<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic MDM integration without device on-boarding with 2 different MDM vendors in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mdm-integration-without-device-on-boarding-with-2-different-mdm/m-p/3855789#M473110</link>
    <description>&lt;P&gt;I have AirWatch and Intune integrated to ISE and I want to check compliant and registered status, but I do not get this to work properly and I wounder if I need the redirect rule even though that devices are on-boarded in MDM via Internet/4G? Can anyone tell me how to do this, this is my rules at the moment:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 14 May 2019 10:42:04 GMT</pubDate>
    <dc:creator>lars.cederholm</dc:creator>
    <dc:date>2019-05-14T10:42:04Z</dc:date>
    <item>
      <title>MDM integration without device on-boarding with 2 different MDM vendors</title>
      <link>https://community.cisco.com/t5/network-access-control/mdm-integration-without-device-on-boarding-with-2-different-mdm/m-p/3855789#M473110</link>
      <description>&lt;P&gt;I have AirWatch and Intune integrated to ISE and I want to check compliant and registered status, but I do not get this to work properly and I wounder if I need the redirect rule even though that devices are on-boarded in MDM via Internet/4G? Can anyone tell me how to do this, this is my rules at the moment:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 10:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mdm-integration-without-device-on-boarding-with-2-different-mdm/m-p/3855789#M473110</guid>
      <dc:creator>lars.cederholm</dc:creator>
      <dc:date>2019-05-14T10:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: MDM integration without device on-boarding with 2 different MDM vendors</title>
      <link>https://community.cisco.com/t5/network-access-control/mdm-integration-without-device-on-boarding-with-2-different-mdm/m-p/3855889#M473111</link>
      <description>&lt;P&gt;There is no need to redirect endpoints if policies are configured in the proper way.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;There are two important things which need to be added for multi-MDM scenario when there are endpoints which were registered out-of band:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. MDM server name attribute&lt;BR /&gt;2. Differentiator attribute before MDM server name condition&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you create policies ISE executes attribute collection (AKA Queried PIP) in the same order as they are listed in authorization policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In multi MDM server scenario we can't just a MDM server name attribute since it creates an ambiguity when ISE needs to decide which MDM server to query for specific endpoint.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a result of such ambiguity for every endpoint ISE will pick MDM server from the first policy which contains MDM server name.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below you may see an example from my lab for two MDM serves - Meraki and SCCM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image003.png" style="width: 810px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/36674i744C939470FBBEA6/image-size/large?v=v2&amp;amp;px=999" role="button" title="image003.png" alt="image003.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Differentiator attribute - In my case it's an AD group. Presence of this attribute in the policy pushes ISE to query External AD group PIP first. As a result further policy selection is limited only to policies which contain specific AD group&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In your scenario i think you can use a Certificate template attribute as a differentiator.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. MDM server name condition - this one will trigger a query to the proper server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Endpoint MDM attributes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example contains only two 'Non-Compliant' policies but all other policies (except redirect polices) should be configured in the same way.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In case if you wish to keep redirect polices you should't use there an MDM server name since you specify the server name in authorization profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 12:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mdm-integration-without-device-on-boarding-with-2-different-mdm/m-p/3855889#M473111</guid>
      <dc:creator>Serhii Kucherenko</dc:creator>
      <dc:date>2019-05-14T12:34:40Z</dc:date>
    </item>
  </channel>
</rss>

