<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authentication failed - Rejected per authorization profile in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333502#M550161</link>
    <description>This machine isn't included in your AD search space which is configured in&lt;BR /&gt;ISE hence its failing.&lt;BR /&gt;&lt;BR /&gt;For example, if you configure the AD in ISE to search in computers OU while&lt;BR /&gt;this machine is assigned in Laptops OU, it won't locate the machine and&lt;BR /&gt;will fail. This is happening here.&lt;BR /&gt;</description>
    <pubDate>Mon, 19 Feb 2018 11:20:42 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2018-02-19T11:20:42Z</dc:date>
    <item>
      <title>Authentication failed - Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333485#M550158</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11017 &amp;nbsp;RADIUS created a new session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15049 &amp;nbsp;Evaluating Policy Group&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15008 &amp;nbsp;Evaluating Service Selection Policy&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15048 &amp;nbsp;Queried PIP - Airespace.Airespace-Wlan-Id&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15048 &amp;nbsp;Queried PIP - Radius.NAS-IP-Address&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15048 &amp;nbsp;Queried PIP - Normalised Radius.RadiusFlowType&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15004 &amp;nbsp;Matched rule - 802_1_X&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11507 &amp;nbsp;Extracted EAP-Response/Identity&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12300 &amp;nbsp;Prepared EAP-Request proposing PEAP with challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12101 &amp;nbsp;Extracted EAP-Response/NAK requesting to use EAP-FAST instead&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12100 &amp;nbsp;Prepared EAP-Request proposing EAP-FAST with challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12102 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response and accepting EAP-FAST as negotiated&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12800 &amp;nbsp;Extracted first TLS record; TLS handshake started&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12805 &amp;nbsp;Extracted TLS ClientHello message&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12806 &amp;nbsp;Prepared TLS ServerHello message&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12807 &amp;nbsp;Prepared TLS Certificate message&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12808 &amp;nbsp;Prepared TLS ServerKeyExchange message&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12810 &amp;nbsp;Prepared TLS ServerDone message&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12812 &amp;nbsp;Extracted TLS ClientKeyExchange message&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12813 &amp;nbsp;Extracted TLS CertificateVerify message&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12804 &amp;nbsp;Extracted TLS Finished message&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12801 &amp;nbsp;Prepared TLS ChangeCipherSpec message&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12802 &amp;nbsp;Prepared TLS Finished message&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12816 &amp;nbsp;TLS handshake succeeded&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12149 &amp;nbsp;EAP-FAST built authenticated tunnel for purpose of PAC provisioning&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12209 &amp;nbsp;Starting EAP chaining&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12218 &amp;nbsp;Selected identity type 'User'&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12125 &amp;nbsp;EAP-FAST inner method started&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11521 &amp;nbsp;Prepared EAP-Request/Identity for inner EAP method&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12212 &amp;nbsp;Identity type provided by client is equal to requested&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11522 &amp;nbsp;Extracted EAP-Response/Identity for inner EAP method&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11806 &amp;nbsp;Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11808 &amp;nbsp;Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15041 &amp;nbsp;Evaluating Identity Policy&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15006 &amp;nbsp;Matched Default Rule&lt;BR /&gt;&amp;nbsp; &amp;nbsp;22072 &amp;nbsp;Selected identity source sequence - ABC_Emp_SSID&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15013 &amp;nbsp;Selected Identity Source - ABC-AD&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24430 &amp;nbsp;Authenticating user against Active Directory - ABC-AD&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24325 &amp;nbsp;Resolving identity - BOB&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24313 &amp;nbsp;Search for matching accounts at join point - corp.ABC.com&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24319 &amp;nbsp;Single matching account found in forest - corp.ABC.com&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24367 &amp;nbsp;Skipping unusable domain - ABC.com,Domain trust is one-way&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24323 &amp;nbsp;Identity resolution detected single matching account&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24343 &amp;nbsp;RPC Logon request succeeded - BOB@corp.ABC.com&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24402 &amp;nbsp;User authentication against Active Directory succeeded - ABC-AD&lt;BR /&gt;&amp;nbsp; &amp;nbsp;22037 &amp;nbsp;Authentication Passed&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11824 &amp;nbsp;EAP-MSCHAP authentication attempt passed&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11810 &amp;nbsp;Extracted EAP-Response for inner method containing MSCHAP challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11814 &amp;nbsp;Inner EAP-MSCHAP authentication succeeded&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11519 &amp;nbsp;Prepared EAP-Success for inner EAP method&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12128 &amp;nbsp;EAP-FAST inner method finished successfully&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12966 &amp;nbsp;Sent EAP Intermediate Result TLV indicating success&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12126 &amp;nbsp;EAP-FAST cryptobinding verification passed&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12200 &amp;nbsp;Approved EAP-FAST client Tunnel PAC request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12219 &amp;nbsp;Selected identity type 'Machine'&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12125 &amp;nbsp;EAP-FAST inner method started&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11521 &amp;nbsp;Prepared EAP-Request/Identity for inner EAP method&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12213 &amp;nbsp;Identity type provided by client is not equal to requested type&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12216 &amp;nbsp;Identity type provided by client was already used for authentication&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12967 &amp;nbsp;Sent EAP Intermediate Result TLV indicating failure&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24433 &amp;nbsp;Looking up machine in Active Directory - ABC-AD&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24325 &amp;nbsp;Resolving identity - GHM120056$@corp.ABC.com&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24313 &amp;nbsp;Search for matching accounts at join point - corp.ABC.com&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24318 &amp;nbsp;No matching account found in forest - corp.ABC.com&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24315 &amp;nbsp;Single matching account found in domain - corp.ABC.com&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24323 &amp;nbsp;Identity resolution detected single matching account&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24439 &amp;nbsp;Machine Attributes retrieval from Active Directory succeeded - ABC-AD&lt;BR /&gt;&amp;nbsp; &amp;nbsp;24422 &amp;nbsp;ISE has confirmed previous successful machine authentication for user in Active Directory&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15036 &amp;nbsp;Evaluating Authorization Policy&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15048 &amp;nbsp;Queried PIP - Session.PostureStatus&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15004 &amp;nbsp;Matched rule - Default&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15016 &amp;nbsp;Selected Authorization Profile - DenyAccess&lt;BR /&gt;&amp;nbsp; &amp;nbsp;15039 &amp;nbsp;Rejected per authorization profile&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12855 &amp;nbsp;PAC was not sent due to authorization failure&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12965 &amp;nbsp;Sent EAP Result TLV indicating failure&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12105 &amp;nbsp;Prepared EAP-Request with another EAP-FAST challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11006 &amp;nbsp;Returned RADIUS Access-Challenge&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11001 &amp;nbsp;Received RADIUS Access-Request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11018 &amp;nbsp;RADIUS is re-using an existing session&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12104 &amp;nbsp;Extracted EAP-Response containing EAP-FAST challenge-response&lt;BR /&gt;&amp;nbsp; &amp;nbsp;12109 &amp;nbsp;EAP-FAST provisioning phase finished&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11504 &amp;nbsp;Prepared EAP-Failure&lt;BR /&gt;&amp;nbsp; &amp;nbsp;11003 &amp;nbsp;Returned RADIUS Access-Reject&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Above is the result output&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;User Laptop authentication getting failed when trying to access through wifi, same user can access through wired connection(Wired and Wifi both Authentication is from AD)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am suspecting this might be the problem&amp;nbsp;15048 &amp;nbsp;Queried PIP - Session.PostureStatus&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;15004 &amp;nbsp;Matched rule - Default&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But in Eap Chaining Result its showing the result as - User succeeded and machine failed&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What might be the solution or&amp;nbsp;I am missing something in policy.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:45:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333485#M550158</guid>
      <dc:creator>Ali</dc:creator>
      <dc:date>2020-02-21T18:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication failed - Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333492#M550159</link>
      <description>Here is the problem&lt;BR /&gt;&lt;BR /&gt;   24325  Resolving identity - GHM120056$@corp.ABC.com&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;&lt;BR /&gt;   24313  Search for matching accounts at join point - corp.ABC.com&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;&lt;BR /&gt;   24318  No matching account found in forest - corp.ABC.com&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;&lt;BR /&gt;   24315  Single matching account found in domain - corp.ABC.com&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;What is  GHM120056$ ? That is shared as identity but can't be evaluated&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Feb 2018 10:59:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333492#M550159</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-02-19T10:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication failed - Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333496#M550160</link>
      <description>Hi Mohammed,&lt;BR /&gt;&lt;BR /&gt;GHM120056 = Machine Id, which is mapped in DHCP(AD) &lt;BR /&gt;</description>
      <pubDate>Mon, 19 Feb 2018 11:05:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333496#M550160</guid>
      <dc:creator>Ali</dc:creator>
      <dc:date>2018-02-19T11:05:51Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication failed - Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333502#M550161</link>
      <description>This machine isn't included in your AD search space which is configured in&lt;BR /&gt;ISE hence its failing.&lt;BR /&gt;&lt;BR /&gt;For example, if you configure the AD in ISE to search in computers OU while&lt;BR /&gt;this machine is assigned in Laptops OU, it won't locate the machine and&lt;BR /&gt;will fail. This is happening here.&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Feb 2018 11:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333502#M550161</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-02-19T11:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication failed - Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333513#M550162</link>
      <description>&lt;BR /&gt;Dear Mohammed,&lt;BR /&gt;I highly appreciate your response    &lt;BR /&gt;&lt;BR /&gt;         24325 	Resolving identity - GHM120056$@corp.ABC.com&lt;BR /&gt;  	24313 	Search for matching accounts at join point - corp.ABC.com&lt;BR /&gt;  	24318 	No matching account found in forest - corp.ABC.com&lt;BR /&gt;  	24315 	Single matching account found in domain - corp.ABC.com&lt;BR /&gt;  	24323 	Identity resolution detected single matching account&lt;BR /&gt;  	24439 	Machine Attributes retrieval from Active Directory succeeded - ABC-AD&lt;BR /&gt;  	24422 	ISE has confirmed previous successful machine authentication for user in  Active Directory&lt;BR /&gt;  	15036 	Evaluating Authorization Policy&lt;BR /&gt;&lt;BR /&gt;But, according to logs we can find " Machine Attributes retrieval from Active Directory succeeded" what this result means.&lt;BR /&gt;&lt;BR /&gt;After this its going to Authz profile and then Failing.&lt;BR /&gt;Please correct me if i am wrong.&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Feb 2018 11:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333513#M550162</guid>
      <dc:creator>Ali</dc:creator>
      <dc:date>2018-02-19T11:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication failed - Rejected per authorization profile</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333523#M550163</link>
      <description>You are right. I think I didn't explain it well. Basically after successful&lt;BR /&gt;authentication which you pointed it download AD attributes for the machine&lt;BR /&gt;and goes to authorization check. None of your authorization policies is&lt;BR /&gt;matched using the attributes and its going to default rule which is reject&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Feb 2018 11:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-failed-rejected-per-authorization-profile/m-p/3333523#M550163</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-02-19T11:58:42Z</dc:date>
    </item>
  </channel>
</rss>

