table in the User Guide&lt;/A&gt; that shows that.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you hosted your AD controllers in the public cloud then you could in theory integrate ISE with that too (over an AWS VPC etc.) - in that case your data centre lives in the public cloud and your ISE server may be on-prem - some hybrid arrangement.&lt;/P&gt;
&lt;P&gt;If you think of "cloud-native" Azure-AD, then ISE does not have an integration for that. But you could use secure LDAP to tunnel your LDAP requests from on-prem to the public cloud. But the results are not the same as doing ISE&amp;lt;-&amp;gt;AD integration (see table link above).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It certainly would be nice to have a cloud native integration. I would recommend sending a feature request &lt;A href="https://www.ciscofeedback.vovici.com/se.ashx?s=6A5348A7707FD7A6" target="_self"&gt;via the Feedback link&lt;/A&gt;&amp;nbsp;to the PM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 21:37:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/3986230#M455585</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-11-19T21:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/4398933#M567175</link>
      <description>&lt;P&gt;Arnie, If you have current implementation with on Prem AD, can you add Azure AD to the mix if starts issuing certificates to machines and be seen and validated.&lt;/P&gt;</description>
      <pubDate>Thu, 06 May 2021 18:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/4398933#M567175</guid>
      <dc:creator>raymondmf</dc:creator>
      <dc:date>2021-05-06T18:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/4399072#M567183</link>
      <description>&lt;DIV id="bodyDisplay_0" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;The only current method for authenticating 802.1x against AzureAD requires using ISE 3.0 and ROPC.&lt;/P&gt;
&lt;P&gt;See the &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html" target="_blank" rel="noopener nofollow noreferrer"&gt;Configure ISE 3.0 REST ID with Azure Active Directory&lt;/A&gt; TechNote for more information.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 07 May 2021 01:14:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/4399072#M567183</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-05-07T01:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/4821313#M581365</link>
      <description>&lt;P&gt;Hi Greg Gibbs,&lt;/P&gt;&lt;P&gt;I want to connect mi cisco ise 2.6 to Azure AD, is it possible ? If its possible could you share any cisco reference about that ?&lt;BR /&gt;I want my laptop join AD via Cisco ISE.&lt;/P&gt;&lt;P&gt;Regards&lt;BR /&gt;Serge&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 12:54:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/4821313#M581365</guid>
      <dc:creator>sdjoumgoue</dc:creator>
      <dc:date>2023-04-25T12:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/4821483#M581372</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;It's only supported from ISE 3.0  onwards. FYI&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-azure-ad-and-intune/ta-p/4763635" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-azure-ad-and-intune/ta-p/4763635&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;****please remember to rate useful posts&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Apr 2023 16:48:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-azure-ad/m-p/4821483#M581372</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2023-04-25T16:48:59Z</dc:date>
    </item>
  </channel>
</rss>

