<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ISE + Azure AD Integration (ROPC) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-ad-integration-ropc/m-p/5165105#M591358</link>
    <description>&lt;DIV class="cuf-body cuf-questionTitle forceChatterFeedBodyQuestionWithoutAnswer" data-aura-rendered-by="94:1186;a" data-aura-class="forceChatterFeedBodyQuestionWithoutAnswer"&gt;&lt;SPAN&gt;Has anyone come across similar case as below?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="cuf-body cuf-questionBody forceChatterFeedBodyQuestionWithoutAnswer" data-aura-rendered-by="98:1186;a" data-aura-class="forceChatterFeedBodyQuestionWithoutAnswer"&gt;
&lt;DIV class="cuf-feedBodyText forceChatterMessageSegments forceChatterFeedBodyText" data-aura-rendered-by="102:1186;a" data-aura-class="forceChatterMessageSegments forceChatterFeedBodyText"&gt;
&lt;DIV class="feedBodyInner Desktop"&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;I have ISE 3.2 (patch5) instance with AAD integration and configured policies for wireless Dot1X. I have&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="uiOutputText"&gt;only configured user/group authentication and authorizatio&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="uiOutputText"&gt;&lt;STRONG&gt;n&lt;/STRONG&gt; and there are&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="uiOutputText"&gt;no device-based policies.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Currently all apple devices cannot authenticate because they are trying to authenticate using protocols that Azure does not support such as EAP-FAST. As per my knowledge, Azure-ISE integration (ROPC) only supporting EAP-TTLS with PAP. (no other inner methods). I also tried disabling protocols to force clients to use EAT-TTLS with PAP and also with ISE 3.3. But it didn't work.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;I also found a workaround to use Intune to configure client devices. But for BYOD requirement needs agentless device authorization based on AAD group.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Any suggestions? or workaround?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 23 Aug 2024 15:32:32 GMT</pubDate>
    <dc:creator>Manuka Rajapaksha</dc:creator>
    <dc:date>2024-08-23T15:32:32Z</dc:date>
    <item>
      <title>Cisco ISE + Azure AD Integration (ROPC)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-ad-integration-ropc/m-p/5165105#M591358</link>
      <description>&lt;DIV class="cuf-body cuf-questionTitle forceChatterFeedBodyQuestionWithoutAnswer" data-aura-rendered-by="94:1186;a" data-aura-class="forceChatterFeedBodyQuestionWithoutAnswer"&gt;&lt;SPAN&gt;Has anyone come across similar case as below?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="cuf-body cuf-questionBody forceChatterFeedBodyQuestionWithoutAnswer" data-aura-rendered-by="98:1186;a" data-aura-class="forceChatterFeedBodyQuestionWithoutAnswer"&gt;
&lt;DIV class="cuf-feedBodyText forceChatterMessageSegments forceChatterFeedBodyText" data-aura-rendered-by="102:1186;a" data-aura-class="forceChatterMessageSegments forceChatterFeedBodyText"&gt;
&lt;DIV class="feedBodyInner Desktop"&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;I have ISE 3.2 (patch5) instance with AAD integration and configured policies for wireless Dot1X. I have&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="uiOutputText"&gt;only configured user/group authentication and authorizatio&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="uiOutputText"&gt;&lt;STRONG&gt;n&lt;/STRONG&gt; and there are&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="uiOutputText"&gt;no device-based policies.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Currently all apple devices cannot authenticate because they are trying to authenticate using protocols that Azure does not support such as EAP-FAST. As per my knowledge, Azure-ISE integration (ROPC) only supporting EAP-TTLS with PAP. (no other inner methods). I also tried disabling protocols to force clients to use EAT-TTLS with PAP and also with ISE 3.3. But it didn't work.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;I also found a workaround to use Intune to configure client devices. But for BYOD requirement needs agentless device authorization based on AAD group.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Any suggestions? or workaround?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 23 Aug 2024 15:32:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-ad-integration-ropc/m-p/5165105#M591358</guid>
      <dc:creator>Manuka Rajapaksha</dc:creator>
      <dc:date>2024-08-23T15:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE + Azure AD Integration (ROPC)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-ad-integration-ropc/m-p/5165723#M591378</link>
      <description>&lt;P&gt;AFAIK, there is no way to configure Mac OS to use EAP-TTLS[PAP] except creating and installing a Wifi Profile. This can be done manually using something like &lt;A href="https://apps.apple.com/us/app/apple-configurator/id1037126344?mt=12" target="_blank" rel="noopener"&gt;Apple Configurator&lt;/A&gt; (you would have to provide the XML to the users to install) or using an MDM like Intune or Jamf Pro.&lt;/P&gt;
&lt;P&gt;Another option would be using a portal-based flow with SAML/Oauth2 authentication against Entra ID.&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-byod-flow-using-azure-ad/ta-p/4400675" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-byod-flow-using-azure-ad/ta-p/4400675&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Aug 2024 22:06:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-ad-integration-ropc/m-p/5165723#M591378</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-08-25T22:06:05Z</dc:date>
    </item>
  </channel>
</rss>

