<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 3.2 dot1x authentication with Intune issued certificates in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/5014641#M587152</link>
    <description>&lt;P&gt;In case you missed it, there is a &lt;A href="https://techcommunity.microsoft.com/t5/microsoft-intune-blog/microsoft-cloud-pki-launches-as-a-new-addition-to-the-microsoft/ba-p/3982830" target="_self"&gt;Microsoft Cloud PKI&lt;/A&gt; service on the way as part of the Microsoft Intune Suite. SCEPman probably still works out cheaper though.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Feb 2024 07:21:53 GMT</pubDate>
    <dc:creator>Steve Burkett</dc:creator>
    <dc:date>2024-02-08T07:21:53Z</dc:date>
    <item>
      <title>ISE 3.2 dot1x authentication with Intune issued certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/4964739#M585357</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Requirement is to enable dot1x wired authentication/authorization for Intune registered devices. There is only Azure AD and Intune. There is NO On premise component (no on premise/traditional AD, or ADCS)&lt;/P&gt;
&lt;P&gt;According to the following link, we need ADCS so Intune can issue certificates for the endpoints, so then ISE can use the certificate for authenticate and authorize the device/user.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-azure-ad-and-intune/ta-p/4763635/show-comments/true/page/2" target="_blank" rel="noopener"&gt;Cisco ISE with Microsoft Active Directory, Azure AD, and Intune - Page 2 - Cisco Community&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;After the endpoint is registered with Intune, I see by default that Intunes push/deploy a certificate for the endpoint signed by&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"Microsoft Intune MDM Device CA".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Can this certificate be used for authentication and authorization? instead of using SCEpman or ADCS? I dont see it mentioned on the guide, they are just showing to use ADCS and on the QA they used SCEPman, but why not use the default cert provided by Intune?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 23:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/4964739#M585357</guid>
      <dc:creator>Carlos T</dc:creator>
      <dc:date>2023-11-22T23:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 dot1x authentication with Intune issued certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/4964767#M585359</link>
      <description>&lt;P&gt;No, it is not possible to use the certificate issued by&amp;nbsp;&lt;SPAN&gt;"Microsoft Intune MDM Device CA". This certificate is stored in the Computer certificate store. Windows will not present a Computer certificate for a dot1x User authentication session.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Even if it were a User certificate, there is no User Principal name nor the Intune GUID inserted in the CN or SAN field.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 02:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/4964767#M585359</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-11-23T02:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 dot1x authentication with Intune issued certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/4964771#M585360</link>
      <description>&lt;P&gt;Thanks Greg, so the only option is to use the ADCS for the user/device certificates as mentioned on your document.&lt;/P&gt;
&lt;P&gt;ADCS is a traditional solution. if we want a cloud only solution, SCEPman could be used. Is Cisco ok using Scepman instead of ADCS?&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 02:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/4964771#M585360</guid>
      <dc:creator>Carlos T</dc:creator>
      <dc:date>2023-11-23T02:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 dot1x authentication with Intune issued certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/4964793#M585362</link>
      <description>&lt;P&gt;ISE is not involved in any part of the certificate enrolment. As long as the certificate includes the necessary attributes for relevant use case (UPN for User AuthZ against Entra ID; URI with GUID for Intune compliance check), there should be no issues.&lt;/P&gt;
&lt;P&gt;ISE will need the CA Root chain (including any Intermediate/Issuing CAs) for SCEPman in the Trusted Certificates store to trust the certificate issued by the client. The client will need to trust the Root CA that signed the ISE EAP certificate in the Wired/Wifi Profile to trust the cert presented by ISE.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 03:48:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/4964793#M585362</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-11-23T03:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 dot1x authentication with Intune issued certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/5014641#M587152</link>
      <description>&lt;P&gt;In case you missed it, there is a &lt;A href="https://techcommunity.microsoft.com/t5/microsoft-intune-blog/microsoft-cloud-pki-launches-as-a-new-addition-to-the-microsoft/ba-p/3982830" target="_self"&gt;Microsoft Cloud PKI&lt;/A&gt; service on the way as part of the Microsoft Intune Suite. SCEPman probably still works out cheaper though.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 07:21:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/5014641#M587152</guid>
      <dc:creator>Steve Burkett</dc:creator>
      <dc:date>2024-02-08T07:21:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 dot1x authentication with Intune issued certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/5073182#M588846</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Any idea if ISE 3.3 support Microsoft Cloud PKI that can be used for EAP TLS with Microsoft Entra ID for user certificate based authentication ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 17:00:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/m-p/5073182#M588846</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-04-18T17:00:26Z</dc:date>
    </item>
  </channel>
</rss>

