<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: windows AD user privilege level for integrating ISE with AD in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/windows-ad-user-privilege-level-for-integrating-ise-with-ad/m-p/4141654#M562521</link>
    <description>Here you go&lt;BR /&gt;&lt;BR /&gt;Active Directory Account Permissions Required for Performing Various&lt;BR /&gt;Operations&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Join OperationsLeave OperationsCisco ISE Machine Accounts&lt;BR /&gt;&lt;BR /&gt;For the account that is used to perform the join operation, the following&lt;BR /&gt;permissions are required:&lt;BR /&gt;&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Search Active Directory (to see if a Cisco ISE machine account already&lt;BR /&gt;   exists)&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Create Cisco ISE machine account to domain (if the machine account does&lt;BR /&gt;   not already exist)&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Set attributes on the new machine account (for example, Cisco ISE&lt;BR /&gt;   machine account password, SPN, dnsHostname)&lt;BR /&gt;&lt;BR /&gt;It is not mandatory to be a domain administrator to perform a join&lt;BR /&gt;operation.&lt;BR /&gt;&lt;BR /&gt;For the account that is used to perform the leave operation, the following&lt;BR /&gt;permissions are required:&lt;BR /&gt;&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Search Active Directory (to see if a Cisco ISE machine account already&lt;BR /&gt;   exists)&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Remove Cisco ISE machine account from domain&lt;BR /&gt;&lt;BR /&gt;If you perform a force leave (leave without the password), it will not&lt;BR /&gt;remove the machine account from the domain.&lt;BR /&gt;&lt;BR /&gt;For the newly created Cisco ISE machine account that is used to communicate&lt;BR /&gt;to the Active Directory connection, the following permissions are required:&lt;BR /&gt;&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Ability to change own password&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Read the user/machine objects corresponding to users/machines being&lt;BR /&gt;   authenticated&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Query some parts of the Active Directory to learn about required&lt;BR /&gt;   information (for example, trusted domains, alternative UPN suffixes and so&lt;BR /&gt;   on.)&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Ability to read tokenGroups attribute&lt;BR /&gt;&lt;BR /&gt;You can precreate the machine account in Active Directory, and if the SAM&lt;BR /&gt;name matches the Cisco ISE appliance hostname, it should be located during&lt;BR /&gt;the join operation and re-used.&lt;BR /&gt;&lt;BR /&gt;If multiple join operations are performed, multiple machine accounts are&lt;BR /&gt;maintained inside Cisco ISE, one for each join.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/ise_active_directory_integration/b_ISE_AD_integration_2x.html#reference_F19556CAD5C949B58DF89334E2C6255D" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/ise_active_directory_integration/b_ISE_AD_integration_2x.html#reference_F19556CAD5C949B58DF89334E2C6255D&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
    <pubDate>Wed, 26 Aug 2020 13:02:01 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2020-08-26T13:02:01Z</dc:date>
    <item>
      <title>windows AD user privilege level for integrating ISE with AD</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-ad-user-privilege-level-for-integrating-ise-with-ad/m-p/4141645#M562520</link>
      <description>&lt;P&gt;Dear Expert, i want to ask regarding integrating ISE with Active directory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;when we configure ise to join active directory, is it mandatory to use administrator level user from active directory ?&lt;/LI&gt;
&lt;LI&gt;if we can do it without administrator user, what kind of user privilege level we need to&amp;nbsp; use ?&lt;/LI&gt;
&lt;LI&gt;is there any official reference to&amp;nbsp; integrating ISE with AD without AD administrator user ?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank You.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 12:49:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-ad-user-privilege-level-for-integrating-ise-with-ad/m-p/4141645#M562520</guid>
      <dc:creator>mfirdaus</dc:creator>
      <dc:date>2020-08-26T12:49:07Z</dc:date>
    </item>
    <item>
      <title>Re: windows AD user privilege level for integrating ISE with AD</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-ad-user-privilege-level-for-integrating-ise-with-ad/m-p/4141654#M562521</link>
      <description>Here you go&lt;BR /&gt;&lt;BR /&gt;Active Directory Account Permissions Required for Performing Various&lt;BR /&gt;Operations&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Join OperationsLeave OperationsCisco ISE Machine Accounts&lt;BR /&gt;&lt;BR /&gt;For the account that is used to perform the join operation, the following&lt;BR /&gt;permissions are required:&lt;BR /&gt;&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Search Active Directory (to see if a Cisco ISE machine account already&lt;BR /&gt;   exists)&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Create Cisco ISE machine account to domain (if the machine account does&lt;BR /&gt;   not already exist)&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Set attributes on the new machine account (for example, Cisco ISE&lt;BR /&gt;   machine account password, SPN, dnsHostname)&lt;BR /&gt;&lt;BR /&gt;It is not mandatory to be a domain administrator to perform a join&lt;BR /&gt;operation.&lt;BR /&gt;&lt;BR /&gt;For the account that is used to perform the leave operation, the following&lt;BR /&gt;permissions are required:&lt;BR /&gt;&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Search Active Directory (to see if a Cisco ISE machine account already&lt;BR /&gt;   exists)&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Remove Cisco ISE machine account from domain&lt;BR /&gt;&lt;BR /&gt;If you perform a force leave (leave without the password), it will not&lt;BR /&gt;remove the machine account from the domain.&lt;BR /&gt;&lt;BR /&gt;For the newly created Cisco ISE machine account that is used to communicate&lt;BR /&gt;to the Active Directory connection, the following permissions are required:&lt;BR /&gt;&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Ability to change own password&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Read the user/machine objects corresponding to users/machines being&lt;BR /&gt;   authenticated&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Query some parts of the Active Directory to learn about required&lt;BR /&gt;   information (for example, trusted domains, alternative UPN suffixes and so&lt;BR /&gt;   on.)&lt;BR /&gt;   -&lt;BR /&gt;&lt;BR /&gt;   Ability to read tokenGroups attribute&lt;BR /&gt;&lt;BR /&gt;You can precreate the machine account in Active Directory, and if the SAM&lt;BR /&gt;name matches the Cisco ISE appliance hostname, it should be located during&lt;BR /&gt;the join operation and re-used.&lt;BR /&gt;&lt;BR /&gt;If multiple join operations are performed, multiple machine accounts are&lt;BR /&gt;maintained inside Cisco ISE, one for each join.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/ise_active_directory_integration/b_ISE_AD_integration_2x.html#reference_F19556CAD5C949B58DF89334E2C6255D" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/ise_active_directory_integration/b_ISE_AD_integration_2x.html#reference_F19556CAD5C949B58DF89334E2C6255D&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Wed, 26 Aug 2020 13:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-ad-user-privilege-level-for-integrating-ise-with-ad/m-p/4141654#M562521</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-08-26T13:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: windows AD user privilege level for integrating ISE with AD</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-ad-user-privilege-level-for-integrating-ise-with-ad/m-p/4141832#M562537</link>
      <description>&lt;P&gt;Mohammed gave a great detailed answer.&amp;nbsp; The simple answer is joined ISE to AD is identical to joining a Windows server/computer to AD.&amp;nbsp; The ID used to join ISE to AD needs to have join permissions.&amp;nbsp; Once ISE is joined to AD it has its own computer account to interact with AD.&amp;nbsp; The ID used to join ISE to AD is not saved unless you check the box to save it.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 16:52:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-ad-user-privilege-level-for-integrating-ise-with-ad/m-p/4141832#M562537</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2020-08-26T16:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: windows AD user privilege level for integrating ISE with AD</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-ad-user-privilege-level-for-integrating-ise-with-ad/m-p/4143689#M562595</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/876787"&gt;@mfirdaus&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to add what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;mentioned about the saved AD credentials - I have never found a Cisco document that explained why this would be needed/beneficial. It seems obvious at first that you would NOT want to save the admin's credentials in ISE (esp if password changes over time, or just because of plain paranoia).&lt;/P&gt;
&lt;P&gt;However, after watching the labminutes.com series he quite causally mentions that the Save credentials is REQUIRED if you are using the ISE AD Probe (Profiling).&amp;nbsp; I have never seen this confirmed anywhere. I have not tested to see if AD probing breaks if I joined AD without saving creds.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would be nice to have the official statement from Cisco about WHY this option even exists.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2020 23:41:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-ad-user-privilege-level-for-integrating-ise-with-ad/m-p/4143689#M562595</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-08-30T23:41:22Z</dc:date>
    </item>
  </channel>
</rss>

