<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE BYOD/MDM integration in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3678404#M543062</link>
    <description>&lt;P class="p1"&gt;A partner is having issues with iPhone and BYOD (not an issue with ISE), the Client Provisioning no longer provides a good user experience and as a result now are looking for an alternative to provide EAP-TLS based authentication for employee personal devices.&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Partner thoughts are to use an MDM (the customer is using&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;XenMobile) to push a certificate to the device, whether it by iPhone or Android. The partner would prefer to use ISE to issue the certificate.&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;The question is, can ISE be used as a SCEP server to issue certificates to the BYOD devices with the request originating from the MDM server?&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;I’m assuming when the user registers to the MDM, ISE can be used to authenticate the request and once the certificate is issued, ISE can authenticate against the certificate?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 08:47:30 GMT</pubDate>
    <dc:creator>iagyte</dc:creator>
    <dc:date>2019-03-11T08:47:30Z</dc:date>
    <item>
      <title>ISE BYOD/MDM integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3678404#M543062</link>
      <description>&lt;P class="p1"&gt;A partner is having issues with iPhone and BYOD (not an issue with ISE), the Client Provisioning no longer provides a good user experience and as a result now are looking for an alternative to provide EAP-TLS based authentication for employee personal devices.&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Partner thoughts are to use an MDM (the customer is using&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;XenMobile) to push a certificate to the device, whether it by iPhone or Android. The partner would prefer to use ISE to issue the certificate.&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;The question is, can ISE be used as a SCEP server to issue certificates to the BYOD devices with the request originating from the MDM server?&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;I’m assuming when the user registers to the MDM, ISE can be used to authenticate the request and once the certificate is issued, ISE can authenticate against the certificate?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 08:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3678404#M543062</guid>
      <dc:creator>iagyte</dc:creator>
      <dc:date>2019-03-11T08:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD/MDM integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3678775#M543063</link>
      <description>&lt;P&gt;Hi Iagyte&lt;BR /&gt;&lt;BR /&gt;Yes ISE can act as scep server if it has configured as CA authority. &lt;BR /&gt;When you activate the internal CA, on the latest column, you'll get the scep url. &lt;BR /&gt;I've never tested it this way sourcing the request by MDM, but you can test it and let us know.&lt;BR /&gt;I've implemented it using ASA/anyconnect as source request and it works well.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 03:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3678775#M543063</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-08-01T03:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD/MDM integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3679041#M543064</link>
      <description>Why? If the MDM can do the work this is the requested approach&lt;BR /&gt;&lt;BR /&gt;Otherwise the experience will be the same and with more pieces to break&lt;BR /&gt;&lt;BR /&gt;The on boarding process is basically the same. It’s just that if you don’t have well known certificate on your ISE nodes you will have a bad experience &lt;BR /&gt;</description>
      <pubDate>Wed, 01 Aug 2018 11:10:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3679041#M543064</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-08-01T11:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD/MDM integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3679549#M543065</link>
      <description>I'm not sure I get you. Maybe I misspelled something.&lt;BR /&gt;Your onboarding process will be done on your MDM but the certificate authority will be ISE and ISE can act as scep server. This was your question, isn't it?&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Aug 2018 21:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3679549#M543065</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-08-01T21:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD/MDM integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3679644#M543066</link>
      <description>If you’re mdm is a certificate authority then all provisioning and on-boarding should go through the mdm app. This is the best user experience and least complex path. That’s what the mdm is designed for. It will be all contained &lt;BR /&gt;&lt;BR /&gt;Although you might be able to somehow point ISE to the mdm CA and provision that way. It’s not recommended and tested. This way you’re increasing complexity and making the on-boarding process more difficult &lt;BR /&gt;</description>
      <pubDate>Thu, 02 Aug 2018 02:40:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3679644#M543066</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-08-02T02:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD/MDM integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3679652#M543067</link>
      <description>Ok now i get you. Yes the mdm on boarding is the best user experience. However the question was to know if ise can be scep server. &lt;BR /&gt;You can onboard the device through mdm but the certificate authority can be ise or anything else, it won't change the user experience. It's just something happening behind the scene.</description>
      <pubDate>Thu, 02 Aug 2018 03:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3679652#M543067</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-08-02T03:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD/MDM integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3679921#M543068</link>
      <description>That’s incorrect. If ISE is the SCEP server then the client needs to use ISE BYOD onboarding as the app has no way Ron control this and ISE only talks to endpoint using the NSP wizard or Apple iOS OTA flow. Don’t do this it’s not supported.  It doesn’t make sense or is practical to point ISE at the MDM CA &lt;BR /&gt;</description>
      <pubDate>Thu, 02 Aug 2018 11:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3679921#M543068</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-08-02T11:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD/MDM integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3681185#M543069</link>
      <description>I didn't say it will work.&lt;BR /&gt;I said ise can act as scep server to get certificates from it like you can do for anyconnect users. For some users it doesn't work.&lt;BR /&gt;I said he can try and if that works then fine but i agree that this isn't the best way to do it.</description>
      <pubDate>Sat, 04 Aug 2018 03:31:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-mdm-integration/m-p/3681185#M543069</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-08-04T03:31:07Z</dc:date>
    </item>
  </channel>
</rss>

