<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identifying first time corporate login to network in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457906#M526866</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eddie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The can call the REST API against ISE MNT node to retrieve session info and trigger CoA.&amp;nbsp; Another option is to simply have them accept AUP in ISE or link to external AUP from a CWA/Hotspot page which also flags AUP accept in ISE.&amp;nbsp; This too will trigger CoA upon completion to allow different policy to be hit if authorization result different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Sep 2017 00:27:42 GMT</pubDate>
    <dc:creator>Craig Hyps</dc:creator>
    <dc:date>2017-09-08T00:27:42Z</dc:date>
    <item>
      <title>Identifying first time corporate login to network</title>
      <link>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457905#M526865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is an interesting ISE network access requirement I wanted to run by the experts. The requirement is to force a new corporate user through a captive portal to read and accept the corporate internet use policy. The customer is a heavy Microsoft/AD shop and has the capability to write ADSI scripts to modify AD on the fly or perhaps even using ISE EPS APIs.&amp;nbsp; So given that, is this the best option?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;ISE wired and wireless policy has an authZ rule that states if user belongs to ‘Unsigned_AUP’ AD group, they get restricted access and redirected to the AUP captive portal.&lt;/LI&gt;&lt;LI&gt;After new corporate user reads and signs the AUP, this captive portal has ADSI scripting to drop the respective user from the ‘Unsigned_AUP’ AD group.&lt;/LI&gt;&lt;LI&gt;The same captive portal script uses ISE EPS API to bounce (CoA) the user off of the network. When the user logs back in, the will no longer be in the 'Unsigned_AUP' group and will fall into whatever desired authZ rule.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The piece I’m not sure on is how the user gets bounced in step 3.&amp;nbsp; In the typical guest or BYOD flow, the portal is running on an ISE node, so ISE knows how to reach the PSN to CoA the user.&amp;nbsp; But in this flow the customer owns this ‘New user captive portal’.&amp;nbsp; What ISE node would this EPS API talk to to CoA the user, MnT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Sep 2017 23:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457905#M526865</guid>
      <dc:creator>eddiem</dc:creator>
      <dc:date>2017-09-07T23:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying first time corporate login to network</title>
      <link>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457906#M526866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eddie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The can call the REST API against ISE MNT node to retrieve session info and trigger CoA.&amp;nbsp; Another option is to simply have them accept AUP in ISE or link to external AUP from a CWA/Hotspot page which also flags AUP accept in ISE.&amp;nbsp; This too will trigger CoA upon completion to allow different policy to be hit if authorization result different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Sep 2017 00:27:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457906#M526866</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-09-08T00:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying first time corporate login to network</title>
      <link>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457907#M526867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Craig, That helps.&amp;nbsp; Can I assume if we used ISE for the AUP, we'd still need some external source to tell us if the user was a first time login using the AD group I mentioned above? Otherwise I'm not sure how ISE would know it was the first time that user logged into the network. We can't use the endpoint MAC because the PC may be recycled from previous user. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Sep 2017 04:34:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457907#M526867</guid>
      <dc:creator>eddiem</dc:creator>
      <dc:date>2017-09-08T04:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying first time corporate login to network</title>
      <link>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457908#M526868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;AUP is flagged to the endpoint, not user, but you may be able to combine your external AUP (link to it from CWA login page) and rely on local CoA from ISE to pick up the change in AD.&amp;nbsp; For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule 1 - If EAP success and AD:AUP flag = true, then Permit&lt;/P&gt;&lt;P&gt;Rule 2 - If EAP success and AD:AUP flag = false, then CWA_AUP (or Hotspot AUP)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Sep 2017 05:05:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457908#M526868</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-09-08T05:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying first time corporate login to network</title>
      <link>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457909#M526869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the customers mainly need users to ack access to an AD computer, it might not need to use ISE to enforce it at all. I am thinking to use login script to check some windows registry or the like and pop up a modal windows if not yet set to the ack'ed value, etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Sep 2017 05:19:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457909#M526869</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-09-08T05:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying first time corporate login to network</title>
      <link>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457910#M526870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Hsing.&amp;nbsp; Although customer is a heavy Microsoft shop, we're &lt;SPAN style="font-size: 10pt;"&gt;not sure if all endpoints will be Windows so wanted to suggest a solution that leveraged network access and worked for non-Windows endpoints. &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Sep 2017 15:52:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457910#M526870</guid>
      <dc:creator>eddiem</dc:creator>
      <dc:date>2017-09-08T15:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying first time corporate login to network</title>
      <link>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457911#M526871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How about something like this (though this is endpoint constrained vs user constrained:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  1.  User with endpoint not previously seen logs in.&lt;/P&gt;&lt;P&gt;  2.  Check if endpoint is in identity group EUP-Signed (for example)&lt;/P&gt;&lt;P&gt;  3.  If in identity group, then allow access&lt;/P&gt;&lt;P&gt;  4.  if not in identity group, then redirect using a hotspot portal with EUP.  Have that hotspot portal place the endpoint in the EUP-Signed identity group once the user accepts the EUP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want the policy bound to a user, maybe you can do something with AD groups or a user attribute in AD using an external EUP portal.  Once the user accepts the EUP, the portal adds the attribute to the user in AD and then generates a COA for the session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Sep 2017 16:11:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457911#M526871</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2017-09-08T16:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying first time corporate login to network</title>
      <link>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457912#M526872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks George,&amp;nbsp; The customer has plenty of wired/shared desktops.&amp;nbsp; Therefore the solution needs to be focused on the user, not the endpoint.&amp;nbsp; Since customer has skilled IT staff willing to write scripting to dynamically update AD, we thought using an AD group to track first time logins would be effective.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Sep 2017 16:20:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identifying-first-time-corporate-login-to-network/m-p/3457912#M526872</guid>
      <dc:creator>eddiem</dc:creator>
      <dc:date>2017-09-08T16:20:52Z</dc:date>
    </item>
  </channel>
</rss>

