<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Azure AD Groups in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010227#M586935</link>
    <description>&lt;P&gt;Hello manvik,&lt;/P&gt;&lt;P&gt;could you please share the Radius Live Log? There should be something that is incorrectly configured or misspelled.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jan 2024 12:10:48 GMT</pubDate>
    <dc:creator>klnnnnng</dc:creator>
    <dc:date>2024-01-31T12:10:48Z</dc:date>
    <item>
      <title>ISE Azure AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010144#M586919</link>
      <description>&lt;P&gt;We have integrated Cisco ISE with Azure AD (Entra ID) via ROPC. Ise version 3.2 patch 2.&lt;/P&gt;
&lt;P&gt;When an Azure AD user logs-in authentication is succesfull.&lt;BR /&gt;An Authorization policy is used to deny any user who does not&amp;nbsp; belong to particular AD group.&amp;nbsp;&lt;BR /&gt;Users are getting denied by this Auth policy even if they belongs to the group.&lt;BR /&gt;We changed deny access in Authorization policy to Permit access, still that policy is not being used. ISE picks the next policy.&lt;BR /&gt;We checked with all policy conditions - Equals, Contains, In, Not in etc still policy is not working.&lt;BR /&gt;&lt;BR /&gt;Attaching a screenshot of the authorization policy.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AuthPolicy.jpg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209254iE18360D471DDF744/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AuthPolicy.jpg" alt="AuthPolicy.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 10:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010144#M586919</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2024-01-31T10:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Azure AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010227#M586935</link>
      <description>&lt;P&gt;Hello manvik,&lt;/P&gt;&lt;P&gt;could you please share the Radius Live Log? There should be something that is incorrectly configured or misspelled.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 12:10:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010227#M586935</guid>
      <dc:creator>klnnnnng</dc:creator>
      <dc:date>2024-01-31T12:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Azure AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010260#M586937</link>
      <description>&lt;P&gt;Radius live log says Authorization denied due to the policy screenshot I have attached.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 12:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010260#M586937</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2024-01-31T12:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Azure AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010289#M586941</link>
      <description>&lt;P&gt;Do a test authentication from the external identity store configuration page and see what it returns with respect to user group membership.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 13:16:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010289#M586941</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-01-31T13:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Azure AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010293#M586942</link>
      <description>&lt;P&gt;test authentication works, even for real world scenario authentication to Azure AD works, but Authorization fails when checked against AD groups. Tac has been checking this for a week, no conclusion yet.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 13:19:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010293#M586942</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2024-01-31T13:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Azure AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010307#M586945</link>
      <description>&lt;P&gt;Did you verify the groups are being returned as expected when you tested authentication? Like shown below:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MarvinRhoads_0-1706708185075.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209278iE117B6EB98DAF73E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MarvinRhoads_0-1706708185075.png" alt="MarvinRhoads_0-1706708185075.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;It can also be an issue if for any reason the group SID changed on the Azure AD (Entra ID) side and ISE did not realize it. In such a case you can have the same group name on both sides but actually not be referring to the same object. In such cases you have to remove and re-add the group in ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 13:39:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010307#M586945</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-01-31T13:39:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Azure AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010626#M586963</link>
      <description>&lt;P&gt;The 'Test User Authentication' is only relevant to traditional AD. The Entra ID integration using RESTID/ROPC, so that tool is not relevant to this use case.&lt;/P&gt;
&lt;P&gt;I'm using ISE 3.2p4 in my lab and the RESTID/ROPC flow works as expected with both authorization policies matching on NOT_EQUALS and EQUALS conditions.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-02-01 at 9.19.44 am.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209315i694CF81533F843BA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-02-01 at 9.19.44 am.png" alt="Screenshot 2024-02-01 at 9.19.44 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In the detailed logs, I can see both the Monitor and Enabled rule being hit.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-02-01 at 9.21.24 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209316i2E75CC7FCF3FDC65/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2024-02-01 at 9.21.24 am.png" alt="Screenshot 2024-02-01 at 9.21.24 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If you haven't done so already, I would suggest updating to patch 4 and checking your setup against &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html" target="_blank" rel="noopener"&gt;this guide&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;If the 'Test Connection' succeeds and you are able to retrieve the groups and attributes in the REST connection, then it should work. Also make sure that the Username suffix is configured correctly and that you are matching on a Security group type that is not nested (I don't believe ISE supports nested or O365 EntraID groups).&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 22:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010626#M586963</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-01-31T22:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Azure AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010763#M586976</link>
      <description>&lt;P&gt;attached the ISE detailed authentication log. you can see the Authentication works fine and ISE is able to fetch the Group information too.&lt;BR /&gt;Traffic flow is Win laptop&amp;gt;Meraki WiFi&amp;gt;ISE&amp;gt;Azure AD&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;i think the screenshot you shared is for onprem AD. Anyways i tested the same for Azure AD (ROPC) too. Test connection is successful. As you suggested i deleted and readded groups in ISE, still no luck.&lt;BR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;when i tried with Patch 4, authentication was not working with error -"5441 Endpoint started new session while the packet of&amp;nbsp;previous session is being processed. Dropping new session".&lt;/P&gt;
&lt;P&gt;Anyways am awaiting TAC response on this. They have collected a ton of logs.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 06:17:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5010763#M586976</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2024-02-01T06:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Azure AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5161939#M591263</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/161770"&gt;@manvik&lt;/a&gt;&amp;nbsp;did you find the solution ? i m having similar issue with ISE 3.3 patch 3.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="anadil_0-1723833937969.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/226547iA547C2CF2643F5D1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="anadil_0-1723833937969.png" alt="anadil_0-1723833937969.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2024 18:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5161939#M591263</guid>
      <dc:creator>anadil</dc:creator>
      <dc:date>2024-08-16T18:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Azure AD Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5162583#M591293</link>
      <description>&lt;P&gt;I think we moved to onprem AD instead of Azure AD.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 11:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-azure-ad-groups/m-p/5162583#M591293</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2024-08-19T11:53:58Z</dc:date>
    </item>
  </channel>
</rss>

