<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE in Azure question in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-in-azure-question/m-p/3520484#M517521</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is not currently supported. Please discuss it with our PM team.&lt;/P&gt;&lt;P&gt;If possible, please provide more details or documentation links on how Azure certificates utilizing such random OID.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Feb 2018 18:38:09 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2018-02-28T18:38:09Z</dc:date>
    <item>
      <title>ISE in Azure question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-in-azure-question/m-p/3520483#M517518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN lang="DE" style="font-size: 11pt;"&gt;Hi Team,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN lang="DE" style="font-size: 11pt;"&gt;I have one specific ISE question from my customer where I don’t find any answer. Would be great if you could help me on this. Thanks in advance:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;EM&gt;&lt;SPAN lang="DE" style="font-size: 11pt;"&gt;We currently have the task to allow Azure AD Joined Clients into our WLAN. These do not receive a certificate from our internal CA, but from Azure.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;EM&gt;&lt;SPAN lang="DE" style="font-size: 11pt;"&gt;However, the Azure certificate is generally valid for all Microsoft customers. There is a field which is customer specific and we would like to check this.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;EM&gt;&lt;SPAN lang="DE" style="font-size: 11pt;"&gt;It appears in the certificate with an OID e. g. 1.2.5. xxxxxxxxxxxxxx and has a value that corresponds to our Azure instance.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;EM&gt;&lt;SPAN lang="DE" style="font-size: 11pt;"&gt;Is it possible to read out a random OID? I couldn't find anything in the predefined conditions, with these you can only read standard fields.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN lang="DE" style="font-size: 11pt;"&gt;Thanks in advance for your help,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12pt; font-family: Calibri, sans-serif; color: #000000;"&gt;&lt;SPAN lang="DE" style="font-size: 11pt;"&gt;Simon&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Feb 2018 18:02:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-in-azure-question/m-p/3520483#M517518</guid>
      <dc:creator>smaseman</dc:creator>
      <dc:date>2018-02-28T18:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE in Azure question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-in-azure-question/m-p/3520484#M517521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is not currently supported. Please discuss it with our PM team.&lt;/P&gt;&lt;P&gt;If possible, please provide more details or documentation links on how Azure certificates utilizing such random OID.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Feb 2018 18:38:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-in-azure-question/m-p/3520484#M517521</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-02-28T18:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE in Azure question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-in-azure-question/m-p/3520485#M517524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There has been some testing with Azure but as Hsing noted, solution is not fully vetted yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If saying that you do have auth working with EAPT-TLS, but unable to make policy decision based on cert attributes, then the answer provided on internal mailer is same.&amp;nbsp; ISE can match conditions based on the following certificate dictionary:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" height="299" src="https://community.cisco.com/legacyfs/online/fusion/115574_pastedImage_0.png" style="width: 211px; height: 299.484px;" width="211" /&gt;&lt;/P&gt;&lt;P&gt;These can be used to match on specific issuer, organization, user, etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2018 11:48:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-in-azure-question/m-p/3520485#M517524</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-03-01T11:48:05Z</dc:date>
    </item>
  </channel>
</rss>

