<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Integration of ISE,AD and FMC using Passive Identity in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/integration-of-ise-ad-and-fmc-using-passive-identity/m-p/3556224#M496319</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FMC is using info derived from ISE session directory but not those from ISE Context Visibility.&lt;/P&gt;&lt;P&gt;FMC needs username + domain to use the user identity and it overwrites the previous info if newer received about the IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note a known issue -- CSCvk13999&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 13 Jul 2018 05:21:13 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2018-07-13T05:21:13Z</dc:date>
    <item>
      <title>Integration of ISE,AD and FMC using Passive Identity</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-of-ise-ad-and-fmc-using-passive-identity/m-p/3556220#M496312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a customer who wants to create rules based on username on FMC and wants to explore PxGrid and Passive Identity.&lt;/P&gt;&lt;P&gt;My understanding is we integrate ISE and FMC using pxGrid and then integrate ISE and AD using passive identity.&lt;/P&gt;&lt;P&gt;We then have a combination of below scenarios and I have some questions. Appreciate your comments on the below possible use cases. Based on your feedback I'll test it in our lab.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Endpoints authenticating without 802.1X :- ISE will be able to publish the usernames of endpoints connecting to FMC by fetching the information from AD via passive identity integration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Endpoints authenticating with EAP-TLS :- ISE will be able to publish the username to FMC using the same above process.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;3. Endpoints authenticating with machine authentication PEAP-Mschapv2 :- Endpoints will authenticate using 802.1x via machine credentials. ISE will fetch username from AD via passive identity. Should we expect any conflict if 802.1x and passive identity co-exist ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. &lt;SPAN style="font-size: 13.3333px;"&gt;Endpoints authenticating with user authentication PEAP-Mschapv2 :-&amp;nbsp; Are there different attributes for username received from dot1x and from passive identity ? Should we expect any conflict ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;Is it also a good idea to completely isolate passive identity functionality by exploring ISE-PIC node ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2018 17:40:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-of-ise-ad-and-fmc-using-passive-identity/m-p/3556220#M496312</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2018-07-10T17:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: Integration of ISE,AD and FMC using Passive Identity</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-of-ise-ad-and-fmc-using-passive-identity/m-p/3556221#M496314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not sure if you have seen this post.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/message/288851"&gt;FMC and ISE integration for passive authentication&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Please confirm whether your use cases are covered by the integration guides.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;- Krish&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2018 17:23:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-of-ise-ad-and-fmc-using-passive-identity/m-p/3556221#M496314</guid>
      <dc:creator>kvenkata1</dc:creator>
      <dc:date>2018-07-11T17:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: Integration of ISE,AD and FMC using Passive Identity</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-of-ise-ad-and-fmc-using-passive-identity/m-p/3556222#M496316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All 4 scenarios you describe are active authentications and do not require passive ID to be enabled.&amp;nbsp; ISE will publish the username to the session directory topic in pxGrid.&amp;nbsp; FMC can subscribe to this topic to get the user to IP mapping and then enforce policy.&amp;nbsp; Passive ID is ideally used in scenarios when 802.1X is not in use and we need to rely on AD to get the user to IP mapping.&amp;nbsp; Since ISE is the authentication server in your scenarios, it will have that information and will only need AD to ensure the credentials (username / pass) are valid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2018 17:42:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-of-ise-ad-and-fmc-using-passive-identity/m-p/3556222#M496316</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-07-11T17:42:16Z</dc:date>
    </item>
    <item>
      <title>Re: Integration of ISE,AD and FMC using Passive Identity</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-of-ise-ad-and-fmc-using-passive-identity/m-p/3556223#M496318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank You all for you response.&lt;/P&gt;&lt;P style="color: #000000; font-family: Calibri, Helvetica, sans-serif; font-size: 16px;"&gt;Below are my observations when I tried to use machine auth with passive identity.&lt;/P&gt;&lt;P style="color: #000000; font-family: Calibri, Helvetica, sans-serif; font-size: 16px;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;I see two events on pxGrid with the same session id. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: Calibri, Helvetica, sans-serif; font-size: 16px;"&gt;The first session is via machine authentication and the second is via WMI.&lt;/P&gt;&lt;P style="color: #000000; font-family: Calibri, Helvetica, sans-serif; font-size: 16px;"&gt;&lt;IMG class="image-1 jive-image" data-custom="AAMkADY4Y2FhMjY2LWJkNDUtNGZhYS1iNTg2LWI1MjYwMjViNTJkNQBGAAAAAACERos1jhO4RreoBZQS4h2XBwC7FkzOjUqPRYveBK3u3zXZAAAAAAEJAAC7FkzOjUqPRYveBK3u3zXZAAKvDDNsAAABEgAQAIrpEFOQX21Ch5kMVU%2FzpRU%3D" data-downloadimage="service.svc/s/GetFileAttachment?id=AAMkADY4Y2FhMjY2LWJkNDUtNGZhYS1iNTg2LWI1MjYwMjViNTJkNQBGAAAAAACERos1jhO4RreoBZQS4h2XBwC7FkzOjUqPRYveBK3u3zXZAAAAAAEJAAC7FkzOjUqPRYveBK3u3zXZAAKvDDNsAAABEgAQAIrpEFOQX21Ch5kMVU%2FzpRU%3D&amp;amp;X-OWA-CANARY=TarqZ4LMxEGPbPy-3xOSw9AP7IYL6NUY8wYXxUfc41ZqgzYA37qxAnIqOSC81Itun_EewjZFMdc." data-imagetype="AttachmentByCid" data-outlook-trace="F:1|T:1" data-thumbnailimage="https://attachment.outlook.office.net/owa/UMahar@securview.com/service.svc/s/GetFileAttachment?id=AAMkADY4Y2FhMjY2LWJkNDUtNGZhYS1iNTg2LWI1MjYwMjViNTJkNQBGAAAAAACERos1jhO4RreoBZQS4h2XBwC7FkzOjUqPRYveBK3u3zXZAAAAAAEJAAC7FkzOjUqPRYveBK3u3zXZAAKvDDNsAAABEgAQAIrpEFOQX21Ch5kMVU%2FzpRU%3D&amp;amp;X-OWA-CANARY=TarqZ4LMxEGPbPy-3xOSw9AP7IYL6NUY8wYXxUfc41ZqgzYA37qxAnIqOSC81Itun_EewjZFMdc.&amp;amp;token=eyJhbGciOiJSUzI1NiIsImtpZCI6IjA2MDBGOUY2NzQ2MjA3MzdFNzM0MDRFMjg3QzQ1QTgxOENCN0NFQjgiLCJ4NXQiOiJCZ0Q1OW5SaUJ6Zm5OQVRpaDhSYWdZeTN6cmciLCJ0eXAiOiJKV1QifQ.eyJ2ZXIiOiJFeGNoYW5nZS5DYWxsYmFjay5WMSIsImFwcGN0eHNlbmRlciI6Ik93YURvd25sb2FkQDRmYWM5YTE0LTMxYjUtNGQ0NC04ZWY4LTJlYmI2OGQxNWNlYSIsImFwcGN0eCI6IntcIm1zZXhjaHByb3RcIjpcIm93YVwiLFwicHJpbWFyeXNpZFwiOlwiUy0xLTUtMjEtMjUwMzYxMzY1MS01NTYyOTE2ODItMzgxNzI3MDA0LTExMjAxNTU2XCIsXCJwdWlkXCI6XCIxMTUzOTA2NjYwOTA1ODI2Mzk1XCIsXCJvaWRcIjpcIjFjNWIxYmFjLTJkOWYtNDQ5Ni1hOTBkLWJlNGJmOTg1NmViMlwiLFwic2NvcGVcIjpcIk93YURvd25sb2FkXCJ9IiwibmJmIjoxNTMxNDA5MDQ1LCJleHAiOjE1MzE0MDk2NDUsImlzcyI6IjAwMDAwMDAyLTAwMDAtMGZmMS1jZTAwLTAwMDAwMDAwMDAwMEA0ZmFjOWExNC0zMWI1LTRkNDQtOGVmOC0yZWJiNjhkMTVjZWEiLCJhdWQiOiIwMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvYXR0YWNobWVudC5vdXRsb29rLm9mZmljZS5uZXRANGZhYzlhMTQtMzFiNS00ZDQ0LThlZjgtMmViYjY4ZDE1Y2VhIn0.cLQ3XxTbgtlzKQOdQBjUWGTLg6I3jj1m_n6kD2R8Y-B49YtMoLWjDSSsL39oSCDEtxmGvH10Uhyi3ngf9nuDVcD121uL2SscjHdGycGGK4oJ1k5h1a1A4y7tBImsk5_M37pQGxGij3EVgTWZt5itFPWBmQI42MugRVYrF3xyfHemlcooadPezqwTSdiIBLX3ARaE1gnoYr-Bh3m6Jz_16AxFbwKLrhytRxg2Eo-RFCxbLWkuAJywatTfGo6DnCQ4vMn_THIKzyXkB5R83HSybDOQMi1QLnM7Wu5aUkYMn7GrsD73WBfDT2AnJmJ1SbIFC75rpYhzLaQ8MPuAIK9pVg&amp;amp;owa=outlook.office.com&amp;amp;isImagePreview=True" src="https://community.cisco.com/legacyfs/online/fusion/118591_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: Calibri, Helvetica, sans-serif; font-size: 16px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: Calibri, Helvetica, sans-serif; font-size: 16px;"&gt;When I look at the identity endpoint under context visibility I only see the machine name.&lt;/P&gt;&lt;P style="color: #000000; font-family: Calibri, Helvetica, sans-serif; font-size: 16px;"&gt;However I see the username via passive identity in live logs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 15:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-of-ise-ad-and-fmc-using-passive-identity/m-p/3556223#M496318</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2018-07-12T15:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: Integration of ISE,AD and FMC using Passive Identity</title>
      <link>https://community.cisco.com/t5/network-access-control/integration-of-ise-ad-and-fmc-using-passive-identity/m-p/3556224#M496319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FMC is using info derived from ISE session directory but not those from ISE Context Visibility.&lt;/P&gt;&lt;P&gt;FMC needs username + domain to use the user identity and it overwrites the previous info if newer received about the IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note a known issue -- CSCvk13999&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2018 05:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/integration-of-ise-ad-and-fmc-using-passive-identity/m-p/3556224#M496319</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-07-13T05:21:13Z</dc:date>
    </item>
  </channel>
</rss>

