<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE Policy Sets Azure Integration in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4487600#M570457</link>
    <description>&lt;P&gt;I haven't seen any large organisations that have moved to a pure AAD environment. At this time, I'm not really convinced that the industry&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/330320"&gt;@Milos_Jovanovic&lt;/a&gt;, I'm not experienced with Intune so I'm not sure what level/scale of differentiation you can get from compliance policies. I'm not sure it would provide the level that can be provided by AD group lookups for supporting group-based policies if the goal was to have a least-privilege 'zero trust' architecture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 17 Oct 2021 21:50:03 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2021-10-17T21:50:03Z</dc:date>
    <item>
      <title>Cisco ISE Policy Sets Azure Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4485887#M570389</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are currently running Cisco ISE 2.7 patch 4 but looking to upgrade to the latest supported release in the next few months.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We currently have a policy set that checks if a computer is in a specific group in Active Directory and if so puts it on a different VLAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our IT strategy is to try and move away from on-premise AD to Azure AD.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone know or tried to replicate the same policy set but checking for an Azure AD group rather than native AD? I've had a search on the documentation but i haven't found anything that answers my question.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 07:18:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4485887#M570389</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2021-10-14T07:18:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Sets Azure Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4486217#M570398</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1008639"&gt;@InfraISE2020&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;I did not test the following, but worth the shot:&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;STRONG&gt;1st&lt;/STRONG&gt;, at &lt;STRONG&gt;Administration &amp;gt; Identity Management &amp;gt; External Identity Sources &amp;gt; LDAP&lt;/STRONG&gt; ... create the &lt;STRONG&gt;AzureAD&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;STRONG&gt;2nd&lt;/STRONG&gt;, click the &lt;STRONG&gt;AzureAD&lt;/STRONG&gt; and at &lt;STRONG&gt;Groups&lt;/STRONG&gt;, &lt;U&gt;add the groups&lt;/U&gt;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;STRONG&gt;3rd&lt;/STRONG&gt;, at &lt;STRONG&gt;Policy &amp;gt; Policy Sets &amp;gt;&lt;/STRONG&gt; select your policy and at &lt;STRONG&gt;Authorization Policy&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Conditions&lt;/STRONG&gt;:&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Dictionary: &lt;STRONG&gt;AzureAD&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Attributes: &lt;STRONG&gt;ExternalGroups&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Equals: &lt;EM&gt;&amp;lt;added group&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 13:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4486217#M570398</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-10-14T13:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Sets Azure Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4486235#M570401</link>
      <description>Hi Marcelo,&lt;BR /&gt;Thanks for the reply.&lt;BR /&gt;Unfortunately we're still running an older version of ISE (v2.7) so I cannot test this at the moment, is this something you could test for me in your environment?&lt;BR /&gt;Even if just a simple test as if I a user is in a particular AAD group then they get access to vlan x?&lt;BR /&gt;Thanks in advance.&lt;BR /&gt;</description>
      <pubDate>Thu, 14 Oct 2021 13:36:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4486235#M570401</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2021-10-14T13:36:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Sets Azure Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4486529#M570415</link>
      <description>&lt;P&gt;There are multiple conversations in this Community related Azure AD, but the key point is that Azure AD is not the same as on-prem AD and does not directly support a direct RADIUS interface. See the following post for a similar discussion related to computer auth via AAD.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/machine-dot1x-authentication-to-work-with-both-on-prem-and-azure/td-p/4398922" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/machine-dot1x-authentication-to-work-with-both-on-prem-and-azure/td-p/4398922&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 22:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4486529#M570415</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-10-14T22:00:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Sets Azure Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4486839#M570432</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the response.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We use certificates for 802.1x authentication and use AD to lookup computers in a particular group and assign them a certain VLAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we was hoping to do was change the group lookup source from AD to AAD, do you think this is possible?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our longer term strategy is to go AAD only however we would need a certificate solution for that before we could go cloud only anyway.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On a separate note - do you know if AAD can be used to log into Cisco ISE rather than on-premise AD?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Oct 2021 09:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4486839#M570432</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2021-10-15T09:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Sets Azure Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4487156#M570441</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1008639"&gt;@InfraISE2020&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;For Admin Access using SAML, you'll have to be on v3.1. Check &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/release_notes/b_ise_31_RN.html#Cisco_Concept.dita_7308ca1a-d065-44f3-9c7e-a36e70c65737" target="_self"&gt;this&lt;/A&gt; in release notes, and also this &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217342-configure-ise-3-1-ise-gui-admin-login-fl.html" target="_self"&gt;configuration guide&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;I would also like to know what are people doing and what is the recommended way of achieving this when customers are moving to AAD only? Any idea &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;?&lt;/P&gt;&lt;P&gt;I have a customer too wanting to migrate from hybrid to pure AAD. For authentication, we might be even fine (using some certificate deployment from Azure, or hybrid for PKI), but we are using AD group lookup for authorization. Customer is very concerned about migrating to ISE-AAD integration using ROPC, as this can cause huge issues in case of Internet link issues (outage, latency, anything else), as it is a global deployment (e.g. Internet outage of primary DC must not affect WiFi across the globe). Also, we already had issues due to increased latency (global deployment spread across the globe) in communication to AD, and I can imagine it can only be worse when using Internet-based service (specially with frequent authentications like on dot1x).&lt;/P&gt;&lt;P&gt;One way we are thinking is keep using cert-based authentication (as everything is fast there, no dependency of Internet), and use Intune MDM functionality for compliance check (and compliance check is defined in the Intune Conditional Access policy, could be if a user is a member of a group). We like this approach, as we can cache results (concern about frequent reauthentication/authorizations is solved), and we can easily bypass it (of course, with a certain price, but we also solved concern about connectivity outage). What do you think &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;, would this work?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Sat, 16 Oct 2021 05:40:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4487156#M570441</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-10-16T05:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Sets Azure Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4487600#M570457</link>
      <description>&lt;P&gt;I haven't seen any large organisations that have moved to a pure AAD environment. At this time, I'm not really convinced that the industry&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/330320"&gt;@Milos_Jovanovic&lt;/a&gt;, I'm not experienced with Intune so I'm not sure what level/scale of differentiation you can get from compliance policies. I'm not sure it would provide the level that can be provided by AD group lookups for supporting group-based policies if the goal was to have a least-privilege 'zero trust' architecture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Oct 2021 21:50:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4487600#M570457</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-10-17T21:50:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Sets Azure Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4487724#M570465</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/330320"&gt;@Milos_Jovanovic&lt;/a&gt;&amp;nbsp;- We had our environment setup with Intune integration for compliance checks, the problem was that Microsoft had an issue where they marked all devices as non-compliant resulting in devices not connecting to the corporate network, in the end we turned off the compliance checks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;- Our strategy in the next 2 years is to go AAD only, I'm hopeful that ISE will be able to support this environment by then.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 07:07:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4487724#M570465</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2021-10-18T07:07:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Sets Azure Integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4487734#M570467</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;I realized it is really hard to find experts to talk about this subject, as whole thing is very new, and no one has field experience. Even in fields of theory, no one is sure how this should work, and what are caveats when moving to production. I would really like to see some&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1008639"&gt;@InfraISE2020&lt;/a&gt;This happens when you shift everything to someone else, where you don't have control. From ISE side, everything is fine, as it still relly on external info. Unfortunatelly, when received info is faulty, then you can't do much apart fix them where they originate, and that is not an easy task most often.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 07:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-sets-azure-integration/m-p/4487734#M570467</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-10-18T07:25:58Z</dc:date>
    </item>
  </channel>
</rss>

