<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE GUID in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930670#M584292</link>
    <description>&lt;P&gt;It is all about MDM (Azure Intune)&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Microsoft will deprecate the Intune Network Access Control (NAC) service API on December 31, 2023. This API supports MAC address and UDID-based queries. Once deprecated, all queries from ISE to Intune will need to utilize the Microsoft Compliance Retrieval API. Microsoft's Compliance Retrieval API supports Global Unique Identifier (GUID) as the unique identifier and, as of July 31, 2023, also supports MAC address-based queries.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The idea is to use SCEP and NDES server on devices that can not join the AD.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Enabling this in ISE:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GUID-ISE.JPG" style="width: 712px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198358iFEF5A56472F81565/image-size/large?v=v2&amp;amp;px=999" role="button" title="GUID-ISE.JPG" alt="GUID-ISE.JPG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The question is how a MDM device policy will look like?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Sep 2023 06:10:59 GMT</pubDate>
    <dc:creator>Moudar</dc:creator>
    <dc:date>2023-09-28T06:10:59Z</dc:date>
    <item>
      <title>ISE GUID</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930179#M584270</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;How can I use the attribute GUID in a condition, I could not find it to choose it!&lt;/P&gt;&lt;P&gt;The idea is to be able to authenticate devices with a certificate that can not be with AD. The certificate will contain the GUID but how to use GUID in ISE?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2023 09:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930179#M584270</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-09-27T09:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE GUID</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930205#M584273</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Review this document :&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-azure-ad-and-intune/ta-p/4763635" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-azure-ad-and-intune/ta-p/4763635&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Look for&lt;STRONG&gt; GUID&lt;/STRONG&gt; with find ; &lt;FONT color="#008000"&gt;&lt;EM&gt;some paragraphs may provide hints .&amp;nbsp;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2023 09:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930205#M584273</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-09-27T09:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE GUID</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930218#M584275</link>
      <description>&lt;P&gt;Still confused about how to use the GUID in a policy, does ISE get it when it does a&amp;nbsp;&lt;SPAN&gt;MDM Compliance check?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2023 10:14:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930218#M584275</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-09-27T10:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE GUID</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930458#M584281</link>
      <description>&lt;P&gt;The GUID is usually used for posture/MDM scenarios. The GUID (Globally Unique IDentifier) is only good for one device. I don't know why you would want to have GUID-specific policies - this does not scale.&lt;/P&gt;
&lt;P&gt;You then mention authenticating devices with certificates. Certificates have an entirely different set of attributes for use in authorization. You typically authorize by matching on certificate attributes, not an exact GUID.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 364px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198339i1290EB22B1E4E1BC/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id="hzImgLoader" class="imgError" style="width: auto; height: auto; line-height: 0px; overflow: hidden; padding: 0px; margin: 4px; position: absolute; z-index: 2147483647; border-radius: 4px; box-shadow: rgba(0, 0, 0, 0.4) 0px 1px 3px; background-color: #ffbfbf; border: 4px solid #ffbfbf;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thomas_0-1695832521489.gif" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198340iB038AA66F1A0FF26/image-size/medium?v=v2&amp;amp;px=400" role="button" title="thomas_0-1695832521489.gif" alt="thomas_0-1695832521489.gif" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 27 Sep 2023 16:35:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930458#M584281</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2023-09-27T16:35:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE GUID</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930670#M584292</link>
      <description>&lt;P&gt;It is all about MDM (Azure Intune)&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Microsoft will deprecate the Intune Network Access Control (NAC) service API on December 31, 2023. This API supports MAC address and UDID-based queries. Once deprecated, all queries from ISE to Intune will need to utilize the Microsoft Compliance Retrieval API. Microsoft's Compliance Retrieval API supports Global Unique Identifier (GUID) as the unique identifier and, as of July 31, 2023, also supports MAC address-based queries.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The idea is to use SCEP and NDES server on devices that can not join the AD.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Enabling this in ISE:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GUID-ISE.JPG" style="width: 712px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198358iFEF5A56472F81565/image-size/large?v=v2&amp;amp;px=999" role="button" title="GUID-ISE.JPG" alt="GUID-ISE.JPG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The question is how a MDM device policy will look like?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 06:10:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930670#M584292</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2023-09-28T06:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE GUID</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930996#M584301</link>
      <description>&lt;P&gt;Why not to set your policies to look at the certificate issuer name, expiry, and the issuer finger print? that way you will only allow the sessions matching those conditions without going down the GUID route. From ISE perspective you associate a new CAP without connecting it to the AD. That's what I usually do for InTune devices authentication.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 15:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guid/m-p/4930996#M584301</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-09-28T15:19:20Z</dc:date>
    </item>
  </channel>
</rss>

