<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE external MDM Intune integration returns old\wrong API version in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/5114071#M589582</link>
    <description>&lt;P&gt;If it did work using auto discovery that this would not be the issue.&lt;/P&gt;
&lt;P&gt;Also the bug tells that it is fixed in 3.1 patch 7, 3.2 patch 2 and 3.3 vanilla.&lt;/P&gt;
&lt;P&gt;It could be certificate chain changes from the MS/Azure/Intune side. I've seen that a couple of time. Make sure you check that, see also&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217290-integrate-intune-mdm-with-identity-servi.html#toc-hId-2011543392" target="_blank"&gt;Integrate Intune MDM with Identity Services Engine - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Otherwise it's a good idea to contact TAC.&lt;/P&gt;
&lt;P&gt;And don't forget to post your solution when you're issue is solved.&lt;/P&gt;</description>
    <pubDate>Thu, 23 May 2024 09:46:43 GMT</pubDate>
    <dc:creator>bart.t</dc:creator>
    <dc:date>2024-05-23T09:46:43Z</dc:date>
    <item>
      <title>ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675049#M576872</link>
      <description>&lt;P&gt;Hi, we are trying to integrate our Microsoft Endpoint Manager (previously Intune) into Cisco ISE 3.1 Patch 3 as external MDM-server, but it always returns API version 2 instead of version 3 when testing connection. The documentation says version 3 is supported when using Microsoft Endpoint Manager. Enabling debug on the MDM-component reveals the following lines which seem to be relevant to the detection process:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2022-08-24 15:01:05,195 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.authtoken.MdmAzureActiveDirectoryClient -::::- Access token has acquired  succesfully from Microsoft Azure.
2022-08-24 15:01:05,195 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.api.MdmServerInfoApi -::::- inside the method : callMdmServerInfoApiOnMdmServer()
2022-08-24 15:01:05,195 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.apiimpl.MDMVerifyServer -::::- apiVersionSb : 3, mdmApiVersionSb : , tryWithV3 : false
2022-08-24 15:01:05,195 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.apiimpl.MDMVerifyServer -::::- MDM Rest API Server Query String -&amp;gt; /ciscoise/mdminfo/?ise_api_version=3 
2022-08-24 15:01:05,195 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.apiimpl.MDMVerifyServer -::::- MDM Rest API Server Query PATH String -&amp;gt; /ciscoise/mdminfo/?ise_api_version=3 
2022-08-24 15:01:05,195 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.apiimpl.MDMVerifyServer -::::- 1. Connecting to the MDM server host fef.msub05.manage.microsoft.com using apiVersion 3
2022-08-24 15:01:05,195 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.util.MdmRESTClient -::::- sendGETRequestDom: start  HTTP request - connectionsUsed: 2, connectionsAvailable: 198
2022-08-24 15:01:05,195 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.util.MdmRESTClient -::::- sendGETRequestDomNonComp: start  HTTP request - connectionsUsed: 0, connectionsAvailable: 200
2022-08-24 15:01:05,195 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.util.MdmRESTClient -::::- ===mdmFlowInfo===null,=====serverType=====MobileDeviceManager,===serverAuthType===OAuth - Client Credentials
2022-08-24 15:01:05,195 INFO   [admin-http-pool55][] cisco.cpm.mdm.util.MdmRESTClient -::::- GET: MDM Server URL: https://fef.msub05.manage.microsoft.com/StatelessNACService/ciscoise/mdminfo/?ise_api_version=3
2022-08-24 15:01:05,322 INFO   [admin-http-pool55][] cisco.cpm.mdm.util.MdmRESTClient -::::- MDM Server Response Code: 200
2022-08-24 15:01:05,326 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.util.MdmRESTClient -::::- sendGETRequestDom: end  HTTP request - connectionsUsed: 2, connectionsAvailable: 198
2022-08-24 15:01:05,326 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.util.MdmRESTClient -::::- sendGETRequestDomNonComp: end  HTTP request - connectionsUsed: 0, connectionsAvailable: 200
2022-08-24 15:01:05,326 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.api.MdmServerInfoApi -::::- returning from the method : callMdmServerInfoApiOnMdmServer() -&amp;gt; com.cisco.cpm.mdm.api.MdmServerInfoData Object {
  apiPath: /StatelessNacService/ciscodeviceinfo/mdm/api
  redirectUrl: https://portal.manage.microsoft.com/networkaccesscontrol/index
  queryMaxSize: 100
  apiVersion: 2
  vendor: Microsoft
  productName: Microsoft Intune
  productVersion: 5.0
  COMMA: , 
  errorMsg: null
  errorOccurred: false
} 
2022-08-24 15:01:05,893 ERROR  [admin-http-pool55][] pap.api.handler.impl.HandlerInfoImpl -::::- Unable to load the handler impl class 'com.cisco.cpm.psqmgr.notification.PxGridNotificationHandler' com.cisco.cpm.psqmgr.notification.PxGridNotificationHandler
2022-08-24 15:01:05,893 ERROR  [admin-http-pool55][] pap.api.handler.impl.HandlerInfoImpl -::::- Unable to get handler with name  PxGridNotificationHandler
2022-08-24 15:01:05,893 WARN   [admin-http-pool55][] pap.api.handler.impl.HandlerInfoImpl -::::- Handler with name 'PxGridNotificationHandler' is not loaded with impl class 'com.cisco.cpm.psqmgr.notification.PxGridNotificationHandler'
2022-08-24 15:01:05,894 ERROR  [admin-http-pool55][] pap.api.handler.impl.HandlerInfoImpl -::::- Unable to load the handler impl class 'com.cisco.cpm.eps.config.ConfigChangeHandler' com.cisco.cpm.eps.config.ConfigChangeHandler
2022-08-24 15:01:05,895 ERROR  [admin-http-pool55][] pap.api.handler.impl.HandlerInfoImpl -::::- Unable to get handler with name  EPSConfigChangeHandler
2022-08-24 15:01:05,895 WARN   [admin-http-pool55][] pap.api.handler.impl.HandlerInfoImpl -::::- Handler with name 'EPSConfigChangeHandler' is not loaded with impl class 'com.cisco.cpm.eps.config.ConfigChangeHandler'
2022-08-24 15:01:05,911 DEBUG  [admin-http-pool55][] cisco.cpm.mdm.pip.MdmSettingsNotificationHandler -::::- add / update mdm server to the local MDM servers cache MSEndpMgmt
2022-08-24 15:01:05,912 INFO   [admin-http-pool55][] cisco.cpm.mdm.util.MdmServersCache -::::- MDM server - Status : InActive, mdm server id : REMOVEDFROMLOG and mdm server name : MSEndpMgmt&lt;/LI-CODE&gt;&lt;P&gt;Anyone else made this work with API version 3?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 07:07:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675049#M576872</guid>
      <dc:creator>rogergh</dc:creator>
      <dc:date>2022-08-25T07:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675056#M576874</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Ref :&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/field-notices/724/fn72427.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/field-notices/724/fn72427.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;EM&gt; &amp;gt;...Configure the use of MDM &lt;STRONG&gt;APIv3&lt;/STRONG&gt; Microsoft Intune integration. This includes the &lt;STRONG&gt;deployment&lt;/STRONG&gt; of&lt;STRONG&gt; certificates&lt;/STRONG&gt; to all Intune registered endpoints and confirmation that those certificates are used for network authentication. For further information, see the&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html#task_og1_5zx_cqb" target="_blank" rel="noopener"&gt;Integrate MDM and UEM Servers with Cisco ISE Configuration Guide&lt;/A&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Check of any of the mentioned 'arguments' can be applicable to your case.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 07:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675056#M576874</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-08-25T07:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675057#M576875</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1074892"&gt;@rogergh&lt;/a&gt; check out this Cisco video relating to configuring ISE 3.1 with Intune. &lt;A href="https://www.youtube.com/watch?v=iAKyIHFqbgE" target="_blank"&gt;https://www.youtube.com/watch?v=iAKyIHFqbgE&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 07:21:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675057#M576875</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-25T07:21:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675077#M576878</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291804"&gt;@Mark Elsen&lt;/a&gt;&amp;nbsp;The Azure application\registration is configured to use the Cisco ISE-certificate for authentication, and the Endpoint Manager device profiles are configured to deploy certificates from our PKI (with MS Connector for MEM\Intune) with the SAN URI as DeviceID (as per the documentation). We don't have to activate some other global MEM\Intune certificate config I assume?&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;The video seems very interesting, but from what I can see it doesn't seem to include configuring the External MDM-connector in ISE against MEM (Intune), only policy and endpoint-configuration after getting it up and running. Thanks anyway though, seems interesting for the post-config parts.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 08:01:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675077#M576878</guid>
      <dc:creator>rogergh</dc:creator>
      <dc:date>2022-08-25T08:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675261#M576886</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Check if there are any settings on&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;Microsoft Endpoint Manager&lt;/EM&gt; , where you could specify or set the api version to be used explicitly.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 12:00:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675261#M576886</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-08-25T12:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675680#M576895</link>
      <description>&lt;P&gt;In the logs, I see an MDM response of 200. This should mean a successful response to the APIv3 query, so it looks like that should be working.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;2022-08-24 15:01:05,195 INFO   [admin-http-pool55][] cisco.cpm.mdm.util.MdmRESTClient -::::- GET: MDM Server URL: https://fef.msub05.manage.microsoft.com/StatelessNACService/ciscoise/mdminfo/?ise_api_version=3
2022-08-24 15:01:05,322 INFO   [admin-http-pool55][] cisco.cpm.mdm.util.MdmRESTClient -::::- MDM Server Response Code: 200&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What have you configured for the Device Identifier in the MDM server config? Have you disabled the 'Legacy MAC Address' option for identity? If not, ISE would likely be using both APIv2 and APIv3 during the lookups.&lt;BR /&gt;You might want to enable the TRACE level on the external-mdm log via the Debug Wizard, test an endpoint, and see what details you can see related to the session (deviceIdentifier, GUID, etc).&lt;/P&gt;
&lt;P&gt;Example from my Webinar:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2022-08-26 at 9.10.03 am.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/160840i2D5AE5BC14C5681B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2022-08-26 at 9.10.03 am.png" alt="Screen Shot 2022-08-26 at 9.10.03 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 23:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4675680#M576895</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-08-25T23:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4677988#M576954</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;We can't adjust the settings for Device Identifier, since it only says that it supports API V2 (greyed out).&lt;BR /&gt;See the screenshots for our settings. I have removed client ID and Token Issuing URL in the picture only. They are correctly filled out in the settings.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 09:42:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4677988#M576954</guid>
      <dc:creator>rogergh</dc:creator>
      <dc:date>2022-08-29T09:42:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4678373#M576994</link>
      <description>&lt;P&gt;The configuration on ISE and the API Permissions in Azure look correct.&lt;/P&gt;
&lt;P&gt;Does your token endpoint have the following format?&lt;BR /&gt;&lt;A href="https://login.microsoftonline.com/" target="_blank"&gt;https://login.microsoftonline.com/&lt;/A&gt;&amp;lt;tenantID&amp;gt;/oauth2/v2.0/token&lt;/P&gt;
&lt;P&gt;Did you upload the Admin certificate from ISE to the App Registration in Azure as described from Step 7 in the guide (&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html&lt;/A&gt;)?&lt;/P&gt;
&lt;P&gt;Have you installed all of the Trusted Certificates listed in Step 25?&lt;/P&gt;
&lt;P&gt;Was this an existing External MDM in ISE that you are re-configuring to use the APIv3 or are you configuring it as a new MDM? If it was already existing using APIv2, you might try configuring it as a new MDM to see if that resolves the issue.&lt;/P&gt;
&lt;P&gt;I configured it as a new MDM in my lab as per the guide, and my ISE 3.1p3 instance states it supports APIv3.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2022-08-30 at 8.20.54 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/161090i06B0619E627182CC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2022-08-30 at 8.20.54 am.png" alt="Screen Shot 2022-08-30 at 8.20.54 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If all of the above are correct, you might need to open a TAC case and provide the TRACE level external-mdm logs for further investigation.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 22:22:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4678373#M576994</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-08-29T22:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4678410#M577004</link>
      <description>&lt;P&gt;I saw similar in a customer case, whose TAC engaged the BU escalation team as well as Microsoft Intune team. FYI.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 01:11:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4678410#M577004</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-08-30T01:11:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4679734#M577057</link>
      <description>&lt;P&gt;We have a similair problem, not resolved. MDM connections to our production tenant return API v2 but if I hookup the MDM to our my test tentant it defaults to v3.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 12:34:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4679734#M577057</guid>
      <dc:creator>Jeremybosch</dc:creator>
      <dc:date>2022-09-01T12:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4684243#M577173</link>
      <description>&lt;P&gt;Thanks for the replies, guys.&lt;/P&gt;&lt;P&gt;I guess we will have to open a TAC case and get this investigated.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2022 13:40:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4684243#M577173</guid>
      <dc:creator>rogergh</dc:creator>
      <dc:date>2022-09-09T13:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4738536#M578825</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1074892"&gt;@rogergh&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi, we've the same issue currently and opened a TAC case as well. We see MDM respond with version 2 as well and TAC directs us now to the Intune Engineer to look for an option to simply enable V3 somehow.&lt;/P&gt;
&lt;P&gt;So I'll do that. But...&lt;/P&gt;
&lt;P&gt;How did it end for you? Was it fixed?&lt;/P&gt;
&lt;P&gt;Thanks for sharing!&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 10:17:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4738536#M578825</guid>
      <dc:creator>bart.t</dc:creator>
      <dc:date>2022-12-14T10:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4738741#M578827</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/331637"&gt;@bart.t&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately the case progress has been very slow. After a lot of ISE log debugging, Cisco redirected us to Microsoft to verify that "version 3" is active and being sent, and then Intune support just redirect us to the integration guide and say that everything seems correct on their end (I'm not sure they understood what Cisco wants them to check, so I asked for a clarification from Cisco support as well, but haven't heard back yet). I can see from Microsoft documentation (&lt;A href="https://learn.microsoft.com/en-us/mem/intune/protect/network-access-control-integrate" target="_blank"&gt;https://learn.microsoft.com/en-us/mem/intune/protect/network-access-control-integrate&lt;/A&gt;) that they refer to their NAC-integration version as NAC 2.0, so the debug logs might actually return correct information (if it refers to Microsofts version numbering and not Cisco's, but I still need clarification from Cisco on this).&lt;/P&gt;&lt;P&gt;If you get any closer to a solution, let us know here as well &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 11:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4738741#M578827</guid>
      <dc:creator>rogergh</dc:creator>
      <dc:date>2022-12-14T11:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4738747#M578828</link>
      <description>&lt;P&gt;Thank you for your quick response. It's unfortunate that your case is dragging on as well. One would think Cisco and Microsoft should interact directly regarding which data is sent across and how it should be interpreted.&lt;/P&gt;
&lt;P&gt;Thanks for sharing, I will as well for sure.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 11:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4738747#M578828</guid>
      <dc:creator>bart.t</dc:creator>
      <dc:date>2022-12-14T11:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4753821#M579194</link>
      <description>&lt;P&gt;After a month of zero updates I went into ISE again to try and troubleshoot again but to no avail.&lt;/P&gt;
&lt;P&gt;So I searched the forum again, found this topic and after that gave bugsearch a go again.&lt;/P&gt;
&lt;P&gt;There I found the following bug:&amp;nbsp;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCwd84055" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCwd84055&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The following is stated &lt;STRONG&gt;and &lt;/STRONG&gt;including a workaround:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;&lt;EM&gt;Symptom:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;While integrating ISE 3.1 with Azure AD/Intune for MDM, ISE reports that MDM only supports Cisco ISE API Version 2.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;This occurs due to ISE incorrectly assuming that in the Azure Auto Discovery JSON, ComplianceRetrievalService (V3) appears before NACAPIService(V2). If Azure result has NACAPIService appearing first, ISE picks that endpoint and ignores ComplianceRetrievalService that appears further in the output.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;ISE needs first look for ComplianceRetrievalService in the entire JSON before failing over to NACAPIService&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;&lt;EM&gt;Conditions:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Integrating ISE 3.1 with Azure AD and it reports that it support Version 2 and not Version 3.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;&lt;EM&gt;Workaround:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;To workaround this issue, Auto Discovery has to be set to No and we can specify the endpoint for Version 3 manually.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Hostname: fef..manage.microsoft.com&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Port: 443&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Instance: TrafficGateway/TrafficRoutingService/ResourceAccess/ComplianceRetrievalService&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you already try and test this workaround?&lt;/P&gt;
&lt;P&gt;I've just pointed our TAC engineer to this bug as a possible workaround.&lt;/P&gt;
&lt;P&gt;The given symptoms and clarification matches your last post at least in essence.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2023 17:16:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4753821#M579194</guid>
      <dc:creator>bart.t</dc:creator>
      <dc:date>2023-01-12T17:16:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4754160#M579200</link>
      <description>&lt;P&gt;Very nice find,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/331637"&gt;@bart.t&lt;/a&gt;&amp;nbsp;!&lt;/P&gt;&lt;P&gt;This has solved the problem for us. Here is the steps I used to get it to work:&lt;/P&gt;&lt;P&gt;I first tried adding manual server, by using "fef.manage.microsoft.com" as server (which in my case resolved to "fef.msub06.manage.microsoft.com", but that did not work (401 Unauthorized error).&lt;/P&gt;&lt;P&gt;Then I completed the "Add new MDM server" with auto-discover and APIv2 just to check which server it retrieved, and it retrieved&amp;nbsp;"fef.msub05.manage.microsoft.com" and a different "Instance name" than what is listed in the bug entry.&lt;/P&gt;&lt;P&gt;I then opened the entry and changed auto-discover to "No", then changed the "Instance name" manually to what was listed in the bug entry, and then it worked! "APIv3 supported"&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 08:26:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4754160#M579200</guid>
      <dc:creator>rogergh</dc:creator>
      <dc:date>2023-01-13T08:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4754169#M579201</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1074892"&gt;@rogergh&lt;/a&gt;&amp;nbsp;thanks for getting back so quickly!&lt;/P&gt;
&lt;P&gt;Thanks for describing the steps taken.&lt;/P&gt;
&lt;P&gt;Basically you just edited a working APIv2 Instance and made it manual and only changed the Instance name (Default:&amp;nbsp;&lt;EM&gt;StatelessNACService&lt;/EM&gt;) to&amp;nbsp;&lt;EM&gt;TrafficGateway/TrafficRoutingService/ResourceAccess/ComplianceRetrievalService?&amp;nbsp;&lt;/EM&gt;So that whole pretty long string/path?&lt;/P&gt;
&lt;P&gt;And maybe change the port to 443, although I suppose it defaults to 443.&lt;/P&gt;
&lt;P&gt;I'll inform the customer and schedule a session to test those settings as well.&lt;/P&gt;
&lt;P&gt;Thanks for the cooperation on this one!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 08:49:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4754169#M579201</guid>
      <dc:creator>bart.t</dc:creator>
      <dc:date>2023-01-13T08:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4754188#M579203</link>
      <description>&lt;P&gt;Yes, correct. Changing the "Instance name" manually from a working auto-discover was the only real thing I needed to do, as port is 443 by default, and then click "Test connection". Then it would report APIv3 support and I was able to turn on SAN GUID-support. Specifying host name manually did not work for me, as the "fef.manage.microsoft.com" resolved to a subserver that returned 401 unauthorized error for me.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 09:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/4754188#M579203</guid>
      <dc:creator>rogergh</dc:creator>
      <dc:date>2023-01-13T09:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/5113963#M589578</link>
      <description>&lt;P&gt;Hi bart.t&lt;/P&gt;&lt;P&gt;I might be having the same problem, but i just don't understand where this workaround needs to be done, in ISE or in Intune?&lt;/P&gt;&lt;P&gt;Would you mind sending me some explanation?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Laszlo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2024 07:57:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/5113963#M589578</guid>
      <dc:creator>laposilaszlo</dc:creator>
      <dc:date>2024-05-23T07:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE external MDM Intune integration returns old\wrong API version</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/5114001#M589579</link>
      <description>&lt;P&gt;Hi Laszlo, it's done on the MDM instance on the External MDM page in ISE (under Administration &amp;gt; Network resources).&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2024 08:24:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-external-mdm-intune-integration-returns-old-wrong-api/m-p/5114001#M589579</guid>
      <dc:creator>bart.t</dc:creator>
      <dc:date>2024-05-23T08:24:01Z</dc:date>
    </item>
  </channel>
</rss>

