<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Windows account?? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4035205#M558310</link>
    <description>&lt;P&gt;I haven't found the settings for the service account within ISE?&lt;/P&gt;</description>
    <pubDate>Tue, 25 Feb 2020 07:54:33 GMT</pubDate>
    <dc:creator>Michael Bartholomæussen</dc:creator>
    <dc:date>2020-02-25T07:54:33Z</dc:date>
    <item>
      <title>ISE Windows account??</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4030461#M453872</link>
      <description>&lt;P&gt;I've inherited an ISE deployment and In our AD there is a ISE service account who is a domain admin.&lt;/P&gt;&lt;P&gt;Going through the ISE guides, I can that the service account need specific permission in AD, and I guess they've used a domain admin (the dirty way).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to rectify this by creating a new account with the specific permission, but I can't seem to find where the account is defined within ISE. The only account I can find (but not used in any way), is the AD join account.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the question is, where do I find the other account in ISE?&lt;/P&gt;</description>
      <pubDate>Sun, 16 Feb 2020 12:03:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4030461#M453872</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2020-02-16T12:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Windows account??</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4030500#M453873</link>
      <description>If this account was created to only join ISE to AD, then you don't need it anymore.  When you join ISE to AD, the service account is only used to create a machine object within AD.  From that point on, ISE leverages the AD computer object to perform lookups. &lt;BR /&gt;&lt;BR /&gt;You should be able to find a computer object per ISE node that has been joined in the directory.  &lt;BR /&gt;</description>
      <pubDate>Sun, 16 Feb 2020 16:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4030500#M453873</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2020-02-16T16:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Windows account??</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4030890#M453874</link>
      <description>&lt;P&gt;Hi Damien&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both nodes are present in AD, and "joined" under External Ident.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've stepped through the guide again, and under "Set Permissions for Access to WMI Root/CIMv2 Name Space" the account is applied on our Domain controller. But I can't seem to find, where the user is defined in ISE (where the pwd is set)&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_01110.html#task_784A7F6991594B11B1BAD206FDCD249B" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_01110.html#task_784A7F6991594B11B1BAD206FDCD249B&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2020 12:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4030890#M453874</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2020-02-17T12:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Windows account??</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4030976#M453875</link>
      <description>When you join ISE to AD, the user name and password will be typed in to the GUI, but it is single use only. It's not saved after the join operation is completed on a node. &lt;BR /&gt;&lt;BR /&gt;The user account you use to join ISE to AD is not used by ISE after the join is complete. The computer objects created while joining are what ISE leverages past the join operation.</description>
      <pubDate>Mon, 17 Feb 2020 15:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4030976#M453875</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2020-02-17T15:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Windows account??</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4033478#M558203</link>
      <description>&lt;P&gt;The WMI thing is for Passive Identity.&lt;/P&gt;
&lt;P&gt;Unless you are using that feature, you would not need the user credentials, just like Damien said.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 04:36:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4033478#M558203</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-02-21T04:36:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Windows account??</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4033914#M558224</link>
      <description>Passive identity is a good exception to note.  I was thinking of this from strictly a node being joined to AD.  &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 21 Feb 2020 21:16:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4033914#M558224</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2020-02-21T21:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Windows account??</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4035205#M558310</link>
      <description>&lt;P&gt;I haven't found the settings for the service account within ISE?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 07:54:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4035205#M558310</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2020-02-25T07:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Windows account??</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4035231#M558313</link>
      <description>Editing the settings for the PassiveID Domain Controllers, the option is there to set the password for the service account. I had only been focusing on "Config WMI" and "Add Domain Controllers"</description>
      <pubDate>Tue, 25 Feb 2020 08:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-windows-account/m-p/4035231#M558313</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2020-02-25T08:56:39Z</dc:date>
    </item>
  </channel>
</rss>

