<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE integration with Microsoft Local Administrator password in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/5073063#M588842</link>
    <description>&lt;P&gt;any easy solution for this in 2024? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 18 Apr 2024 14:07:35 GMT</pubDate>
    <dc:creator>peter.matuska1</dc:creator>
    <dc:date>2024-04-18T14:07:35Z</dc:date>
    <item>
      <title>Cisco ISE integration with Microsoft Local Administrator password solution (Laps)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/3884205#M471757</link>
      <description>&lt;P&gt;Does anyone had experience of Microsoft Local Administrator Password Solution (LAPS) with Cisco ISE. One of my banking customer is managing user local admin account using Laps for the helpdesk operation. Customer system team are using local admin account where passwords are randomly generated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any integrations or alternate ?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2019 17:37:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/3884205#M471757</guid>
      <dc:creator>mnabeel@ciso.com</dc:creator>
      <dc:date>2019-07-03T17:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integration with Microsoft Local Administrator password solution (Laps)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/3884277#M471762</link>
      <description>&lt;P&gt;I am unable to think of any ISE feature needing integrations with LAPS. Please let us know if your customer using anything specifics and encountering interaction issues between ISE and LAPS.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2019 19:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/3884277#M471762</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-03T19:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integration with Microsoft Local Administrator password solution (Laps)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4039485#M558537</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, there is a reason to integrate LAPS with ISE.&amp;nbsp; A LAPS user (local admin) needs a way to authenticate through 802.1x to pass through and gain wireless connection to 802.1x based wireless connections.&amp;nbsp; Today, when a local user logs in to a domain computer, and with the dual auth (computer and user) profile enabled in ISE, that computer loses connection to the 802.1x based wireless network, because there is not a way to introduce that LAPS user into ISE with the randomized password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 17:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4039485#M558537</guid>
      <dc:creator>Yahya Lababidi</dc:creator>
      <dc:date>2020-03-03T17:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integration with Microsoft Local Administrator password solution (Laps)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4039587#M558539</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; On the Windows side, the random generated password is stored in the AD schema as an attribute to the computer object, so the ISE implementation for LAPS could be challenging.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; What you can do is the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Use a GPO so that when LAPS is being used, 802.1x is using computer only authentication, and have an appropriate ISE authorization profile with needed but restricted network access (regular users should never match this, as the GPO forces computer and user authentication in the 802.1x native supplicant profile and they can't modify it)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Use a GPO so that when LAPS is being used, 802.1x is using both computer and user based authentication, use EAP-TLS and have a certificate in the LAPS user's profile that has something different than regular user certificates, and use it as condition in your ISE authorization profile&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 19:32:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4039587#M558539</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-03T19:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integration with Microsoft Local Administrator password solution (Laps)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4039802#M558556</link>
      <description>&lt;P&gt;Thanks for the quick response.&lt;/P&gt;&lt;P&gt;Do you have some example links that explain the GPO part of both cases.&amp;nbsp; I did a bit of search and the results were general and didn't pertain to this specific case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 02:01:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4039802#M558556</guid>
      <dc:creator>Yahya Lababidi</dc:creator>
      <dc:date>2020-03-04T02:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integration with Microsoft Local Administrator password solution (Laps)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4040008#M558564</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Here's &amp;nbsp;astep-by-step example for the GPO part.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;A href="https://www.raydbg.com/2017/How-to-Configure-Wired-Authentication-Settings-via-GPO/" target="_blank"&gt;https://www.raydbg.com/2017/How-to-Configure-Wired-Authentication-Settings-via-GPO/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 09:33:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4040008#M558564</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-04T09:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integration with Microsoft Local Administrator password solution (Laps)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4043519#M558745</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the same requirement in a NAM environment. Is it possible to do this ?.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and Regards&lt;/P&gt;&lt;P&gt;Shabeeb&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 15:27:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4043519#M558745</guid>
      <dc:creator>SHABEEB KUNHIPOCKER</dc:creator>
      <dc:date>2020-03-10T15:27:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integration with Microsoft Local Administrator password solution (Laps)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4043568#M558755</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;If you're speaking about using the NAM module of AnyConnect, yes you can achieve the options i highlighted above, by using NAM profiles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 16:36:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4043568#M558755</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-10T16:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integration with Microsoft Local Administrator password solution (Laps)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4044806#M558835</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We already have NAM profile for wired and wireless setup for our users. The profiles are using EAP-FAST so that we can do EAP-Chaining for our users. The LAPS is used by the user support personnel to access the machines remotely in case of any issues reported and they need to have local admin privileges on the machine. My question is that without altering the current setup of EAP-Chaining is there any way that we can have the LAPS setup accommodated only for the local admin account?.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I configure two wired profiles in Anyconnect NAM, which profile it will use when it detects a network connection?. Is there any conditions I can write in the NAM profile (using profile editor) itself so that it can choose specific profile based on the condition?.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Shabeeb&lt;/P&gt;&lt;P&gt;Thanks and Regards&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2020 09:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4044806#M558835</guid>
      <dc:creator>SHABEEB KUNHIPOCKER</dc:creator>
      <dc:date>2020-03-12T09:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integration with Microsoft Local Administrator password solution (Laps)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4044849#M558838</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; While using EAP-FAST and EAP-Chaining, if your inner method is EAP-TLS, you can achieve the same thing, have your LAPS accounts be provisioned with a certificate &amp;nbsp;which has a unique filed that you can match in your ISE policies. (long lifetime cause you're gonna rarely use this account on all devices, and you don't want it to expire, so when the LAPS connects it is not allowed network access). This one different field in the certificate is required only if you want a different authorization to be pushed from ISE for the LAPS users. We have a problem with the LAPS password not being able to be validated by ISE, thus we don't use EAP-MSCHAPv2 as the inner method, but use EAP-TLS as the inner method.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2020 10:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/4044849#M558838</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-12T10:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integration with Microsoft Local Administrator password</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/5073063#M588842</link>
      <description>&lt;P&gt;any easy solution for this in 2024? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 14:07:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integration-with-microsoft-local-administrator/m-p/5073063#M588842</guid>
      <dc:creator>peter.matuska1</dc:creator>
      <dc:date>2024-04-18T14:07:35Z</dc:date>
    </item>
  </channel>
</rss>

