<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BYOD without certifcate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/byod-without-certifcate/m-p/3755021#M487740</link>
    <description>It’s the other way around. Apple devices are easier to onboard as they use a built in in OTA (over the air) protocol to receive certificates and profiles. This is the most seamless way. It does however require that you have well known certificates  in your ise deployment . Otherwise Apple doesn’t trust the onboarding process and there are extra steps that ruins the seamless flow&lt;BR /&gt;&lt;BR /&gt;Like Arne said ise doesn’t push out PSK configurations. It only does PEAP or EAPTLS&lt;BR /&gt;&lt;BR /&gt;If you’re wanting to simply associate a device to an AD account you could try doing psk and redirect to the NSP flow to simply register the MAC address so they can manage using the my devices portal&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-blogs/ise-byod-registration-only-without-native-supplicant-or/ba-p/3099290" target="_blank"&gt;https://community.cisco.com/t5/security-blogs/ise-byod-registration-only-without-native-supplicant-or/ba-p/3099290&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Please do consider using certificate based authentication as this is more secure and gives more control of a device is lost or stolen&lt;BR /&gt;&lt;BR /&gt;If you’re only provided internet access to these devices and don’t care much about security have you considered just using guest CWA with AD credentials on an open ssid? You could associate MAC address with AD portal user in this flow as well but there is no way to manage how many devices a user can have like the byod my devices portal since they are doing simple guest device registration&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;</description>
    <pubDate>Thu, 29 Nov 2018 10:30:04 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2018-11-29T10:30:04Z</dc:date>
    <item>
      <title>BYOD without certifcate</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-without-certifcate/m-p/3754396#M487677</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible to have a guest portal, which allows BYOD, but pushes a PSK and network settings instead of a certificate to the mobile device. We have a mix of mobile devices therefor we are a bit off using PKI, and all I want, is to associate a mobile device to a AD user account. Perhaps there's another solution?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Michael&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 14:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-without-certifcate/m-p/3754396#M487677</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-11-28T14:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD without certifcate</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-without-certifcate/m-p/3754511#M487680</link>
      <description>Unfortunately, ISE does not support any other type of security other than WPA/WPA2 TLS and PEAP as of now.</description>
      <pubDate>Wed, 28 Nov 2018 16:44:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-without-certifcate/m-p/3754511#M487680</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-11-28T16:44:35Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD without certifcate</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-without-certifcate/m-p/3754742#M487738</link>
      <description>&lt;P&gt;Sounds like something an MDM would be good for.&amp;nbsp; If the idea is to use the simplest on-boarding method (i.e. open SSID which redirects to an Authentication&amp;nbsp;Portal) then I would still wonder how this would work. You need some mechanism on the client to allow it to install things like wireless profiles.&amp;nbsp; And agent of some sort.&amp;nbsp; Apple has the OTA (Over The Air) tech built in for BYOD enrolment.&amp;nbsp; Android needs an app from the Play store.&amp;nbsp; And Microsoft needs to download and run an app.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Maybe these guys have a solution for you? &lt;A href="https://www.securew2.com/" target="_blank"&gt;https://www.securew2.com/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 22:25:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-without-certifcate/m-p/3754742#M487738</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-11-28T22:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD without certifcate</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-without-certifcate/m-p/3754932#M487739</link>
      <description>&lt;P&gt;Sounds like there's no easy way around this issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My impression is that Android BYOD works more smoothly, then Apple BYOD. What is your experience with Apple and BYOD, I know there's been some issue around this part of ISE?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 07:36:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-without-certifcate/m-p/3754932#M487739</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-11-29T07:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD without certifcate</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-without-certifcate/m-p/3755021#M487740</link>
      <description>It’s the other way around. Apple devices are easier to onboard as they use a built in in OTA (over the air) protocol to receive certificates and profiles. This is the most seamless way. It does however require that you have well known certificates  in your ise deployment . Otherwise Apple doesn’t trust the onboarding process and there are extra steps that ruins the seamless flow&lt;BR /&gt;&lt;BR /&gt;Like Arne said ise doesn’t push out PSK configurations. It only does PEAP or EAPTLS&lt;BR /&gt;&lt;BR /&gt;If you’re wanting to simply associate a device to an AD account you could try doing psk and redirect to the NSP flow to simply register the MAC address so they can manage using the my devices portal&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-blogs/ise-byod-registration-only-without-native-supplicant-or/ba-p/3099290" target="_blank"&gt;https://community.cisco.com/t5/security-blogs/ise-byod-registration-only-without-native-supplicant-or/ba-p/3099290&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Please do consider using certificate based authentication as this is more secure and gives more control of a device is lost or stolen&lt;BR /&gt;&lt;BR /&gt;If you’re only provided internet access to these devices and don’t care much about security have you considered just using guest CWA with AD credentials on an open ssid? You could associate MAC address with AD portal user in this flow as well but there is no way to manage how many devices a user can have like the byod my devices portal since they are doing simple guest device registration&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;</description>
      <pubDate>Thu, 29 Nov 2018 10:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-without-certifcate/m-p/3755021#M487740</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-11-29T10:30:04Z</dc:date>
    </item>
  </channel>
</rss>

