<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE AD-group query in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-ad-group-query/m-p/3676834#M548090</link>
    <description>&lt;P&gt;I believe it's likely a security thing that MS AD side giving vague&amp;nbsp;responses so that ISE is unable to inform more specifically. This usually takes to enable auditing in MS AD and check on the audit log there.&lt;/P&gt;</description>
    <pubDate>Sat, 28 Jul 2018 20:00:14 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2018-07-28T20:00:14Z</dc:date>
    <item>
      <title>ISE AD-group query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-group-query/m-p/3416876#M547937</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am a bit annoyed that ISE doesn't report what is wrong when it is unable to retrieve an AD group.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have different branches in my AD tree, but ISE is only able to retrieve groups from one of them.&lt;/P&gt;
&lt;P&gt;For example it can find groups under domain/company/abc/123 but not domain/company/xyz/987&lt;/P&gt;
&lt;P&gt;That is probably a permission problem on the ISE-object in AD. I will have the AD ppl look in to that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What annoys me is that ISE doesn't give an error. It just say "0 Groups Retrieved" when I do the search and the AD connector Operations report say that everything is fine and successfull.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a way to get ISE to report something like "The group you are searching for doesn't exist" or "you dont have permission to search in&amp;nbsp;&lt;SPAN&gt;domain/company/xyz/987"?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Philip&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 19:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-group-query/m-p/3416876#M547937</guid>
      <dc:creator>Philip Vilhelmsson</dc:creator>
      <dc:date>2020-02-21T19:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE AD-group query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-group-query/m-p/3417226#M547938</link>
      <description>&lt;P&gt;This subject is not my strong suite, but I would argue that the user account that was used when you joined the AD (to create the&amp;nbsp;ISE machine account in AD) should have sufficient privileges to search the entire domain.&amp;nbsp; This is where I usually default to using a domain admin service account when joining my ISE nodes and I have never had an issue.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jul 2018 00:02:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-group-query/m-p/3417226#M547938</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-07-18T00:02:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE AD-group query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-group-query/m-p/3417530#M548085</link>
      <description>&lt;P&gt;Yes that is when joining the AD. After the join ISE will use it's computer object (that we created in AD) to do the search for AD-groups. So the problem has probably to do with that objects permission.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, my issue is that when ISE don't have permission to do a search in AD I don't get an error when I try to retrieve a group under the AD-settings.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jul 2018 13:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-group-query/m-p/3417530#M548085</guid>
      <dc:creator>Philip Vilhelmsson</dc:creator>
      <dc:date>2018-07-18T13:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE AD-group query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-group-query/m-p/3676199#M548088</link>
      <description>&lt;P&gt;The answer to the question is no.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Really this is a feature request - "please add better error / reporting feedback to ISE when AD searches result in a failure"&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jul 2018 12:45:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-group-query/m-p/3676199#M548088</guid>
      <dc:creator>RichardAtkin</dc:creator>
      <dc:date>2018-07-27T12:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE AD-group query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-group-query/m-p/3676834#M548090</link>
      <description>&lt;P&gt;I believe it's likely a security thing that MS AD side giving vague&amp;nbsp;responses so that ISE is unable to inform more specifically. This usually takes to enable auditing in MS AD and check on the audit log there.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Jul 2018 20:00:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-group-query/m-p/3676834#M548090</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-07-28T20:00:14Z</dc:date>
    </item>
  </channel>
</rss>

