<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 3.2 and AzureAD - groups retrieve in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4740708#M578864</link>
    <description>&lt;P&gt;These are the required permissions that I have used successfully with AzureAD for both scenarios :&lt;BR /&gt;- EAP-TTLS+PAP username+password authentication+authorization using in ISE 3.0+&lt;BR /&gt;- EAP-TLS (or TEAP) user certificate authentication with AzureAD group authorization in ISE 3.2+&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE 3.2 - Azure AD Permissions for EAP-TLS.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171231iCB6D221ADE748A85/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE 3.2 - Azure AD Permissions for EAP-TLS.png" alt="ISE 3.2 - Azure AD Permissions for EAP-TLS.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditor_f83ff8098bb259thomas_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Dec 2022 17:07:21 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2022-12-16T17:07:21Z</dc:date>
    <item>
      <title>ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4740561#M578862</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to connect ISE 3.2 to AzureAD, the connection itself worked fine (following the guide:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html&lt;/A&gt;) but now I'm not able to read any AD groups. After clicking on "Retrieve groups" it tries for few minutes and then it says "No Data Found".&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other question - is it possible to read extended attributes from the AzureAD accounts?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Dec 2022 13:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4740561#M578862</guid>
      <dc:creator>pio.gra</dc:creator>
      <dc:date>2022-12-16T13:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4740708#M578864</link>
      <description>&lt;P&gt;These are the required permissions that I have used successfully with AzureAD for both scenarios :&lt;BR /&gt;- EAP-TTLS+PAP username+password authentication+authorization using in ISE 3.0+&lt;BR /&gt;- EAP-TLS (or TEAP) user certificate authentication with AzureAD group authorization in ISE 3.2+&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE 3.2 - Azure AD Permissions for EAP-TLS.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171231iCB6D221ADE748A85/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE 3.2 - Azure AD Permissions for EAP-TLS.png" alt="ISE 3.2 - Azure AD Permissions for EAP-TLS.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditor_f83ff8098bb259thomas_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Dec 2022 17:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4740708#M578864</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-12-16T17:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4740841#M578867</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1254625"&gt;@pio.gra&lt;/a&gt;&amp;nbsp; try to check out the ropc .log, this can provide you a view of what could be missing/failing within your configuration , this can be seen in the PAN node via CLI with the command&amp;nbsp; "show logging application ropc/ropc.log (tail) ", what I would recommend here is to tail the process in real time while attempting to retrieve the groups and also taking a pcap to ISE so you can get further insight on what's happening .&lt;/P&gt;</description>
      <pubDate>Fri, 16 Dec 2022 19:23:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4740841#M578867</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2022-12-16T19:23:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4741556#M578886</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;I have it configured exactly the same way but no success unfortunately.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/632778"&gt;@Rodrigo Diaz&lt;/a&gt;&amp;nbsp;I'm not able to read the logs for some reason, I have tried with the command you gave and get no output. Via GUI I can see the following:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="piogra_0-1671443138619.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171345iCAD833AA5FD272D7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="piogra_0-1671443138619.png" alt="piogra_0-1671443138619.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;but I'm not able to download any of the files. Or maybe I'm doing something wrong?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 09:46:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4741556#M578886</guid>
      <dc:creator>pio.gra</dc:creator>
      <dc:date>2022-12-19T09:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4741807#M578893</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1254625"&gt;@pio.gra&lt;/a&gt;&amp;nbsp; please share what you are getting in the CLI , you can attempt the command "show logging application | i ropc ", for further details of what you might expect to see refer to the section "working with logs" from the following link&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html&lt;/A&gt;&amp;nbsp;in case you don't get outputs like those or even errors , it may indicate some configurations within your setup are missing .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if that helped&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 14:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4741807#M578893</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2022-12-19T14:27:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4741861#M578896</link>
      <description>&lt;P&gt;I have experienced the same bug in ISE 3.2 trying to download the log file.&lt;/P&gt;
&lt;P&gt;Verify that you have entered the correct Username Suffix for your Azure AD domain, beginning with the required '@' symbol. For example, my Azure AD Username Suffix in ISE is &lt;FONT face="courier new,courier"&gt;@trust0.onmicrosoft.com&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;You should be able to see this on the Overview page in Azure AD:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 727px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171370i87ADEFCCD5B81A6F/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 15:56:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4741861#M578896</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-12-19T15:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742288#M578903</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/632778"&gt;@Rodrigo Diaz&lt;/a&gt;&amp;nbsp;- it's a very good catch, I was trying with the wrong path:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;admin#show logging application | include ropc&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;48077 Nov 17 2022 16:18:22 ropc/rest-id-store.log&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;438141 Nov 14 2022 13:10:56 ropc/rest-id-store.log.2022-11-14-1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;so when I tried with: &lt;EM&gt;admin#show logging application ropc/rest-id-store.log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;it showed the output and the issue I see at the first sight is:&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;The user account {EmailHidden} does not exist in the {hidden} directory. To sign into this application, the account must be added to the directory.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Is it an AD thing or should I configure something more in ISE?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 10:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742288#M578903</guid>
      <dc:creator>pio.gra</dc:creator>
      <dc:date>2022-12-20T10:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742486#M578908</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;- I have checked that and it is configured properly, the issue is that ISE is not able to communicate with the AD, see the above post.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 10:19:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742486#M578908</guid>
      <dc:creator>pio.gra</dc:creator>
      <dc:date>2022-12-20T10:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742748#M578920</link>
      <description>&lt;P&gt;Do you know approximately how many Azure AD groups your domain has? I believe the REST ID Store was only tested with &amp;lt;=5000 groups in Azure AD so if you have significantly more, it may be timing out without downloading all of the groups&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 17:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742748#M578920</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-12-20T17:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742830#M578924</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1254625"&gt;@pio.gra&lt;/a&gt;&amp;nbsp; I have checked your log , I would double check up the tenant and the AD that you are using in the integration&amp;nbsp; , it also likely that you might be hitting the following bug&amp;nbsp; CSCwd78306 as per the version in which you are which is 3.2 , in that scenario if it's possible for you test that out in another version of ISE while this bug is solved.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 18:52:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742830#M578924</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2022-12-20T18:52:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742868#M578926</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;- not sure about the groups, but I believe it will be less than 5000, will check it&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/632778"&gt;@Rodrigo Diaz&lt;/a&gt;&amp;nbsp;- that bug looks interesting and it's most likely it &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; Is there any other way to integrate ISE and AzureAD? We have more and more devices migrated and it's now crucial for me to include those in all the policies... I'm currently using ISE 2.6 in the production, wanted to implement 3.2 because of the native cloud support (I need to have some nodes in the Azure cloud), and the AzureAD integration of course.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 20:20:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742868#M578926</guid>
      <dc:creator>pio.gra</dc:creator>
      <dc:date>2022-12-20T20:20:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742936#M578928</link>
      <description>&lt;P&gt;Unfortunately this is the only way to achieve the integration with the AzureAD.&lt;/P&gt;
&lt;P&gt;It would appear that the bug is going to be solved in patch 1 for this version that has a tentative date to be released in next Month , in any case what I would advise you is to either wait for the patch 1 to be available and test out the integration again or if it's urgent to get this deployment working in 3.2 to open a TAC case to get a hotfix patch.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 23:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4742936#M578928</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2022-12-20T23:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4743124#M578934</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/632778"&gt;@Rodrigo Diaz&lt;/a&gt;&amp;nbsp;- thanks for all the information, do you know if 3.1 is also affected? Maybe I could install the older version just to be able to work on testing the policies etc... before the bug is fixed.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 09:13:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4743124#M578934</guid>
      <dc:creator>pio.gra</dc:creator>
      <dc:date>2022-12-21T09:13:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4743284#M578938</link>
      <description>&lt;P&gt;Yes you can try out another 3.X version to review if you are getting the same result , as per the bug conditions it has not been documented other versions affected.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 14:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4743284#M578938</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2022-12-21T14:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 and AzureAD - groups retrieve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4787966#M580256</link>
      <description>&lt;P&gt;If anyone has the same issue - it is now fixed in Patch 1.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Mar 2023 13:29:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-and-azuread-groups-retrieve/m-p/4787966#M580256</guid>
      <dc:creator>pio.gra</dc:creator>
      <dc:date>2023-03-06T13:29:52Z</dc:date>
    </item>
  </channel>
</rss>

