<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE integration with MS Intune - Auto discovery URL in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4185021#M563895</link>
    <description>&lt;P class="text-danger"&gt;Unrecognized field "error" (Class com.cisco.cpm.mdm.auto.discovery.MdmAzureDi&lt;BR /&gt;rectoryServiceErrorResponse), not marked as ignorable at [Source: java.io.StringReader@4810b402; line: 2, column: 13] (through reference chain: com.cisco.cpm.mdm.auto.discovery.MdmAzureDi&lt;BR /&gt;rectoryServiceErrorResponse["error"])&lt;/P&gt;&lt;P class="text-danger"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="text-danger"&gt;I got this error despite i imported alot of CA cert related.. any advise?&lt;/P&gt;</description>
    <pubDate>Wed, 18 Nov 2020 02:51:39 GMT</pubDate>
    <dc:creator>Freemen</dc:creator>
    <dc:date>2020-11-18T02:51:39Z</dc:date>
    <item>
      <title>ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3879973#M471964</link>
      <description>&lt;P&gt;Hi ISE experts&lt;/P&gt;
&lt;P&gt;We have a customer integrating ISE with Intune. The MS supplied "Auto Discovery URL" was "graph.microsoft.com" but I checked around and the suggested URL was "graph.microsoft.net". So the customer tried that, and .net works instead of .com&lt;/P&gt;
&lt;P&gt;Supplied&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;A href="https://graph.microsoft.com/8c9b06d0-cb4a-4a03-b449-1f5a2548a910" target="_blank"&gt;https://graph.microsoft.com/xxxxxxxxxx&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Working&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="https://graph.microsoft.com/8c9b06d0-cb4a-4a03-b449-1f5a2548a910" target="_blank"&gt;https://graph.windows.net/xxxxxxxxxx&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Did anyone get it to work with ".com"&lt;/P&gt;
&lt;P&gt;I have no visibility of what Intune is showing, but the ".com" was the MS general recommendation, but clearly didn't work. Is this an error, or is there some pointers in Intune to ".net" also?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is happening more the once from what I can see. Is there an error in Intune, or is ISE not doing something right with .com?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2019 13:06:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3879973#M471964</guid>
      <dc:creator>mapretty</dc:creator>
      <dc:date>2019-06-26T13:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3880054#M471965</link>
      <description>ISE doesn’t do anything with that, can you provide more information on where you are doing this and what for? I would suggest asking Microsoft as well as its their service&lt;BR /&gt;</description>
      <pubDate>Wed, 26 Jun 2019 14:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3880054#M471965</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-06-26T14:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3880352#M471967</link>
      <description>&lt;P&gt;hey Jason&lt;/P&gt;
&lt;P&gt;So, from the Intune setup (&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01001.html#id_37138)&amp;nbsp;" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01001.html#id_37138)&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;step 8, configuring Auto Discovery URL, we get the URL from MS, but it was originally graph.windows.&lt;STRONG&gt;com&lt;/STRONG&gt;. The connection to Intune from ISE failed with this configuration, and the log:&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2019-06-17 12:47:01,567 ERROR [admin-http-pool1][] cpm.mdm.auto.discovery.MdmServerAutoDiscoveryManager -::::- Unable to discover MDM server for IntuneMDM.&lt;BR /&gt;com.cisco.cpm.mdm.auto.discovery.MdmServerAutoDiscoveryException: Unrecognized field "error" (Class com.cisco.cpm.mdm.auto.discovery.MdmAzureDirectoryServiceErrorResponse), not marked as ignorable&lt;BR /&gt;at [Source: &lt;/SPAN&gt;&lt;A href="mailto:java.io.StringReader@bcf340b" target="_blank"&gt;&lt;SPAN&gt;java.io.StringReader@abcdef&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;; line: 2, column: 13] (through reference chain: com.cisco.cpm.mdm.auto.discovery.MdmAzureDirectoryServiceErrorResponse["error"])&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;however, I noted in other cases with the same error, specifically the error:&amp;nbsp;&lt;U&gt;Unrecognized field "error"&lt;/U&gt; that changing to&amp;nbsp;&lt;STRONG&gt;.net&lt;/STRONG&gt; resolved the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I realise this is a URL controlled and published by MS, I just want to understand why ISE may not like the .com, and if there is somewhere else in Intune (as I don't have a login) it show's a .net URL?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers&lt;BR /&gt;Mark&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2019 21:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3880352#M471967</guid>
      <dc:creator>mapretty</dc:creator>
      <dc:date>2019-06-26T21:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3880859#M471969</link>
      <description>Allow me sometime to check on this . do you also have a TAC case opened for this ? 

Thanks,
Nidhi</description>
      <pubDate>Thu, 27 Jun 2019 15:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3880859#M471969</guid>
      <dc:creator>Nidhi</dc:creator>
      <dc:date>2019-06-27T15:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3881124#M472030</link>
      <description>&lt;P&gt;hi Nidhi&lt;/P&gt;
&lt;P&gt;Not at the moment, I'll open one if it helps&lt;/P&gt;
&lt;P&gt;cheers&lt;BR /&gt;Mark&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 22:02:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3881124#M472030</guid>
      <dc:creator>mapretty</dc:creator>
      <dc:date>2019-06-27T22:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3881657#M472033</link>
      <description>&lt;P&gt;I don't have an answer for you, but I can say I've had the windows.net autodiscovery URL configured for several years without issue on my deployment&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2019 18:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3881657#M472033</guid>
      <dc:creator>packetplumber9</dc:creator>
      <dc:date>2019-06-28T18:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3882066#M472036</link>
      <description>&lt;P&gt;I just checked the URL you provided and it looked like already corrected.&lt;/P&gt;
&lt;P&gt;Both&amp;nbsp;&lt;A href="https://blogs.technet.microsoft.com/rogoel/2018/03/20/microsoft-intune-as-an-mdm-server-for-cisco-ise/" target="_blank" rel="noopener"&gt;Microsoft Intune as MDM server for Cisco ISE – Rohit Goel’s Blog&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-documents/how-to-integrate-microsoft-intune-with-ise-2-1-presentation/ta-p/3619502" target="_blank" rel="noopener"&gt;How to Integrate Microsoft Intune with ... - Cisco Community&lt;/A&gt;&amp;nbsp;show it a string value for "MICROSOFT AZURE AD GRAPH API ENDPOINT" from the MS Azure management portal.&lt;/P&gt;
&lt;TABLE border="1"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;ISE&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Intune&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;EM&gt;Auto Discovery URL&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;Endpoints &amp;gt; Microsoft Azure AD Graph API Endpoint&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;EM&gt;Client ID&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;{Registered-App-Name} &amp;gt; Application ID&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;EM&gt;Token Issuing URL&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;Endpoints &amp;gt; OAuth 2.0 Token Endpoint&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jun 2019 03:00:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3882066#M472036</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-06-30T03:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3882302#M472038</link>
      <description>&lt;P&gt;The config guide also mentions&amp;nbsp; .net&amp;nbsp;&amp;nbsp;.&lt;/P&gt;
&lt;P&gt;you might want to verify the url in intune setup as well . Engineering says there is no such limitation from the code&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG class="ph b"&gt;Auto Discovery URL&lt;/STRONG&gt;&lt;SPAN&gt;—Enter the value of&amp;nbsp;&lt;/SPAN&gt;&lt;VAR class="keyword varname"&gt;Microsoft Azure AD Graph API Endpoint&lt;/VAR&gt;&lt;SPAN&gt;&amp;nbsp;from the Microsoft Azure management portal. This URL is the endpoint at which an application can access directory data in your Microsoft Azure AD directory using the Graph API. The URL is of the form:&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="ph codeph"&gt;https://&amp;lt;hostname&amp;gt;/&amp;lt;tenant id&amp;gt;, for example, &lt;A href="https://graph.ppe.windows.net/47f09275-5bc0-4807-8aae-f35cb0341329" target="_blank"&gt;https://graph.ppe.windows.net/47f09275-5bc0-4807-8aae-f35cb0341329&lt;/A&gt;&lt;/CODE&gt;&lt;SPAN&gt;. An expanded version of this URL is also in the property file, which is of the form:&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="ph codeph"&gt;https://&amp;lt;Graph_API_Endpoint&amp;gt;/&amp;lt;TenantId_Or_Domain&amp;gt;/servicePrincipalsByAppId/&amp;lt;Microsoft Intune AppId&amp;gt;/serviceEndpoints?api-version=1.6&amp;amp;client-request-id=&amp;lt;Guid.NewGuid()&amp;gt;&lt;/CODE&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 06:53:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3882302#M472038</guid>
      <dc:creator>Nidhi</dc:creator>
      <dc:date>2019-07-01T06:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3882928#M472042</link>
      <description>&lt;P&gt;hi Nidhi&lt;/P&gt;
&lt;P&gt;thanks again, the URL supplied by MS via the customer was: &lt;A href="https://graph.microsoft.com/" target="_blank"&gt;https://graph.microsoft.com/&lt;/A&gt;........&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our issue here is there are 3 URLs being thrown around.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. graph.microsoft.com - supplied by customer from Intune. &lt;STRONG&gt;Didn't work&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;2. graph.ppe.windows.net - Cisco documentation. &lt;STRONG&gt;Didn't work&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;3. graph.micrsoft.net - found in various TAC cases and not known where it really came from.....&lt;STRONG&gt;W&lt;/STRONG&gt;&lt;STRONG&gt;orks&lt;/STRONG&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If there's no limitation, why would the first two, well documented, URLs not work?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 01:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3882928#M472042</guid>
      <dc:creator>mapretty</dc:creator>
      <dc:date>2019-07-02T01:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3882937#M472043</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;If there's no limitation, why would the first two, well documented, URLs not work?&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Please see &lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/ise-integration-with-ms-intune-auto-discovery-url/m-p/3882066/highlight/true#M28134" target="_self"&gt;my earlier response&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;The URL is what set in the&amp;nbsp;&lt;SPAN&gt;MS Azure management portal and the customers need copy from the values I indicated there. The URL string given there is an example and will look different on each Azure account.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To be clear,&amp;nbsp;&lt;A href="https://blogs.technet.microsoft.com/rogoel/2018/03/20/microsoft-intune-as-an-mdm-server-for-cisco-ise/" target="_blank" rel="noopener"&gt;Microsoft Intune as MDM server for Cisco ISE – Rohit Goel’s Blog&lt;/A&gt;&amp;nbsp;says,&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;H2&gt;&lt;STRONG&gt;7.&amp;nbsp; In ISE, configure the Intune server in ISE&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;For more information about configuring and external MDM server, see &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_01001.html#id_15092" target="_blank" rel="noopener"&gt;Define Mobile Device Management Servers in ISE&lt;/A&gt;. The fields that are important for Intune are described below:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Auto Discovery URL&lt;/STRONG&gt; - Enter the value of &lt;STRONG&gt;&lt;FONT face="arial,helvetica,sans-serif" color="#0000FF"&gt;Microsoft Azure AD Graph API Endpoint&lt;/FONT&gt;&lt;/STRONG&gt; from the Microsoft Azure management portal. This the endpoint at which an application can access directory data in your Microsoft Azure AD directory using the Graph API. The URL is of the form: &lt;FONT color="#0000FF"&gt;https://&amp;lt;hostname&amp;gt;/&amp;lt;tenant id&amp;gt;&lt;/FONT&gt;, &lt;EM&gt;&lt;FONT color="#FF0000"&gt;for example&lt;/FONT&gt;&lt;/EM&gt;, &lt;U&gt;&lt;FONT color="#999999"&gt;&lt;A href="https://graph.ppe.windows.net/47f09275-5bc0-4807-8aae-f35cb0341329" target="_blank"&gt;https://graph.ppe.windows.net/47f09275-5bc0-4807-8aae-f35cb0341329&lt;/A&gt;&lt;/FONT&gt;&lt;/U&gt;. An expanded version of this URL is also in the property file, which is of the form:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;IMG class="alignnone size-full wp-image-985" src="https://msdnshared.blob.core.windows.net/media/2018/03/162.jpg" border="0" alt="" width="326" height="87" /&gt;&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Tue, 02 Jul 2019 02:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/3882937#M472043</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-02T02:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4185021#M563895</link>
      <description>&lt;P class="text-danger"&gt;Unrecognized field "error" (Class com.cisco.cpm.mdm.auto.discovery.MdmAzureDi&lt;BR /&gt;rectoryServiceErrorResponse), not marked as ignorable at [Source: java.io.StringReader@4810b402; line: 2, column: 13] (through reference chain: com.cisco.cpm.mdm.auto.discovery.MdmAzureDi&lt;BR /&gt;rectoryServiceErrorResponse["error"])&lt;/P&gt;&lt;P class="text-danger"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="text-danger"&gt;I got this error despite i imported alot of CA cert related.. any advise?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2020 02:51:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4185021#M563895</guid>
      <dc:creator>Freemen</dc:creator>
      <dc:date>2020-11-18T02:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4196293#M564263</link>
      <description>&lt;P&gt;Have you got any resolution to this ? Cisco documentation is vague at best.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 23:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4196293#M564263</guid>
      <dc:creator>najam.shah78</dc:creator>
      <dc:date>2020-12-09T23:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4436202#M568566</link>
      <description>&lt;P&gt;This is a cert issue. Add these into the Cisoc ISE trust certificate store -&amp;nbsp; 4 certs (2 root and 2 intermediate) need to be in there as well as the URL certificates for the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;DigiCert&lt;/LI&gt;&lt;LI&gt;DigiCert Sha2 Secure Server CA&lt;/LI&gt;&lt;LI&gt;DigiCert Global Root G2&lt;/LI&gt;&lt;LI&gt;Microsoft Azure TLS issuing CA 06&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://login.microsoftonline.com/" target="_blank"&gt;https://login.microsoftonline.com/&lt;/A&gt;&amp;lt;Tenat ID&amp;gt;/oauth2/v2.0/token&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://fef.msuc05.manage.microsoft.com/" target="_blank"&gt;https://fef.msuc05.manage.microsoft.com/&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://graph.windows.net/" target="_blank"&gt;https://graph.windows.net/&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 20 Jul 2021 17:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4436202#M568566</guid>
      <dc:creator>fontenot.garrett</dc:creator>
      <dc:date>2021-07-20T17:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4462389#M569622</link>
      <description>&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Try to add permissions also to Azure Active Directory Graph and not just to Microsoft Graph &amp;amp; Intune.&lt;/P&gt;&lt;P&gt;Azure Active Directory Graph:&lt;/P&gt;&lt;P&gt;=======================&lt;/P&gt;&lt;P&gt;Directory.Read.All- Delegated&lt;/P&gt;&lt;P&gt;Directory.Read.All- Application&lt;/P&gt;&lt;P&gt;User.Read.All- Delegated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Sep 2021 10:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4462389#M569622</guid>
      <dc:creator>nir-r</dc:creator>
      <dc:date>2021-09-09T10:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4463126#M569638</link>
      <description>&lt;P&gt;I've integrated Intune successfully recently, with the following settings:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Server Type: Mobile Device Manager&lt;/P&gt;&lt;P&gt;Authentication Type: OAuth – Client Credentials&lt;/P&gt;&lt;P&gt;Auto Discovery: Yes&lt;/P&gt;&lt;P&gt;Auto Discovery URL: &lt;A href="https://graph.windows.net/%7bTenantID%7d" target="_blank"&gt;https://graph.windows.net/&lt;STRONG&gt;{TenantID}&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Client ID: &lt;STRONG&gt;{ClientID}&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Token Issuing URL: &lt;A href="https://login.microsoftonline.com/%7bTenantID%7d/oauth2/v2.0/token" target="_blank"&gt;https://login.microsoftonline.com/&lt;STRONG&gt;{TenantID}&lt;/STRONG&gt;/oauth2/v2.0/token&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Token Audience: &lt;A href="https://api.manage.microsoft.com/" target="_blank"&gt;https://api.manage.microsoft.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Intune Permissions.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/130278i7E2CC3C5FAAF3A85/image-size/large?v=v2&amp;amp;px=999" role="button" title="Intune Permissions.jpg" alt="Intune Permissions.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 09:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4463126#M569638</guid>
      <dc:creator>Aileron88</dc:creator>
      <dc:date>2021-09-10T09:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4579516#M573707</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also been able to get the Intune integration working using the graph.windows.net URL; however, found a Cisco document&amp;nbsp;that this URL will no longer work after June 2022...:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Microsoft is deprecating Azure Active Directory (Azure AD) Graph and will not support Azure AD Graph-enabled integrations after June 30, 2022. You must migrate any integrations that use Azure AD Graph to Microsoft Graph. Cisco ISE typically uses the Azure AD Graph for integration with the endpoint management solution Microsoft Intune. Any integration between Cisco ISE and Microsoft Intune that still uses Azure AD Graph applications (&lt;FONT color="#FF0000"&gt;&lt;U&gt;&lt;A href="https://graph.windows.net/" target="_blank"&gt;https://graph.windows.net/&lt;/A&gt;&lt;/U&gt;&amp;nbsp;&amp;lt;Directory (tenant) ID&amp;gt;) will not work beyond June 30, 2022.&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html#task_gvy_vnj_tnb" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html#task_gvy_vnj_tnb&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Although my recent integration using this URL is 'working', ISE warns that the MDM is using an old API Version (v2) instead of the new Version 3 API.&amp;nbsp; This means I cannot use GUID as a device identifier, only MAC Address. You can see at the bottom where you would normally specify GUID, however it is greyed out / unavailable... I have deleted and re-added to no avail:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2022-03-28 at 4.18.01 pm.png" style="width: 816px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/147495iAFF7A31BBDA2194E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2022-03-28 at 4.18.01 pm.png" alt="Screen Shot 2022-03-28 at 4.18.01 pm.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;I built this as a Lab PoC back in September 2021 on ISE 3.1 (unpatched) with a demo Azure tenancy, and I was able to use GUID (also using the old graph/windows.net endpoint BTW)...&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Has anyone else run into this 'API v2' issue?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2022 07:20:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4579516#M573707</guid>
      <dc:creator>Tim Fairclough</dc:creator>
      <dc:date>2022-03-28T07:20:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4579519#M573708</link>
      <description>&lt;P&gt;&lt;FONT face="courier new,courier"&gt;For anyone interested, here are the debug logs (ise-psc.log):&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,235 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.authtoken.MdmAzureActiveDirectoryClient -::::- Access token has acquired &amp;nbsp;succesfully from Microsoft Azure.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,235 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.api.MdmServerInfoApi -::::- inside the method : callMdmServerInfoApiOnMdmServer()&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,235 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.apiimpl.MDMVerifyServer -::::- apiVersionSb : 3, mdmApiVersionSb : , tryWithV3 : false&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,235 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.apiimpl.MDMVerifyServer -::::- MDM Rest API Server Query String -&amp;gt; /ciscoise/mdminfo/?ise_api_version=3&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,235 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.apiimpl.MDMVerifyServer -::::- MDM Rest API Server Query PATH String -&amp;gt; /ciscoise/mdminfo/?ise_api_version=3&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,235 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.apiimpl.MDMVerifyServer -::::- 1. Connecting to the MDM server host&amp;nbsp;&lt;A href="http://fef.msuc01.manage.microsoft.com/" target="_blank"&gt;fef.msuc01.manage.microsoft.com&lt;/A&gt;&amp;nbsp;using&amp;nbsp;apiVersion 3&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,235 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.util.MdmRESTClient -::::- sendGETRequestDom: start &amp;nbsp;HTTP request - connectionsUsed: 2, connectionsAvailable: 198&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,235 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.util.MdmRESTClient -::::- sendGETRequestDomNonComp: start &amp;nbsp;HTTP request - connectionsUsed: 0, connectionsAvailable: 200&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,235 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.util.MdmRESTClient -::::- ===mdmFlowInfo===null,=====serverType=====MobileDeviceManager,===serverAuthType===OAuth - Client Credentials&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,235 INFO &amp;nbsp; [admin-http-pool15][] cisco.cpm.mdm.util.MdmRESTClient -::::- GET: MDM Server&amp;nbsp;URL:&amp;nbsp;&lt;A href="https://fef.msuc01.manage.microsoft.com/StatelessNACService/ciscoise/mdminfo/?ise_api_version=3" target="_blank"&gt;https://fef.msuc01.manage.microsoft.com/StatelessNACService/ciscoise/mdminfo/?&lt;FONT color="#FF0000"&gt;ise_api_version=3&lt;/FONT&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,235 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.util.MdmRESTClient -::::- Proxy Config in request &amp;nbsp;= [,null,-1,nullnullnull]&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,904 INFO &amp;nbsp; [admin-http-pool15][] cisco.cpm.mdm.util.MdmRESTClient -::::-&amp;nbsp;MDM Server Response Code: 200&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,906 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.util.MdmRESTClient -::::- sendGETRequestDom: end &amp;nbsp;HTTP request - connectionsUsed: 2, connectionsAvailable: 198&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,906 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.util.MdmRESTClient -::::- sendGETRequestDomNonComp: end &amp;nbsp;HTTP request - connectionsUsed: 0, connectionsAvailable: 200&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,906 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.api.MdmServerInfoApi -::::- returning from the method : callMdmServerInfoApiOnMdmServer() -&amp;gt; com.cisco.cpm.mdm.api.MdmServerInfoData Object {&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; apiPath: /StatelessNacService/ciscodeviceinfo/mdm/api&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;redirectUrl:&amp;nbsp;&lt;A href="https://portal.manage.microsoft.com/networkaccesscontrol/index" target="_blank"&gt;https://portal.manage.microsoft.com/networkaccesscontrol/index&lt;/A&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; queryMaxSize: 100&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV class="lia-align-left"&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;&lt;FONT color="#FF0000"&gt;apiVersion: 2&lt;/FONT&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; vendor: Microsoft&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; productName: Microsoft Intune&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; productVersion: 5.0&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; COMMA: ,&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; errorMsg: null&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; errorOccurred: false&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;}&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:22,906 DEBUG &amp;nbsp;[admin-http-pool15][] cisco.cpm.mdm.util.MdmServersCache -::::-&amp;nbsp;mdm Guid is null or empty&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;2022-03-28 17:51:25,377 INFO &amp;nbsp; [Timer-12][] cisco.mnt.common.utility.AlarmMessageDiskQueue -::::- Inside dequeue&lt;/FONT&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 28 Mar 2022 07:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4579519#M573708</guid>
      <dc:creator>Tim Fairclough</dc:creator>
      <dc:date>2022-03-28T07:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4579981#M573723</link>
      <description>&lt;P&gt;This is how you call an API according to MS Doco. I don't see any Cisco documentation which says to include version in there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;H2&gt;Call a REST API method&lt;/H2&gt;&lt;P&gt;To read from or write to a resource such as a user or an email message, you construct a request that looks like the following:&lt;/P&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;HTTP&lt;/SPAN&gt;&lt;SPAN&gt;Copy&lt;/SPAN&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;PRE&gt;&lt;SPAN&gt;{&lt;SPAN class=""&gt;HTTP method} https://graph.microsoft.com/{version}/{resource}?{query-parameters}&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;The components of a request include:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://docs.microsoft.com/en-us/graph/use-the-api#http-methods" target="_blank" rel="noopener"&gt;{HTTP method}&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- The HTTP method used on the request to Microsoft Graph.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://docs.microsoft.com/en-us/graph/use-the-api#version" target="_blank" rel="noopener"&gt;{version}&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- The version of the Microsoft Graph API your application is using.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://docs.microsoft.com/en-us/graph/use-the-api#resource" target="_blank" rel="noopener"&gt;{resource}&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- The resource in Microsoft Graph that you're referencing.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://docs.microsoft.com/en-us/graph/use-the-api#query-parameters" target="_blank" rel="noopener"&gt;{query-parameters}&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Optional OData query options or REST method parameters that customize the response.&lt;/LI&gt;&lt;/UL&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;H2&gt;Version&lt;/H2&gt;&lt;P&gt;Microsoft Graph currently supports two versions:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;v1.0&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;beta.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;v1.0&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;includes generally available APIs. Use the v1.0 version for all production apps.&lt;/LI&gt;&lt;LI&gt;beta&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;includes APIs that are currently in preview. Because we might introduce breaking changes to our beta APIs, we recommend that you use the beta version only to test apps that are in development; do not use beta APIs in your production apps.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2022 23:09:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4579981#M573723</guid>
      <dc:creator>najam.shah78</dc:creator>
      <dc:date>2022-03-28T23:09:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4649366#M576119</link>
      <description>&lt;DIV id="tinyMceEditor_d93a165cc2b5f7najamshah78_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Success_3.1.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/156747i5A7E863D412E62BC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Success_3.1.png" alt="Success_3.1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Finally, got it working&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2022 07:49:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4649366#M576119</guid>
      <dc:creator>najam.shah78</dc:creator>
      <dc:date>2022-07-13T07:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE integration with MS Intune - Auto discovery URL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4649368#M576120</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Success_3.1.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/156748i799D3E764B96FFD8/image-size/large?v=v2&amp;amp;px=999" role="button" title="Success_3.1.png" alt="Success_3.1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;ISE 3.1,&amp;nbsp; Patch 3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2022 07:52:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-ms-intune-auto-discovery-url/m-p/4649368#M576120</guid>
      <dc:creator>najam.shah78</dc:creator>
      <dc:date>2022-07-13T07:52:29Z</dc:date>
    </item>
  </channel>
</rss>

