<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE EAP-TLS wireless queries in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5192029#M591712</link>
    <description>&lt;P&gt;Hello Greg,&lt;/P&gt;
&lt;P&gt;can you please provides the details on what configuration/steps would be required on ISE to use SCEPMan CA to authenticate user via ISE.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Sep 2024 10:23:58 GMT</pubDate>
    <dc:creator>HarshP</dc:creator>
    <dc:date>2024-09-09T10:23:58Z</dc:date>
    <item>
      <title>ISE EAP-TLS wireless queries</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5012301#M587050</link>
      <description>&lt;P&gt;can someone pls clarify on EAP-TLS authentication in ISE for wireless networks.&lt;BR /&gt;1. For EAP-TLS to work is AD certificate store (PKI) mandatory?&lt;BR /&gt;2. Can ISE server as PKI when user logs into SSID using AD credentials&lt;BR /&gt;3. Is EAP-TLS possible in non-AD joined laptops, users will be logging to SSID using AD credentials&lt;BR /&gt;4. Can EAP-TLS done for Azure AD logged in laptops, I saw below link but how to generate user certificates.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/218197-configure-ise-3-2-eap-tls-with-azure-act.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/218197-configure-ise-3-2-eap-tls-with-azure-act.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;this link was saying about generating user certificates for ISE EAP-TLS with wireless.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/213543-configure-eap-tls-flow-with-ise.html#toc-hId--271866854" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/213543-configure-eap-tls-flow-with-ise.html#toc-hId--271866854&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Feb 2024 06:34:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5012301#M587050</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2024-02-03T06:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE EAP-TLS wireless queries</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5012447#M587057</link>
      <description>&lt;P&gt;When we talk about EAP-TLS we don't refer to any username and password authentication. With EAP-TLS the authentication will be done via certificates. ISE can act as an internal PKI server and issue certificates to the users, however, this is done via configuring the BYOD onboarding flow, where the users will be redirected to a portal, and going through an onboarding process, part of that will be issuing a certificate by ISE to the user machine.&lt;/P&gt;
&lt;P&gt;On the other hand, ISE can also be configured to negotiate authentication with the users when they have certificates issued by an external PKI, whether it is your AD or any other third-party solution. This will apply to the case of having non-AD joined clients. From ISE perspective as long as it is configured to trust the client certificates that will be presented to it, it would be good with that.&lt;/P&gt;
&lt;P&gt;But please keep in mind that EAP-TLS does mutual authentication which means as much as ISE needs to trust the client certificates, the clients need to trust ISE certificate as well. This means that you would need to import into ISE the client certificates issuer chain and also import into the clients ISE certificate issuer chain.&lt;/P&gt;
&lt;P&gt;Regarding conditioning the authentication with the user or the machine groups, whether in Azure or on-prem AD, that depends on how you configure ISE certificate authentication profile that will be tied to the interested authentication rule. In the certificate authentication profile you can select the AD join point that you would've already configured in ISE, in that case ISE will check the presented value in the certificate and cross check it against the AD join to ensure that it does exist. ISE can also do a binary check of the certificates presented by the clients but I think this is not something you would see commonly used.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Feb 2024 18:04:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5012447#M587057</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-03T18:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE EAP-TLS wireless queries</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5015801#M587242</link>
      <description>&lt;P&gt;&amp;gt; 1. For EAP-TLS to work is AD certificate store (PKI) mandatory?&lt;/P&gt;
&lt;P&gt;Absolutely not. ISE can authenticate any certificate simply based on the certificates in the Trusted Certificates store. AD is often the Enterprise CA which may be your confusion. For binary certificate comparison, AD is also required.&lt;/P&gt;
&lt;P&gt;&amp;gt; 2. Can ISE server as PKI when user logs into SSID using AD credentials&lt;/P&gt;
&lt;P&gt;I do not understand the question. While ISE can be a Certificate Authority, it is meant to do that only for BYOD. it is not meant to be a general purpose CA. All that is needed for wireless auth with AD credentials (username+password) is for the endpoint to trust the ISE certificate.&lt;/P&gt;
&lt;P&gt;&amp;gt; 3. Is EAP-TLS possible in non-AD joined laptops, users will be logging to SSID using AD credentials&lt;/P&gt;
&lt;P&gt;EAP-TLS has nothing to do with AD unless AD is acting as your CA that provisioned the certificates to the endpoints. EAP-TLS can be used by any endpoint that supports it.&amp;nbsp; You seem to be confusing certificate authentication (EAP-TLS) with other EAP types that support username+password credentials. EAP-TLS is mutual certificate authentication only.&lt;/P&gt;
&lt;P&gt;&amp;gt; 4. Can EAP-TLS done for Azure AD logged in laptops, I saw below link but how to generate user certificates.&lt;/P&gt;
&lt;P&gt;ISE can authenticate any endpoint that supports EAP-TLS. Endpoints do not login to Azure AD like regular AD. Azure AD - now Entra ID - is not Active Directory.&amp;nbsp; You may use Intune to provision certificates to an endpoint for use with ISE.&lt;/P&gt;
&lt;P&gt;I recommend you watch&lt;/P&gt;
&lt;H3 id="ise-integration-with-intune-mdm-2022-08-02" class="maps-to-line note-link-identifier-parent" style="margin-top: 0.6em; margin-bottom: 0.65em; unicode-bidi: plaintext; line-height: 1.5em; font-size: 1.1em; font-weight: bold; outline: none; color: #32373f; font-family: Avenir, Arial, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-source-line="1838"&gt;▷&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="" style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE" href="https://youtu.be/iAKyIHFqbgE" data-from-md="" target="_blank"&gt;ISE Integration with Intune MDM&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;2022-08-02&lt;/H3&gt;
&lt;P class="maps-to-line" style="margin-top: 0.6em; margin-bottom: 1.35em; unicode-bidi: plaintext; color: #32373f; font-family: Avenir, Arial, sans-serif; font-size: 15px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-source-line="1840"&gt;&lt;A class="" style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=0s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=0s" data-from-md="" target="_blank"&gt;00:00&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Intro&lt;BR /&gt;&lt;A class="" style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=143s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=143s" data-from-md="" target="_blank"&gt;02:23&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Traditional Active Directory vs Azure Active Directory&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=306s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=306s" data-from-md="" target="_blank"&gt;05:06&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Azure AD Join Types: Registered, Joined, Hybrid Joined&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=420s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=420s" data-from-md="" target="_blank"&gt;07:00&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Intune MDM Enrollment Options&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=548s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=548s" data-from-md="" target="_blank"&gt;09:08&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Windows Autopilot&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=604s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=604s" data-from-md="" target="_blank"&gt;10:04&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Windows Self-Service Out-of-Box Experience (OOBE)&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=642s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=642s" data-from-md="" target="_blank"&gt;10:42&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Azure AD Join &amp;amp; Enrollment&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=708s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=708s" data-from-md="" target="_blank"&gt;11:48&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Azure AD Connect to sync on-premise AD&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=818s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=818s" data-from-md="" target="_blank"&gt;13:38&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Azure AD Join vs Hybrid Join:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="inline-code" style="border: 1px solid #dcdcdc; background-color: #f3f3f3; padding-right: 0.2em; padding-left: 0.2em; border-radius: 0.25em; color: #000000; font-size: 0.9em;"&gt;dsregcmd /status&lt;/CODE&gt;&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=907s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=907s" data-from-md="" target="_blank"&gt;15:07&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Intune Certiificate Connector&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=956s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=956s" data-from-md="" target="_blank"&gt;15:56&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Windows Domain Join &amp;amp; Enrollment (with AAD and Intune)&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1045s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1045s" data-from-md="" target="_blank"&gt;17:25&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Demo: Tour of Azure AD users and groups, UPNs, devices, registration types, Intune (MEM), compliance, Certificate Connector&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1250s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1250s" data-from-md="" target="_blank"&gt;20:50&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Challenge: Transient MACs (dongle/dock)&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1404s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1404s" data-from-md="" target="_blank"&gt;23:24&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Challenge: Random MACs&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1481s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1481s" data-from-md="" target="_blank"&gt;24:41&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ISE 3.1 MDMv3 API and the Globally Unique Identifier (GUID)&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1570s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1570s" data-from-md="" target="_blank"&gt;26:10&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Compliance Check with GUID&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1625s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1625s" data-from-md="" target="_blank"&gt;27:05&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Cisco Field Notice FN-72472: GUID required with Intune after Dec 31, 2022&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1705s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1705s" data-from-md="" target="_blank"&gt;28:25&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;EAP-TLS Authentication to AD : computer&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;or&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;user) (traditional 802.1X with AD)&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1806s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=1806s" data-from-md="" target="_blank"&gt;30:06&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;TEAP(EAP-TLS) Authentication in ISE 2.7+ for computer+user (EAP-Chaining)&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2013s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2013s" data-from-md="" target="_blank"&gt;33:33&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;EAP-TLS Authentication with Hybrid AD+Azure Compliance&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2084s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2084s" data-from-md="" target="_blank"&gt;34:44&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;EAP-TLS Authentication with Azure Intune Compliance&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2129s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2129s" data-from-md="" target="_blank"&gt;35:29&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;EAP-TTLS+PAP Authentication in ISE 3.0 (no GUID for Intune)&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2191s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2191s" data-from-md="" target="_blank"&gt;36:31&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;EAP-TLS Authentication with Azure AD Authorization with Intune Compliance in ISE 3.2&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2284s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2284s" data-from-md="" target="_blank"&gt;38:04&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Intune Lab Overview&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2312s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2312s" data-from-md="" target="_blank"&gt;38:32&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Example ISE 3.1 Policies for AD, Azure, and Intune&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2412s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2412s" data-from-md="" target="_blank"&gt;40:12&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Example ISE 3.2 Policies for EAP-TLS with AAD&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2442s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2442s" data-from-md="" target="_blank"&gt;40:42&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Demo: Windows 10 TEAP Authentication and Troubleshooting ⚠Be careful with copy &amp;amp; paste errors due to trailing spaces in Intune policy!&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2973s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=2973s" data-from-md="" target="_blank"&gt;49:33&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Demo: MAC Randomization with Surface tablet &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt; The live demo failed with a non-compliant status but after the webinar Greg rebooted his surface tablet and it worked perfectly. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=3219s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=3219s" data-from-md="" target="_blank"&gt;53:39&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Troubleshooting with ISE&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="inline-code" style="border: 1px solid #dcdcdc; background-color: #f3f3f3; padding-right: 0.2em; padding-left: 0.2em; border-radius: 0.25em; color: #000000; font-size: 0.9em;"&gt;external-mdm&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Log&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=3273s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=3273s" data-from-md="" target="_blank"&gt;54:33&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Device Enrollment Status with Intune:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="inline-code" style="border: 1px solid #dcdcdc; background-color: #f3f3f3; padding-right: 0.2em; padding-left: 0.2em; border-radius: 0.25em; color: #000000; font-size: 0.9em;"&gt;dsregcmd /status&lt;/CODE&gt;&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/iAKyIHFqbgE&amp;amp;t=3300s" href="https://youtu.be/iAKyIHFqbgE&amp;amp;t=3300s" data-from-md="" target="_blank"&gt;55:00&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;References: - Integrate MDM and UEM Servers with Cisco ISE&lt;/P&gt;
&lt;UL style="margin-top: 0.6em; margin-bottom: 0.65em; unicode-bidi: plaintext; padding-left: 0px; margin-left: 1.7em; color: #32373f; font-family: Avenir, Arial, sans-serif; font-size: 15px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"&gt;
&lt;LI class="maps-to-line" style="margin-bottom: 0.4em;" data-source-line="1871"&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html" href="https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE/chapter.html" data-from-md="" target="_blank"&gt;Integrate MDM and UEM Servers with Cisco ISE&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="maps-to-line" style="margin-bottom: 0.4em;" data-source-line="1872"&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://www.youtube.com/hashtag/intunenugget" href="https://www.youtube.com/hashtag/intunenugget" data-from-md="" target="_blank"&gt;YouTube – Intune Nuggets&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="maps-to-line" style="margin-bottom: 0.4em;" data-source-line="1873"&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://docs.microsoft.com/en-us/azure/active-directory/devices/" href="https://docs.microsoft.com/en-us/azure/active-directory/devices/" data-from-md="" target="_blank"&gt;Azure AD device identity documentation&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="maps-to-line" style="margin-bottom: 0.4em;" data-source-line="1874"&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-azure-ad-connect" href="https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-azure-ad-connect" data-from-md="" target="_blank"&gt;What is Azure AD Connect?&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="maps-to-line" style="margin-bottom: 0.4em;" data-source-line="1875"&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://docs.microsoft.com/en-us/mem/intune/protect/certificate-connector-overview" href="https://docs.microsoft.com/en-us/mem/intune/protect/certificate-connector-overview" data-from-md="" target="_blank"&gt;Certificate Connector for MS Intune&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2024 08:07:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5015801#M587242</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-02-10T08:07:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE EAP-TLS wireless queries</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5015840#M587245</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;for the inline answers.&lt;/P&gt;
&lt;P&gt;Are there any documentations for - Authenticating Laptops to Wifi using EAP-TLS, credentials will be AD credentials and certificate PKi other than AD certificate server. AD certificate server not available&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2024 09:38:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5015840#M587245</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2024-02-10T09:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE EAP-TLS wireless queries</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5016265#M587259</link>
      <description>&lt;P&gt;There are various PKI solutions available, so you would need to identify what PKI solution you intend to use and check the vendor documentation for certificate enrolment options.&lt;/P&gt;
&lt;P&gt;ISE is not involved in the certificate enrolment of the endpoint (unless you're talking about the BYOD use case using the ISE Internal CA). For corporate-owned endpoints, the PKI solution would be responsible for enrolling the device and/or user certificate (and trust chain) on the endpoint. As long as the endpoint trusts the server (ISE EAP) certificate and the server trusts the device/user certificate presented, EAP-TLS should work.&lt;/P&gt;
&lt;P&gt;If you want to leverage certificate enrolment via Intune (as discussed in my blog) without the use of ADCS, you might check out the &lt;A href="https://www.scepman.com/" target="_blank" rel="noopener"&gt;SCEPman&lt;/A&gt; cloud-based PKI. Microsoft has also recently released their Cloud PKI option, but there is limited documentation and I've see a lot of complaints about how expensive the licensing is.&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2024 21:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5016265#M587259</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-02-11T21:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE EAP-TLS wireless queries</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5192029#M591712</link>
      <description>&lt;P&gt;Hello Greg,&lt;/P&gt;
&lt;P&gt;can you please provides the details on what configuration/steps would be required on ISE to use SCEPMan CA to authenticate user via ISE.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2024 10:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5192029#M591712</guid>
      <dc:creator>HarshP</dc:creator>
      <dc:date>2024-09-09T10:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE EAP-TLS wireless queries</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5192297#M591726</link>
      <description>&lt;P&gt;From the ISE perspective, SCEPman would be no different than using any other CA.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975-configure-eap-tls-authentication-with-is.html#toc-hId-226156566" target="_blank" rel="noopener"&gt;Configure EAP-TLS Authentication with ISE&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2024 22:24:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5192297#M591726</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-09-09T22:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE EAP-TLS wireless queries</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5192539#M591750</link>
      <description>&lt;P&gt;Our On-prem CA EAP-TLS is already working.&lt;/P&gt;
&lt;P&gt;Now they are moving CA service to cloud SCEPMan, challenge here is SCEPMan team is saying there is no need to have ISE CSR signed by SCEPMan. where as for onprem CA we had ISE CSR signed by CA to form trust between client - ISE - CA for EAP-TLS.&lt;/P&gt;
&lt;P&gt;Can you help in understanding how EAP-TLS will work if ISE EAP certificate is not signed by SCEPMan. ?&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 10:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-eap-tls-wireless-queries/m-p/5192539#M591750</guid>
      <dc:creator>HarshP</dc:creator>
      <dc:date>2024-09-10T10:22:30Z</dc:date>
    </item>
  </channel>
</rss>

