<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE Dot1x Authentication &amp;amp; Azure AD expired password in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5138245#M590341</link>
    <description>&lt;P&gt;To be clear...&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ISE can Authorize an EAP-TLS User session against Entra ID&lt;/LI&gt;
&lt;LI&gt;ISE can Authenticate and Authorize an EAP-TTLS(PAP) User session against Entra ID using ROPC&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;More details on the current use cases and options in relation to ISE, Entra ID, and Intune can be found in this blog.&lt;BR /&gt;&lt;A id="link_7" class="page-link lia-link-navigation lia-custom-event" href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635" target="_blank"&gt;Cisco ISE with Microsoft Active Directory, Entra ID, and Intune&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 01 Jul 2024 03:05:47 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2024-07-01T03:05:47Z</dc:date>
    <item>
      <title>Cisco ISE Dot1x Authentication &amp; Azure AD expired password</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5138161#M590334</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;We have set up&amp;nbsp;Cisco ISE Dot1x Authentication with Azure AD using REST (ROPC). At the endpoint, we are using native Windows supplicant with EAP TTLS and PAP as the Inner Authentication Method.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue that we are observing is when the user password expires at the Azure AD level user cannot connect to the network. User has to call the endpoint help desk team to get a new password.&lt;/P&gt;
&lt;P&gt;My question is, without&amp;nbsp;Dot1x, does Windows allow you to set up a new password in case the current one expires?&amp;nbsp;Why is there no provision for user to set new password in case&amp;nbsp;password expires in&amp;nbsp;Dot1x environment?&lt;/P&gt;
&lt;P&gt;Is this limitation from ISE side or Windows native supplicant limitation&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jun 2024 17:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5138161#M590334</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-06-30T17:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Dot1x Authentication &amp; Azure AD expired password</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5138170#M590335</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;This is a limitation with ROPC and Azure AD/Entra ID, any interruption to a ROPC flow, such as change password, or MFA, is not supported.&lt;/P&gt;
&lt;P&gt;You can see more about this here:&lt;BR /&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/active-directory-b2c/add-ropc-policy?tabs=app-reg-ga&amp;amp;pivots=b2c-user-flow" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/active-directory-b2c/add-ropc-policy?tabs=app-reg-ga&amp;amp;pivots=b2c-user-flow&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;"ROPC doesn’t work when there's any interruption to the authentication flow that needs user interaction. For example, when a password expires or needs to be changed,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/active-directory-b2c/multi-factor-authentication" data-linktype="relative-path" target="_blank"&gt;multifactor authentication&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is required, or when more information needs to be collected during sign-in (for example, user consent)."&lt;/P&gt;
&lt;P&gt;On a related note, generally I prefer using certificates for 802.1x authentication.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jun 2024 19:54:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5138170#M590335</guid>
      <dc:creator>Jonatan Jonasson</dc:creator>
      <dc:date>2024-06-30T19:54:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Dot1x Authentication &amp; Azure AD expired password</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5138216#M590340</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;Jonatan,&lt;/P&gt;
&lt;P&gt;Is my understanding regrading ISE with Azure AD is correct?&lt;/P&gt;
&lt;P&gt;We have only 2 options to authenticate users with Azure AD&lt;/P&gt;
&lt;P&gt;1. using EAP-TLS however Require PKI Infrastructure at Azure AD side which can issue certificate for users and computers.&lt;/P&gt;
&lt;P&gt;2. using EAP-TTLS with PAP as inner method with limitation of ROPC&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 01:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5138216#M590340</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-07-01T01:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Dot1x Authentication &amp; Azure AD expired password</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5138245#M590341</link>
      <description>&lt;P&gt;To be clear...&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ISE can Authorize an EAP-TLS User session against Entra ID&lt;/LI&gt;
&lt;LI&gt;ISE can Authenticate and Authorize an EAP-TTLS(PAP) User session against Entra ID using ROPC&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;More details on the current use cases and options in relation to ISE, Entra ID, and Intune can be found in this blog.&lt;BR /&gt;&lt;A id="link_7" class="page-link lia-link-navigation lia-custom-event" href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635" target="_blank"&gt;Cisco ISE with Microsoft Active Directory, Entra ID, and Intune&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 03:05:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5138245#M590341</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-07-01T03:05:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Dot1x Authentication &amp; Azure AD expired password</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5140934#M590447</link>
      <description>&lt;P&gt;Hi Greg&lt;/P&gt;
&lt;P&gt;Can you verify if my understanding is correct regarding EAP-TLS ?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I believe for EAP-TLS to work with Azure AD we should enable and configure Microsoft Entra certificate-based authentication (CBA) first.&amp;nbsp;&lt;BR /&gt;For Microsoft Entra CBA&amp;nbsp;Public Key Infrastructure&amp;nbsp; (PKI) is required for creating client certificates. Customers need to configure their own Public Key Infrastructure (PKI) and provision certificates to their users and devices.&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jul 2024 16:44:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5140934#M590447</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-07-06T16:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Dot1x Authentication &amp; Azure AD expired password</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5141145#M590456</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1196021"&gt;@jitendrac&lt;/a&gt;&amp;nbsp;.. No. As stated in the &lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-certificate-based-authentication" target="_blank" rel="noopener"&gt;MS documentation for CBA&lt;/A&gt;, it "&lt;SPAN&gt;enables customers to allow or require users to authenticate directly with X.509 certificates against their Microsoft Entra ID for applications and browser sign-in". Neither of those scenarios are related to the Windows 802.1x supplicant.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Using EAP-TLS for 802.1x authentication (purely against ISE, in this case) still requires the User and/or Device certificate enrolment. This would typically be done by Intune which would need integration with a PKI of some sort. That could be AD CS (as discussed in my blog), the MS Cloud PKI, or another solution like &lt;A href="https://www.scepman.com/" target="_blank" rel="noopener"&gt;SCEPman&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jul 2024 22:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dot1x-authentication-amp-azure-ad-expired-password/m-p/5141145#M590456</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-07-07T22:07:21Z</dc:date>
    </item>
  </channel>
</rss>

