<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE integrates with Windows Hello for Business in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147045#M590719</link>
    <description>&lt;P&gt;Thank for your solution, and great idea which relies on certificate.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;what about challenging with External Identity like AD to authenticate trusted machine/user identity?&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 19 Jul 2024 02:38:06 GMT</pubDate>
    <dc:creator>oumodom</dc:creator>
    <dc:date>2024-07-19T02:38:06Z</dc:date>
    <item>
      <title>Cisco ISE integrates with Windows Hello for Business</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5146347#M590695</link>
      <description>&lt;P&gt;Hello Cisco ISE lover,&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I have plan for Cisco ISE (low impact mode) integrates with Windows Hello for business , in the term of authentication (User first Log-on with PIN or Biometric finger scan/Facial).&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;By feasibility study, we use EAP-FAST [TLS (Machine)+MSCHAPv2(User Authenticate)]&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;Has anyone experienced this use case, or any suggestion?&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 04:09:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5146347#M590695</guid>
      <dc:creator>oumodom</dc:creator>
      <dc:date>2024-07-18T04:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integrates with Windows Hello for Business</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5146448#M590698</link>
      <description>&lt;P&gt;i would suggest using TEAP&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;you can use cert for machine and user/password for user or cert for both..&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 06:07:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5146448#M590698</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-07-18T06:07:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integrates with Windows Hello for Business</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5146987#M590717</link>
      <description>&lt;P&gt;You cannot use MSCHAPv2 in conjunction with Windows Hello. The supplicant has no way to take the Hello input (PIN, for example) and translate that to a username/password to present in the 802.1x response.&lt;/P&gt;
&lt;P&gt;If you want to use Windows Hello, you must use a certificate-based authentication - EAP-TLS, TEAP(EAP-TLS)&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 22:28:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5146987#M590717</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-07-18T22:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integrates with Windows Hello for Business</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147045#M590719</link>
      <description>&lt;P&gt;Thank for your solution, and great idea which relies on certificate.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;what about challenging with External Identity like AD to authenticate trusted machine/user identity?&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 02:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147045#M590719</guid>
      <dc:creator>oumodom</dc:creator>
      <dc:date>2024-07-19T02:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integrates with Windows Hello for Business</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147068#M590720</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975-configure-eap-tls-authentication-with-is.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975-configure-eap-tls-authentication-with-is.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;the certificate identity obtained from the cert, which is generally UPN &lt;A href="mailto:user@domain.com" target="_blank"&gt;user@domain.com&lt;/A&gt; can be be looked up in AD/LDAP to verify that is a valid user,and user/group attributes can be retrieved for authorization to provide differentiated authorization policy per group (or user).&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 03:46:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147068#M590720</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-07-19T03:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integrates with Windows Hello for Business</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147069#M590721</link>
      <description>&lt;P&gt;i havent tested with windows hello, but i think if you disabled use windows login credentials for dot1x , it could prompt the user for creds ? ofcourse, certs are the best&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 03:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147069#M590721</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-07-19T03:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integrates with Windows Hello for Business</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147074#M590722</link>
      <description>&lt;P&gt;As my experience, UPN define the most is machine under domain joined after selected source sequence, not for &lt;A href="mailto:user@domain.com" target="_blank" rel="nofollow noopener noreferrer"&gt;user@domain.com&lt;/A&gt; in AD.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Correct me if i am wrong.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 04:40:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147074#M590722</guid>
      <dc:creator>oumodom</dc:creator>
      <dc:date>2024-07-19T04:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integrates with Windows Hello for Business</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147471#M590737</link>
      <description>&lt;P&gt;It depends on how the supplicant is configured. See this explanation and example...&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635#toc-hId-296059835" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635#toc-hId-296059835&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I have Win 10 and 11 instances in my lab that use TEAP(EAP-TLS) or EAP-TLS with User or Computer authentication and they work perfectly with Windows Hello PIN login.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 22:32:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147471#M590737</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-07-19T22:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE integrates with Windows Hello for Business</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147499#M590739</link>
      <description>&lt;P&gt;UPN is used a lot for user as well and for Azure / Entra, that is generally a requirement.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 02:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-integrates-with-windows-hello-for-business/m-p/5147499#M590739</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-07-20T02:32:33Z</dc:date>
    </item>
  </channel>
</rss>

