<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Condition: Device in AZURE Group in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5123070#M589781</link>
    <description>&lt;P&gt;thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp; - it shows how little (zero) engagement I have with this stuff in my day to day.&lt;/P&gt;</description>
    <pubDate>Sun, 02 Jun 2024 23:54:31 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-06-02T23:54:31Z</dc:date>
    <item>
      <title>ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5121681#M589747</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello all,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I am relatively new to Cisco ISE and all the possible conditions; I would like to know how to create the following condition:&lt;/P&gt;
&lt;P&gt;check if a device is member of an Azure AD group.&lt;/P&gt;
&lt;P&gt;The device will be Azure only (so no registration on-prem).&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I am running ISE version 3.2.0.542 patch 5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Azure AD tenant has already been configured as REST External Identity Source.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;thanks for the help&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;F.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 07:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5121681#M589747</guid>
      <dc:creator>fabioairoldi</dc:creator>
      <dc:date>2024-05-31T07:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5123052#M589778</link>
      <description>&lt;P&gt;I don't have access to Azure, but if you have the External Identity Source configured, then it will appear in the Policy Set, when you create a new Authorization Rule.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_1-1717360010474.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/219898i465412AB4D7F960A/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_1-1717360010474.png" alt="ArneBier_1-1717360010474.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my case I have an on-prem AD - but ISE will list your Azure Identity Source in the drop-downlist&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1717359936477.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/219897iCB3D5F907D099419/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_0-1717359936477.png" alt="ArneBier_0-1717359936477.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 20:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5123052#M589778</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-06-02T20:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5123064#M589780</link>
      <description>&lt;P&gt;No, it is not currently possible to Authorize an Entra Joined Device against Entra ID using the REST ID function. Only User Authorization is possible. See my blog linked below for current options supported in relation to ISE and EntraID.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 22:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5123064#M589780</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-06-02T22:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5123070#M589781</link>
      <description>&lt;P&gt;thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp; - it shows how little (zero) engagement I have with this stuff in my day to day.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 23:54:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5123070#M589781</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-06-02T23:54:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5123404#M589803</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;am I to understand that it's also not possible to check if a device is enrolled in Entra ID? So no group check, just authenticate based on whether or not it's present.&lt;/P&gt;
&lt;P&gt;Currently I am authenticating based on a simple check on the Certificate - Issuer CN.&lt;/P&gt;
&lt;P&gt;May I ask what would a better way to make this rule stricter WITHOUT using any USER-based conditions?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;F.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 13:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5123404#M589803</guid>
      <dc:creator>fabioairoldi</dc:creator>
      <dc:date>2024-06-03T13:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5124010#M589822</link>
      <description>&lt;P&gt;Correct. ISE currently does not have the ability to check anything related to the registration/join status of a Device in Entra ID as part of the Authentication or Authorization process. The Device is only authenticated based on a valid/trusted certificate presented to ISE.&lt;/P&gt;
&lt;P&gt;Using the Intune MDM registration/compliance status of the device as a condition for authorization is currently the best option for additional security control.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 22:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5124010#M589822</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-06-03T22:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5156003#M591073</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Could you please help me to clarify this doubt:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;To authenticate my wireless users using traditional AD, I have a policy where I am validating if the computer name&amp;nbsp; (CN) on the certificate belongs to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Computer domain group&lt;/STRONG&gt;, I am not specifying a specific AD group.&lt;/P&gt;
&lt;P&gt;Which EntraID attribute or membership group can I validate to authenticate my wireless users that are in EntraID? I don't want to specify a specific group (e.g., Sales, Marketing).&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; I am not using MDM,&lt;BR /&gt;If am not wrong, from what I understood, there is not possible to check if the device is EntraID registered.&lt;BR /&gt;So how can I create the authotization profile, with which attributte should I compare?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="icarimo_0-1722873072278.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/225487iFB42D9C1B59F5998/image-size/medium?v=v2&amp;amp;px=400" role="button" title="icarimo_0-1722873072278.png" alt="icarimo_0-1722873072278.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2024 15:52:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5156003#M591073</guid>
      <dc:creator>icarimo</dc:creator>
      <dc:date>2024-08-05T15:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5156155#M591079</link>
      <description>&lt;P&gt;The question is a bit confusing as you're referencing authenticating Users based on a Computer name, which is not possible.&lt;/P&gt;
&lt;P&gt;If you want to authorize your Users against Entra ID as per the&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635#toc-hId--1283275986" target="_blank" rel="noopener"&gt;User Authorization with Entra ID and EAP-TLS&lt;/A&gt; use case, those users would need to be part of a Group in Entra ID and that Group would need to be added in the REST ID Store configure in ISE.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2024 22:30:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5156155#M591079</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-08-05T22:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5156294#M591085</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you for the quick reply.&lt;BR /&gt;Sorry the confusion,&amp;nbsp;let me rephrase.&lt;BR /&gt;&lt;BR /&gt;- I want to authenticate my wireless devices using EAP-TLS.&lt;BR /&gt;- The device a register in EntraID.&lt;BR /&gt;- I am using &lt;STRONG&gt;Essentials&lt;/STRONG&gt; licenses I &lt;STRONG&gt;don´t&lt;/STRONG&gt; have Intune&lt;BR /&gt;&lt;BR /&gt;In the authentication rule, I will check if the device certificate was issued by the correct CA.&lt;BR /&gt;Then my doubt is in the authotization rule...&lt;BR /&gt;How can I create the authotization rule to check the device certificate CN and validate if it exist in EntraID?&lt;BR /&gt;--- In other words, I want to see the if CN exist in the list of EntraID devices, if yes. I will permit access.&lt;BR /&gt;&lt;BR /&gt;I saw this example, however I don´t want to specify the group, just to validate if belongs to any EntraID group, permit access&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="icarimo_0-1722929300749.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/225519i4C45BD39CD760ABD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="icarimo_0-1722929300749.png" alt="icarimo_0-1722929300749.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2024 07:29:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5156294#M591085</guid>
      <dc:creator>icarimo</dc:creator>
      <dc:date>2024-08-06T07:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5156668#M591107</link>
      <description>&lt;P&gt;This has been stated repeatedly and I do not know how to state it more simply... ISE cannot current check &lt;STRONG&gt;anything&lt;/STRONG&gt; about a Device against Entra ID. This is true of any kind of Device and join type (Entra Joined, Entra Hybrid Joined, Entra Registered) in Entra ID.&lt;/P&gt;
&lt;P&gt;If the Device is enrolled with a &lt;STRONG&gt;User&lt;/STRONG&gt; certificate (with the UPN) and configured for &lt;STRONG&gt;User&lt;/STRONG&gt; authentication, ISE can use Entra ID Group membership and/or the other 44 attributes specified in the blog post shared earlier as conditions for authorization of the &lt;STRONG&gt;User&lt;/STRONG&gt; session.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2024 22:13:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5156668#M591107</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-08-06T22:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5263107#M595098</link>
      <description>&lt;P&gt;on your point above for wireless aaa 802.1x case with ISE essentials -&amp;nbsp;&lt;EM&gt;The Device is only authenticated based on a valid/trusted certificate presented to ISE.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;If I use issuer CN, how will ISE identify its a valid/trusted certificate. How will the revocation/expiry can be managed?&amp;nbsp;&lt;/P&gt;&lt;P&gt;how will ISE know its not revoked or expired certificate?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 15:33:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5263107#M595098</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2025-02-20T15:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Condition: Device in AZURE Group</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5263119#M595099</link>
      <description>&lt;P&gt;You can set a series of Trusted Root in ISE, and for each define a CRL lookup address and timeframe&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 15:52:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-condition-device-in-azure-group/m-p/5263119#M595099</guid>
      <dc:creator>fabioairoldi</dc:creator>
      <dc:date>2025-02-20T15:52:51Z</dc:date>
    </item>
  </channel>
</rss>

