<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Join with Azure AD Directory Services in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4783670#M580114</link>
    <description>&lt;P&gt;From what I can tell based on the documentation and installing&amp;nbsp; Azure AD DS in my lab, AADDS is simply a SaaS offering by Azure for traditional Active Directory. Rather than have an IaaS deployment in the cloud where you manage the OS and deploy your own traditional Active Directory services, with AADDS the OS is managed by MS and you just have the limited control over the traditional AD services.&lt;/P&gt;
&lt;P&gt;I was successfully able to perform the following actions in ISE using my AADDS managed domain. The functionality worked the same as with a normal traditional AD deployment on-prem or in the cloud (IaaS).&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Create an AD join point and join my ISE node to the domain&lt;/LI&gt;
&lt;LI&gt;Add cloud-only AD groups defined in Azure AD&lt;/LI&gt;
&lt;LI&gt;Perform a Test User lookup for a cloud-only user account in Azure AD&lt;/LI&gt;
&lt;LI&gt;Configure Admin Access for the ISE GUI to use my AD join point, map an Azure AD group to the Super User RBAC role, and login to the ISE GUI using a cloud-only AD user account (member of the group).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Feb 2023 03:09:47 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2023-02-28T03:09:47Z</dc:date>
    <item>
      <title>ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782282#M580077</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am currently looking at options to integrate ISE with Azure AD. From my basic understanding, Azure AD Domain Services supports traditional join operations to support legacy services. If we were to migrate to Azure AD, can ISE join Azure AD Directory services in the same way that it would with an on-prem AD server? Is this supported?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 20:30:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782282#M580077</guid>
      <dc:creator>packet2020</dc:creator>
      <dc:date>2023-02-24T20:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782293#M580079</link>
      <description>&lt;P&gt;Hello packet2020, it is possible, here you have an excellent document that guides you on how to do it, it also contains examples of the policies on ISE that you could use for authorization, let me know if this helped.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 20:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782293#M580079</guid>
      <dc:creator>dalbanil</dc:creator>
      <dc:date>2023-02-24T20:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782298#M580080</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1105704"&gt;@dalbanil&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply, however this is not quite what I am asking. The above document is to integrate ISE with Azure AD using REST with ROPC. What I want to know is if can we join ISE to Azure AD Domain Services in the same way that we do today with traditional on-prem AD (configured under External Identity Sources -&amp;gt; Active Directory)? I'm aware that Azure AD DS has some limitations, however do these impact ISE join?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 21:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782298#M580080</guid>
      <dc:creator>packet2020</dc:creator>
      <dc:date>2023-02-24T21:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782306#M580081</link>
      <description>&lt;P&gt;&lt;A href="https://youtu.be/iAKyIHFqbgE" target="_blank"&gt;https://youtu.be/iAKyIHFqbgE&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 21:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782306#M580081</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-02-24T21:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782307#M580082</link>
      <description>&lt;P&gt;Great question.&amp;nbsp; Is this the same thing as a "hybrid" Azure AD environment or a totally separate thing?&amp;nbsp; Is there still an on-premise AD footprint?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 21:25:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782307#M580082</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-02-24T21:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782315#M580083</link>
      <description>&lt;P&gt;This would be in the absence of on-prem AD, so cloud only and no hybrid. So we would have Azure AD with an&amp;nbsp;&lt;SPAN&gt;Azure AD Domain Services managed domain.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Windows servers can join the Azure AD DS managed domain so I would be interested to know if ISE can as well.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 21:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4782315#M580083</guid>
      <dc:creator>packet2020</dc:creator>
      <dc:date>2023-02-24T21:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4783670#M580114</link>
      <description>&lt;P&gt;From what I can tell based on the documentation and installing&amp;nbsp; Azure AD DS in my lab, AADDS is simply a SaaS offering by Azure for traditional Active Directory. Rather than have an IaaS deployment in the cloud where you manage the OS and deploy your own traditional Active Directory services, with AADDS the OS is managed by MS and you just have the limited control over the traditional AD services.&lt;/P&gt;
&lt;P&gt;I was successfully able to perform the following actions in ISE using my AADDS managed domain. The functionality worked the same as with a normal traditional AD deployment on-prem or in the cloud (IaaS).&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Create an AD join point and join my ISE node to the domain&lt;/LI&gt;
&lt;LI&gt;Add cloud-only AD groups defined in Azure AD&lt;/LI&gt;
&lt;LI&gt;Perform a Test User lookup for a cloud-only user account in Azure AD&lt;/LI&gt;
&lt;LI&gt;Configure Admin Access for the ISE GUI to use my AD join point, map an Azure AD group to the Super User RBAC role, and login to the ISE GUI using a cloud-only AD user account (member of the group).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 03:09:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/4783670#M580114</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-02-28T03:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5258771#M594872</link>
      <description>&lt;P&gt;Is this still valid? I am trying to add entra id as a join point in Cisco ISE and I get the following error. I am trying to add this under ext identity - &amp;gt; active directory. There is no domain controller for entra id and I am getting this error that it can't find domain name. Do I need to add entra in a different way?&lt;/P&gt;&lt;P&gt;Support Details...&lt;BR /&gt;Error Name: LW_ERROR_FAILED_FIND_DC&lt;BR /&gt;Error Code: 40049&lt;/P&gt;&lt;P&gt;Detailed Log:&lt;/P&gt;&lt;P&gt;Error Description :&lt;BR /&gt;Failed to find domain controller in domain xyz.COM : domain does not exists in DNS&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 16:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5258771#M594872</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2025-02-10T16:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5258881#M594880</link>
      <description>&lt;P&gt;Are you referring to &lt;A href="https://learn.microsoft.com/en-us/entra/identity/domain-services/overview" target="_blank" rel="noopener"&gt;Entra Domain Services&lt;/A&gt; (which is what the original discussion was about) or Entra ID?&lt;/P&gt;
&lt;P&gt;If you're referring to Entra ID, there is no 'domain' to join. Entra ID is &lt;STRONG&gt;not&lt;/STRONG&gt; Active Directory. For supported use cases with ISE related to Entra ID, see&amp;nbsp;&lt;A id="link_7" class="page-link lia-link-navigation lia-custom-event" href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635" target="_blank"&gt;Cisco ISE with Microsoft Active Directory, Entra ID, and Intune&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 21:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5258881#M594880</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-02-10T21:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5258952#M594881</link>
      <description>I am referring to entra id join. I am using ISE 3.3 in Azure for NAC. Do I need to join them to entra id or I can just do it without? I am using 802.1x EAP-TLS machine cert for auth using cert connector. So do I need to join entra id in ISE or I can do it without. How will I integrate Entra ID with Cisco ISE. If I don't integrate how with auth happen?&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Feb 2025 02:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5258952#M594881</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2025-02-11T02:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5259448#M594913</link>
      <description>&lt;P&gt;All of the currently supported options for ISE Authentication/Authorization using Entra ID are described in the document I shared in the prior thread.&lt;/P&gt;
&lt;P&gt;&lt;A id="link_7" class="page-link lia-link-navigation lia-custom-event" href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635" target="_blank" rel="noopener"&gt;Cisco ISE with Microsoft Active Directory, Entra ID, and Intune&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 00:19:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5259448#M594913</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-02-12T00:19:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5267022#M595309</link>
      <description>&lt;P&gt;Hi Greg,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How are you able to do point #2. I am using On-prem AD joined to Entra ID. My ISE is joined to the on-prem AD, and I can retrieve cloud-only AD group defined in Azure AD to my on-prem AD join point. Right now, I am able to join the Integrate the Entra ID through the REST ROPC, but I am not able to retrieve groups. I suspect because I logged into the ISE GUI through a local admin and its using that account to try to retrieve the group which is not in Azure.&amp;nbsp; I believe your solution will solve it but I'm unclear how to retrieve the cloud-only AD group so I can use the user in that group to login into ISE. Please kindly explain how I can achieve this....stuck with this issue for days. thanks&lt;/P&gt;</description>
      <pubDate>Tue, 04 Mar 2025 04:48:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5267022#M595309</guid>
      <dc:creator>anu-fatokun</dc:creator>
      <dc:date>2025-03-04T04:48:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5267406#M595334</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I'm not sure I understand your question. The Entra ID Connector only syncs traditional Active Directory groups into Entra ID. There is no sync of Users/Groups created directly in Entra ID back into Active Directory.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Mar 2025 23:34:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5267406#M595334</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-03-04T23:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5267639#M595336</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have set up an ISE 3.4 and successfully integrated Entra ID via ROPC REST. However, when testing Wi-Fi authentication with EAP-TTLS, it fails.&lt;/P&gt;&lt;P&gt;In the RADIUS logs, I can see that the connection to my REST ID is successful, but then the authentication fails with the following resolution message:&lt;/P&gt;&lt;P&gt;"Check whether the proper server certificate is installed and configured for EAP in the Local Certificates page (Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Local Certificates). Also ensure that the certificate authority that signed this server certificate is properly installed in the client's supplicant. Check the previous steps in the log for this EAP-TTLS conversation for a message indicating why the authentication failed. Check the OpenSSLErrorMessage and OpenSSLErrorStack for more information."&lt;/P&gt;&lt;P&gt;I have checked my certificates, and they are all active. However, I can't find where the local certificates are stored in this version 3.4.&lt;/P&gt;&lt;P&gt;Notably, when I set up the same configuration on ISE 3.0 (patch 8), I had no certificate-related issues.&lt;/P&gt;&lt;P&gt;Does anyone have an idea of what might be causing this issue?&lt;/P&gt;&lt;P&gt;Thanks in advance for your help!&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 09:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5267639#M595336</guid>
      <dc:creator>TCPIP2024</dc:creator>
      <dc:date>2025-03-05T09:53:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5268001#M595345</link>
      <description>&lt;P&gt;This is off the topic of the original post. In the future, please start a new conversation for new questions and keep one topic per post.&lt;/P&gt;
&lt;P&gt;The path in the error is a cosmetic issue. This should refer to the &lt;EM&gt;&lt;STRONG&gt;Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Certificate Management &amp;gt; System Certificates&lt;/STRONG&gt;&lt;/EM&gt; page.&lt;/P&gt;
&lt;P&gt;This error typically indicates that the supplicant does not trust the EAP certificate presented by the server (ISE). Confirm that the Windows endpoint has the Root and Intermediate certificates that signed the ISE EAP cert in the relevant trust stores and that the supplicant is configured to trust them.&lt;/P&gt;
&lt;P&gt;If you are still having issues, please start a new conversation and post screenshots of your certificate store, supplicant configuration, and ISE EAP cert chain or open a TAC case to investigate further.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 22:21:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5268001#M595345</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-03-05T22:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5372522#M599863</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;I'm trying to integrate ISE with ENTRA ID.&lt;BR /&gt;If I use AADDS(Entra Domain Service), will the client be able to use MSCHAPv2?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 07:12:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5372522#M599863</guid>
      <dc:creator>JustTakeTheFirstStep</dc:creator>
      <dc:date>2026-02-25T07:12:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5372588#M599868</link>
      <description>No. Also don’t use MS-Chapv2 in 2026&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Feb 2026 11:06:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5372588#M599868</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2026-02-25T11:06:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Join with Azure AD Directory Services</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5372755#M599877</link>
      <description>&lt;P&gt;Entra DS is essentially AD in the cloud, so theoretically ISE *should* be able to integrate with it the same as AD. If it does, then you *should* be able to use PEAP(MSCHAPv2) the same way you can with AD.&lt;/P&gt;
&lt;P&gt;I have not had the ability to test integration with Entra DS due to subscription/licensing restrictions, so this is all just theoretical.&lt;/P&gt;
&lt;P&gt;However, as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;stated previously, MSCHAPv2 should be avoided. It uses broken encryption and MS is actively working to deprecate it in favour of more secure methods like EAP-TLS.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 21:32:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-join-with-azure-ad-directory-services/m-p/5372755#M599877</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2026-02-25T21:32:25Z</dc:date>
    </item>
  </channel>
</rss>

