<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Service Account Password Change. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/service-account-password-change/m-p/3586558#M519019</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming you meant the credentials used to join ISE nodes to Active Directory domains, then it depends on whether they are also used for PassiveID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not used for PassiveID, then they are only used during the AD join/leave so ISE nodes do not need them besides those operations. If also used for PassiveID, then we need to update the credentials used to monitor the domain controllers after the passwords renewed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 23 Dec 2017 04:53:41 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2017-12-23T04:53:41Z</dc:date>
    <item>
      <title>Service Account Password Change.</title>
      <link>https://community.cisco.com/t5/network-access-control/service-account-password-change/m-p/3586557#M519018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Currently working on a case where we are trying to use API to change "service account" within ISE for domain services. This would be the account ISE uses to join nodes to the domain and then query the domain for user/machine authentications. They are planning to use CyberArk to automate the process of renewing the password for the service account. They would like to know whether they are required to rejoin all the nodes with the same account and new password once the password renewal is enforced.&lt;/P&gt;&lt;P&gt;I would appreciate any hints regarding these changes and the expected behavior.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards.&lt;/P&gt;&lt;P&gt;Mahdi Shapouri.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Dec 2017 01:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-account-password-change/m-p/3586557#M519018</guid>
      <dc:creator>mshapour</dc:creator>
      <dc:date>2017-12-19T01:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: Service Account Password Change.</title>
      <link>https://community.cisco.com/t5/network-access-control/service-account-password-change/m-p/3586558#M519019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming you meant the credentials used to join ISE nodes to Active Directory domains, then it depends on whether they are also used for PassiveID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not used for PassiveID, then they are only used during the AD join/leave so ISE nodes do not need them besides those operations. If also used for PassiveID, then we need to update the credentials used to monitor the domain controllers after the passwords renewed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Dec 2017 04:53:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-account-password-change/m-p/3586558#M519019</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-12-23T04:53:41Z</dc:date>
    </item>
  </channel>
</rss>

