<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using ISE CA as SCEP Client to an MDM in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3764162#M518678</link>
    <description>&lt;P&gt;It can work. ASA/AnyConnect SCEP flow is an example where ASA is doing SCEP proxy on behalf of the AnyConnect client. For ISE to permit SCEP/SCEP proxy ISE needs to have a endpoint session or the IP needs to be in the network device group. You can try adding whatever source IP (RADIUS key can be anything as it will not be utilized) that SCEP from MDM will be coming from as NAD on ISE and try the flow. Obviously will be harder to test if this is cloud based MDM, but should be doable if on prem or private cloud. Just to be clear, this is the case where just because it works, doesn't mean it is supported.&lt;/P&gt;</description>
    <pubDate>Fri, 14 Dec 2018 22:22:40 GMT</pubDate>
    <dc:creator>howon</dc:creator>
    <dc:date>2018-12-14T22:22:40Z</dc:date>
    <item>
      <title>Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485924#M518660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a customer that has the following BYOD requirements:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;They want all BYOD on-boarding and provisioning to be performed by the MDM&lt;/LI&gt;&lt;LI&gt;They do not have an in-house CA and as a result, they want to use ISE's CA&lt;/LI&gt;&lt;LI&gt;They want the MDM to instruct the BYODs to utilize SCEP and reach out to ISE for certificate provisioning&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible? According to ISE's documentation, SCEP can be used for device on-boarding when coming from VPN but what about from when going through an MDM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Neno&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jan 2018 02:43:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485924#M518660</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2018-01-12T02:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485925#M518661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think it possible but our teams are not testing such use cases. I would suggest you going ahead and trying it. Else, you may use the regular ISE BYOD flow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jan 2018 15:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485925#M518661</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-01-12T15:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485926#M518663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why isn’t the customer using MDM to push the cert to the clients?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jan 2018 15:32:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485926#M518663</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-01-12T15:32:27Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485927#M518665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are in early pre-sales stage so there is no way to test it. I also don't have access to an MDM, otherwise I would definitely test it &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/happy.png" /&gt; Perhaps, I can suggest a POV and go from there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did mention the BYOD flow that exist in ISE but they are pretty firm on using the MDM for everything.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jan 2018 02:31:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485927#M518665</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2018-01-13T02:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485928#M518667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jason-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible for the MDM to utilize SCEP and request the certificate from the ISE CA on behalf of the endpoint?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jan 2018 02:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485928#M518667</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2018-01-13T02:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485929#M518668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don’t think that’s a good solution&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The customer stated they wanted to use mdm for everything, I agree if you have an mdm you should use its on CA to issue the certificates to the endpoints. MDM is meant to do all this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though ISE can do byod that doesn’t mean you need to and having ISE request a cert from mdm via byod is not a good idea, you’re just complicating things unnecessarily&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don’t see the use case and why you need to do this&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jan 2018 03:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485929#M518668</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-01-13T03:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485930#M518670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the helpful feedback Jason!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Neno&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2018 07:16:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3485930#M518670</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2018-01-18T07:16:03Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3761593#M518671</link>
      <description>&lt;P&gt;Hi Jason / Hsing,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a similar customer engagement in which they want to leverage their existing MDMs (JAMF for Mac, Airwatch for non-Mac) to provision the endpoints for EAP-TLS.&lt;/P&gt;
&lt;P&gt;The MDM will own the provisioning flow, but they want to proxy the cert enrollment to the ISE CA so that ISE owns/manages the certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have we done any testing of this type of SCEP flow with external MDMs? Do we have systems in the BU labs to validate if this will work?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;, &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 22:16:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3761593#M518671</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2018-12-11T22:16:47Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3761659#M518672</link>
      <description>Though ISE has an internal CA, it doesn’t support SCEP from the outside network. When a PSN gets a CSR from say a Network Setup Assistant, it is proxied internally to the internal CA server and gets the certificate signed. AFAIK, there is no other to send SCEP calls to the internal CA.&lt;BR /&gt;&lt;BR /&gt;Having said that, check if any of those vendors support redirecting the users to the certificate provisioning portal of the ISE for the users to generate a certificate for themselves.&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Dec 2018 02:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3761659#M518672</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-12T02:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3761663#M518673</link>
      <description>As hsing stated before it’s not a tested solution. This testing hasn’t been done. I agree it might make some sense but is it worth the effort and complexity? What’s the issues of having MDM manage it? I would suggest working with the PMs to see if it might be a possibility in the future with justification</description>
      <pubDate>Wed, 12 Dec 2018 03:00:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3761663#M518673</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-12-12T03:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3762427#M518674</link>
      <description>&lt;P&gt;Thanks Jason. I think the issue with having the MDM manage it is that the MDM does not have a built-in CA, and the customer does not have an established SCEP service on their enterprise PKI.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've looked at a few options at using the Certificate Provisioning Portal in ISE to allow the user to manually provision their cert, but that doesn't configure the supplicant to allow them to connect to the dot1x SSID.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only way I can think of to get this working would be to force the user through the standard ISE BYOD flow and use the NSP to enroll the certificate and configure the supplicant, then redirect the user to the MDM after to do that side of the provisioning.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know this is documented and validated for AirWatch, but do we know if this has been tested with Casper/JAMF?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 22:52:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3762427#M518674</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2018-12-12T22:52:33Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3762430#M518675</link>
      <description>If the MDM doesn’t have a CA then how would you expect the service to work with an MDM APP onboarding and configuring the supplicant?&lt;BR /&gt;&lt;BR /&gt;They would need to do BYOD and then MDM flow for a supported design as called out in BYOD guide&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867" target="_blank"&gt;https://community.cisco.com/t5/security-documents/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;we don’t validate all the different vendors please check for associated vendor site for their documentation.&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Dec 2018 22:57:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3762430#M518675</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-12-12T22:57:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3763299#M518676</link>
      <description>&lt;P&gt;Thanks Jason. After looking at some options with using self-signed certs from AirWatch, we found that the customer does actually have ADCS infrastructure that already integrates with AirWatch via DCOM (rather than SCEP). I've convinced the customer that, since the Apple devices are locked down by DEP initially, letting AirWatch provision the endpoints would be a much better and simpler method than trying to force the endpoint through the ISE Provisioning flow.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Dec 2018 21:56:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3763299#M518676</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2018-12-13T21:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3763303#M518677</link>
      <description>Yes you’re correct ☺&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Dec 2018 22:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3763303#M518677</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-12-13T22:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA as SCEP Client to an MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3764162#M518678</link>
      <description>&lt;P&gt;It can work. ASA/AnyConnect SCEP flow is an example where ASA is doing SCEP proxy on behalf of the AnyConnect client. For ISE to permit SCEP/SCEP proxy ISE needs to have a endpoint session or the IP needs to be in the network device group. You can try adding whatever source IP (RADIUS key can be anything as it will not be utilized) that SCEP from MDM will be coming from as NAD on ISE and try the flow. Obviously will be harder to test if this is cloud based MDM, but should be doable if on prem or private cloud. Just to be clear, this is the case where just because it works, doesn't mean it is supported.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 22:22:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-as-scep-client-to-an-mdm/m-p/3764162#M518678</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-12-14T22:22:40Z</dc:date>
    </item>
  </channel>
</rss>

