<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE intune integration question in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4107475#M561354</link>
    <description>&lt;P&gt;HI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we are planning to integrate our ISE as well to to Azure AD, so we can use our endpoint to use Cert based authentication insted of password to ISE. Is there a step by step guide on the a) ISE side to configure CERT based authentication for end points. b) Azure side configuration c) end point side configuration and d)any configuration needs to be done on the NAD side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;karthik&lt;/P&gt;</description>
    <pubDate>Mon, 22 Jun 2020 15:53:44 GMT</pubDate>
    <dc:creator>karthik.cs</dc:creator>
    <dc:date>2020-06-22T15:53:44Z</dc:date>
    <item>
      <title>ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3955618#M455815</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I would like to integrate ISE into intune and will be following the following guide:&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01001.html?bookSearch=true#id_37138" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01001.html?bookSearch=true#id_37138&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;We have a 2 node cluster setup and the guide indicates you have to use the default self-signed server certificate.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;What do you have to do for adding the 2 node ?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Just add the values to the keyfile?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"keyCredentials": [&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; “customKeyIdentifier“: “$base64Thumbprint_from_ISENODE1”,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; “keyId“: “$keyid_from_above“,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "type": "AsymmetricX509Cert",&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "usage": "Verify",&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "value": "&lt;/SPAN&gt;&lt;STRONG&gt;Base64 Encoded String of ISE PAN cert&lt;/STRONG&gt;&lt;SPAN&gt;"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp; {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; “customKeyIdentifier“: “$base64Thumbprint_from_ISENODE2”,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; “keyId“: “$keyid_from_above“,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "type": "AsymmetricX509Cert",&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "usage": "Verify",&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "value": "&lt;/SPAN&gt;&lt;STRONG&gt;Base64 Encoded String of ISE PAN cert&lt;/STRONG&gt;&lt;SPAN&gt;"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2019 14:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3955618#M455815</guid>
      <dc:creator>Frederik De Muyter</dc:creator>
      <dc:date>2019-11-08T14:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3956004#M455816</link>
      <description>&lt;P&gt;Please review the info at&amp;nbsp;&lt;A id="link_2_a6979c0797dc05_3_1d884" class="page-link lia-link-navigation lia-custom-event" href="https://community.cisco.com/t5/identity-services-engine-ise/ise-mdm-integration-with-azure-intune/m-p/2977707" target="_blank"&gt;ISE MDM integration with Azure/Intune&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Nov 2019 03:41:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3956004#M455816</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-11-09T03:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3956074#M455886</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Tnx for the update, the certificate I have covered now.&lt;/P&gt;&lt;P&gt;Is there an update version of the ISE integration guide, the microsoft portal has completely changed and I don't seem to find the correct permissions I need to assign&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01001.html#id_37138" target="_blank" rel="noopener"&gt;.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;The official documentation doesn't include this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01001.html#id_37138" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01001.html#id_37138&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;Frederik.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Nov 2019 11:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3956074#M455886</guid>
      <dc:creator>Frederik De Muyter</dc:creator>
      <dc:date>2019-11-09T11:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3956142#M455887</link>
      <description>&lt;P&gt;I will check with our team. Please also check with your MS Intune support.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Nov 2019 16:46:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3956142#M455887</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-11-09T16:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3956358#M455888</link>
      <description>&lt;P&gt;Tnx I will check with microsoft intune also.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Nov 2019 16:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3956358#M455888</guid>
      <dc:creator>Frederik De Muyter</dc:creator>
      <dc:date>2019-11-10T16:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3956717#M455889</link>
      <description>&lt;P&gt;Our DE team asking which API permissions not seen in the Azure portal.&lt;/P&gt;
&lt;P&gt;DE said we had no a new list for this. The main permissions are:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;· &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Read Microsoft Intune Device Configuration and Policies&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;· &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Read Microsoft Intune Configuration&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2019 15:52:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3956717#M455889</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-11-11T15:52:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3957776#M455890</link>
      <description>&lt;P&gt;Hi Hslai,&lt;/P&gt;&lt;P&gt;Following the guide on TechNet post:&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;&lt;A href="https://blogs.technet.microsoft.com/rogoel/2018/03/20/microsoft-intune-as-an-mdm-server-for-cisco-ise/" target="_blank" rel="noopener"&gt;https://blogs.technet.microsoft.com/rogoel/2018/03/20/microsoft-intune-as-an-mdm-server-for-cisco-ise/&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;I mapped the permission to the new ones using:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;&lt;A href="https://docs.microsoft.com/en-us/graph/permissions-reference" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/graph/permissions-reference&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE API Permissions.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/49312i5A5FFAB22F575959/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE API Permissions.PNG" alt="ISE API Permissions.PNG" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Can you confirm this is all that I need? Or do I need less.&amp;nbsp; In the TechNet article they are talking about the Azure Active Directory API but this has been discontinued I believe and now integrated in the Graph API.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Would be good to have exact instructions inside the general Admin Guide of ISE , the admin guide doesn't even talk about permissions or did I mis something.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Also the admin guide states the following:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;ISE MDM Support for Microsoft Intune and SCCM&lt;BR /&gt;&lt;STRONG&gt;Microsoft Intune- MDM-ISE supports Microsoft's Intune device management as a partner MDM server managing mobile devices.&lt;/STRONG&gt;&lt;BR /&gt;You configure ISE as an OAuth 2.0 client application on the Intune server managing mobile devices. ISE gets a token from Azure to establish a session with that ISE Intune application.&lt;BR /&gt;See &lt;A href="https://msdn.microsoft.com/en-us/library/azure/dn645543.aspx" target="_blank"&gt;https://msdn.microsoft.com/en-us/library/azure/dn645543.aspx&lt;/A&gt; for more information about how Intune communicates with a client application.&lt;BR /&gt;Desktop Device Manager (Microsoft SCCM) - ISE supports Microsoft's System Center Configuration Manager (SCCM) as a partner MDM server for managing Windows computers. ISE retrieves compliance information from the SCCM server using WMI, and uses that information to grant or deny network access to the user's Windows device. &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;In my situation we are running Co-Management solution so intune and SSCM.&amp;nbsp; Can I read the compliancy status of windows 10 devices using only intune?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2019 07:50:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3957776#M455890</guid>
      <dc:creator>Frederik De Muyter</dc:creator>
      <dc:date>2019-11-13T07:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3990034#M455891</link>
      <description>&lt;P&gt;Hi Hslai,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have not heard back from you: I am still not able to add Intune as MDM server.&lt;/P&gt;&lt;P&gt;First I got an error about unable to connect I had to add the&amp;nbsp; Microsoft IT TLS CA1 to the trusted certificate:&lt;/P&gt;&lt;P&gt;After doing this I got the error:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Failed to acquire auth token from Azure AD. Error validating credentials. Client assertion contains an invalid signature. [Reason - The key was not found&lt;SPAN&gt;., Thumbprint of key used by client: 'AC33728EAE517ECCEFEIJFE7CE49298538F8E66F1C5CAD'&lt;/SPAN&gt;,&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;Configured keys: [Key0:Start=09/21/2016, End=09/21/2017, Thumbprint=7DF7384DEFE7FDB62123310C1DAE2A9563&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;5016513A;]] Check if either ISE certificates not being uploaded or problem with certificates already uploaded to App on Azure A&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;My ise was no using the default self signed certificate to connect.&amp;nbsp; so i exported all certifiates and found the thumprint.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;After fixing this i am nog getting the following error:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;SPAN&gt;sun.security.validator.ValidatorException:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;PKIX path building failed: sun.security.provider.certpath.SunCertPathB&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;uilderException: unable to find valid certification path to requested target&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;What am i doing wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 11:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3990034#M455891</guid>
      <dc:creator>Frederik De Muyter</dc:creator>
      <dc:date>2019-11-27T11:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3990053#M455892</link>
      <description>&lt;P&gt;So it seems like I was till missing certificates from Microsoft, did a pcap and extracted the certificate info from there.&lt;/P&gt;&lt;P&gt;The certificates is was missing.&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Microsoft IT TLS CA 1&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Microsoft IT TLS CA 2&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Microsoft IT TLS CA 5&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;After importing this I got a new error message &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;I had to change the graph.microsoft.com to graph .net&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;so I have the following now in MDM&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Auto discovery URL:&amp;nbsp; &lt;A href="https://graph.windows.net/tenant-id" target="_blank" rel="noopener"&gt;https://graph.windows.net/tenant-id&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Client ID :&amp;nbsp; Application ID from Azure&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Token issueing URL: &lt;A href="https://login.microsoftonline.com/tenant-id/oauth2/token" target="_blank" rel="noopener"&gt;https://login.microsoftonline.com/tenant-id/oauth2/token&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Now my connection to ISE intune is valid.&amp;nbsp; I will post a full manual on what I did if I have some time.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Really bad documentation on this integration.&lt;BR /&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 12:14:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/3990053#M455892</guid>
      <dc:creator>Frederik De Muyter</dc:creator>
      <dc:date>2019-11-27T12:14:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4079415#M560131</link>
      <description>&lt;P&gt;Hi Fred,&lt;/P&gt;&lt;P&gt;Your efforts have been the most helpful, as you stated the Azure Portal has changed considerably from any official documentation.&lt;BR /&gt;I have just managed to pull the integration together with the help of many articles So I thought I might put my procedure up as I have to do this again in production.&lt;/P&gt;&lt;P&gt;I also hope it helps others.&lt;/P&gt;&lt;P&gt;Disclaimer, I have not actively tested that this works with an ISE authorization or authentication policy and additional permissions and policies may have to be added.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;***** Install the Azure Certificate into ISE *****&lt;BR /&gt;Download the Baltimore Certificate from &lt;A href="https://portal.azure.com" target="_blank"&gt;https://portal.azure.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Click the Padlock Icon on address bar&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Click Certificate (valid)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Change to Certification Path Tab&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Select the Baltimore Certificate&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Click View Certificate&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Change to the Details Tab&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Click Copy to File...&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Save the Certificate and close all Certificate windows.&lt;/P&gt;&lt;P&gt;login to ISE Portal&lt;BR /&gt;Navigate to Administration -&amp;gt; System -&amp;gt; Certificate&lt;BR /&gt;Navigate to Trusted Certificates&lt;BR /&gt;Import the Downloaded Baltimore Certificates&lt;BR /&gt;Proceed through the SHA1 Warning and Duplicate warning to complete the install.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;***** Generate ISE Key for upload to Azure *****&lt;BR /&gt;Login to ISE Portal&lt;BR /&gt;Navigate to Administration -&amp;gt; System -&amp;gt; Certificates&lt;BR /&gt;Navigate to System Certificates&lt;BR /&gt;Select the Default Self Signed or other Signed Certificate&lt;BR /&gt;Export the certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;***** Generate and record the base64 Certificate details *****&lt;/P&gt;&lt;P&gt;Open Powershell ISE&lt;BR /&gt;Add the following power command to the script pane:-&lt;/P&gt;&lt;PRE&gt;$certpath = "&amp;lt;&amp;lt;Path to certificate&amp;gt;&amp;gt;"
$cer = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2
$cer.Import("$certpath")
$bin = $cer.GetRawCertData()
$base64Value = [System.Convert]::ToBase64String($bin)
$bin = $cer.GetCertHash()
$base64Thumbprint = [System.Convert]::ToBase64String($bin)
$keyid = [System.Guid]::NewGuid().ToString()

"KeyThumbprint: $base64Thumbprint" | Out-Host
"keyID: $keyid" | Out-Host
"keyValue: $base64Value" | Out-Host&lt;/PRE&gt;&lt;P&gt;Replace &amp;lt;&amp;lt;path to certificate&amp;gt;&amp;gt; with you certificate and path like C:\Certs\ISE.cer&lt;BR /&gt;Record the KeyThumbprint, KeyID and KeyValue&lt;BR /&gt;Note: when used the keyValue need to be on a single line without line breaks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;***** Create New Azure Application *****&lt;/P&gt;&lt;P&gt;Login to Azure&lt;BR /&gt;Navigate to Azure Active Directory&lt;BR /&gt;Navigate to App registrations&lt;BR /&gt;Add New Registration&lt;BR /&gt;Name: ISE&lt;BR /&gt;Supported Account types: Single Tenant&lt;BR /&gt;Redirect URI: Web&lt;BR /&gt;URI: "blank"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;***** Upload ISE Certificates into ISE Application *****&lt;BR /&gt;Navigate to Azure Active Directory&lt;BR /&gt;Navigate to App registrations&lt;BR /&gt;Select ISE Application&lt;BR /&gt;Navigate to Manifest&lt;BR /&gt;Download Manifest (Do not rename)&lt;BR /&gt;Modify Line:&lt;BR /&gt;From:&lt;/P&gt;&lt;PRE&gt;"keyCredentials": [],&lt;/PRE&gt;&lt;P&gt;To:&lt;/P&gt;&lt;PRE&gt;"keyCredentials": [
{
"customKeyIdentifier": "&amp;lt;&amp;lt;KeyThumbprint&amp;gt;&amp;gt;",
"keyId": "&amp;lt;&amp;lt;KeyID&amp;gt;&amp;gt;",
"type": "AsymmetricX509Cert",
"usage": "Verify",
"value": "&amp;lt;&amp;lt;KeyValue&amp;gt;&amp;gt;"
}
],&lt;/PRE&gt;&lt;P&gt;Replace &amp;lt;&amp;lt;KeyThumbprint&amp;gt;&amp;gt; with ISE Certificate KeyThumbprint recorded earlier&lt;BR /&gt;Replace &amp;lt;&amp;lt;KeyID&amp;gt;&amp;gt; with ISE Certificate KeyID recorded earlier&lt;BR /&gt;Replace &amp;lt;&amp;lt;KeyValuet&amp;gt;&amp;gt; with ISE Certificate KeyValue recorded earlier&lt;BR /&gt;If a 2nd Certificate is needed download and obtain the base64 values and modify the Manifest file with an additional customKeyIdentifier&lt;/P&gt;&lt;PRE&gt;"keyCredentials": [
{
"customKeyIdentifier": "&amp;lt;&amp;lt;KeyThumbprint1&amp;gt;&amp;gt;",
"keyId": "&amp;lt;&amp;lt;KeyID1&amp;gt;&amp;gt;",
"type": "AsymmetricX509Cert",
"usage": "Verify",
"value": "&amp;lt;&amp;lt;KeyValue1&amp;gt;&amp;gt;"
},
{
"customKeyIdentifier": "&amp;lt;&amp;lt;KeyThumbprint2&amp;gt;&amp;gt;",
"keyId": "&amp;lt;&amp;lt;KeyID2&amp;gt;&amp;gt;",
"type": "AsymmetricX509Cert",
"usage": "Verify",
"value": "&amp;lt;&amp;lt;KeyValue2&amp;gt;&amp;gt;"
}
],&lt;/PRE&gt;&lt;P&gt;Finally Upload New Manifest File to ISE App&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;***** Configure Azure Permissions *****&lt;BR /&gt;Navigate to Azure Active Directory&lt;BR /&gt;Navigate to App registrations&lt;BR /&gt;Select ISE Application&lt;BR /&gt;Navigate to API Permissions&lt;BR /&gt;Remove existing - Microsoft Graph - Delegated - User.Read&lt;BR /&gt;Add the Following Permissions&lt;BR /&gt;Microsoft Graph&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Delegated&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; offline_access - Maintain access to data you have given it access to&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; openid - View users basic profile&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Application&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Directory.Read.All - Read directory data&lt;BR /&gt;Intune&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Application&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; get_device_compliance - Get device state and compliance information from Microsoft Intune&lt;BR /&gt;Grant admin consent if required.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;***** Record Required Values for ISE *****&lt;BR /&gt;Navigate to Azure Active Directory&lt;BR /&gt;Navigate to App registrations&lt;BR /&gt;Select ISE Application&lt;BR /&gt;Navigate to Overview&lt;BR /&gt;Record Values for Application (client) ID:&lt;BR /&gt;Select Endpoints&lt;BR /&gt;Copy Values for:&lt;BR /&gt;Microsoft Graph API endpoint:&lt;BR /&gt;OAuth 2.0 token endpoint (v1):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;***** Create External MDM In ISE *****&lt;BR /&gt;Login to ISE Portal&lt;BR /&gt;Navigate to Administration -&amp;gt; Network Resources -&amp;gt; External MDM&lt;BR /&gt;Add New MDM Server&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Name: Azure_Intune_MDM&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Server Type: Mobile Device Manager&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Authentication Type: OAuth - Client Credentials&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Auto Discovery: Yes&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Auto Discovery URL: Use the Value from Microsoft Graph API endpoint&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Client ID: Use the Value from the Application (client) ID&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Token Issuing URL: Use the value from the OAuth 2.0 token endpoint (v1)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Token Audience: Leave at default (prepopulated - &lt;A href="https://api.manage.microsoft.com/" target="_blank"&gt;https://api.manage.microsoft.com/&lt;/A&gt;)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Description: Azure Intune MDM&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Polling Interval: 240&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Time Interval for Compliance Device ReAuth Query: 1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Status: Enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notes: Microsoft Graph API endpoint may need to be adjusted if not working with recorded value.&lt;BR /&gt;Use &lt;A href="https://graph.windows.net/&amp;lt;&amp;lt;tenant-id" target="_blank"&gt;https://graph.windows.net/&amp;lt;&amp;lt;tenant-id&lt;/A&gt;&amp;gt;&amp;gt;&lt;BR /&gt;&amp;lt;&amp;lt;tenant-id&amp;gt;&amp;gt; can be found on OAuth 2.0 token endpoint (v1) URL&lt;BR /&gt;&lt;A href="https://community.cisco.com/" target="_blank"&gt;https://login.microsoftonline.com/&amp;lt;&amp;lt;tenant-id&amp;gt;&amp;gt;/oauth2/token&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 02:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4079415#M560131</guid>
      <dc:creator>Rodd</dc:creator>
      <dc:date>2020-05-05T02:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4079471#M560135</link>
      <description>&lt;P&gt;Nice Tnx! For helping out the community.&lt;/P&gt;&lt;P&gt;maybe cisco can give us some free ISE licenses because god it is expensive &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 07:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4079471#M560135</guid>
      <dc:creator>Frederik De Muyter</dc:creator>
      <dc:date>2020-05-05T07:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4107475#M561354</link>
      <description>&lt;P&gt;HI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we are planning to integrate our ISE as well to to Azure AD, so we can use our endpoint to use Cert based authentication insted of password to ISE. Is there a step by step guide on the a) ISE side to configure CERT based authentication for end points. b) Azure side configuration c) end point side configuration and d)any configuration needs to be done on the NAD side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;karthik&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2020 15:53:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4107475#M561354</guid>
      <dc:creator>karthik.cs</dc:creator>
      <dc:date>2020-06-22T15:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4107514#M561356</link>
      <description>&lt;P&gt;Hi Karthik,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am assuming you want to authenticate your users on your company WIFI infrastructure. &amp;nbsp;I don't know of any step by step guide but for certificates you will have to look at SCEP&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/mem/intune/protect/certificates-scep-configure" target="_blank"&gt;https://docs.microsoft.com/en-us/mem/intune/protect/certificates-scep-configure&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You are looking at EAP-TLS for you wifi then using device authentication.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.labminutes.com/sec0274_ise_22_wireless_dot1x_eap_tls_peap_1" target="_blank"&gt;http://www.labminutes.com/sec0274_ise_22_wireless_dot1x_eap_tls_peap_1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firs step is getting you certificates on your devices. &amp;nbsp;You wan also use ISE for this with BYOD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe if you explain your use case a little more somebody can help you out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2020 16:48:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4107514#M561356</guid>
      <dc:creator>Frederik De Muyter</dc:creator>
      <dc:date>2020-06-22T16:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4107522#M561357</link>
      <description>&lt;P&gt;Hi Federek&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;currently we have, a)WIFI - PEAP with password based authentication we are now, from this we are looking for EAP-TLS with certificate based authentication so it will be password less. b) WIRED - .1x authentication we are using. we are looking to completely migrate certificate based authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;karthik&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2020 17:03:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4107522#M561357</guid>
      <dc:creator>karthik.cs</dc:creator>
      <dc:date>2020-06-22T17:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE intune integration question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4269936#M564702</link>
      <description>&lt;P&gt;Agree, That is a lot of certificate not publish on the documentation.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 07:26:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-intune-integration-question/m-p/4269936#M564702</guid>
      <dc:creator>Freemen</dc:creator>
      <dc:date>2021-01-11T07:26:11Z</dc:date>
    </item>
  </channel>
</rss>

