<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE and MacOS + Linux in Windows AD/CA environment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205449#M592298</link>
    <description>&lt;P&gt;I have not done this myself, but I have been interested in reading about using the TPM (Trusted Platform Module) as a source of the private key - &lt;A href="https://kevinsaye.wordpress.com/2021/07/22/iot-edge-1-2-storing-the-x509-private-key-in-the-tpm/" target="_self"&gt;there are libraries (for &lt;SPAN&gt;TPM2-pkcs11 under&amp;nbsp;&lt;/SPAN&gt;Linux)&lt;/A&gt; that seem to make this possible. Now you have proof of possession, since the TPM cannot be removed from the device itself. Might require some inhouse development though.&lt;/P&gt;</description>
    <pubDate>Tue, 08 Oct 2024 22:33:41 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-10-08T22:33:41Z</dc:date>
    <item>
      <title>ISE and MacOS + Linux in Windows AD/CA environment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205407#M592294</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;trying to find solution how to solve 802.1X with ISE 3.4 using certificates within MacOS and Linux machines in Windows AD environment with Windows Server 2022 CA. We currently deploying ISE for Windows machines, where everything is so easy with autoenroll and autorenew for machine and user. We using TEAP to have either device and user authenticated as we plan to do per-user-group VLAN mapping, as i.e. software engineers will need more access than i.e. support engineers to some services.&lt;/P&gt;
&lt;P&gt;What solution did you choose for generating/enrolling/auto-enrolling device/user certificates for MacOS devices? We have Office 365 with Intune, hybrid with on-prem AD and on-prem Windows CA, so Intune could be used, just do not know how. Macs are registered within Intune through Apple Business Manager.&lt;/P&gt;
&lt;P&gt;How did you solved Linux machines?&lt;/P&gt;
&lt;P&gt;We could generate certificates manually for those devices (and probably we will need for Linux), but I would like to have automated solution or solution where I can generate certificates for devices, at least for MacOS, which are not possible to export with private key (I know this could be problem in Linux, but this is minority here) to avoid exporting certificates and using on not-approved devices by company.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2024 20:33:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205407#M592294</guid>
      <dc:creator>Tibor M</dc:creator>
      <dc:date>2024-10-08T20:33:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and MacOS + Linux in Windows AD/CA environment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205449#M592298</link>
      <description>&lt;P&gt;I have not done this myself, but I have been interested in reading about using the TPM (Trusted Platform Module) as a source of the private key - &lt;A href="https://kevinsaye.wordpress.com/2021/07/22/iot-edge-1-2-storing-the-x509-private-key-in-the-tpm/" target="_self"&gt;there are libraries (for &lt;SPAN&gt;TPM2-pkcs11 under&amp;nbsp;&lt;/SPAN&gt;Linux)&lt;/A&gt; that seem to make this possible. Now you have proof of possession, since the TPM cannot be removed from the device itself. Might require some inhouse development though.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2024 22:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205449#M592298</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-08T22:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and MacOS + Linux in Windows AD/CA environment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205570#M592305</link>
      <description>&lt;P&gt;We are using JamF MDM for MacOS'es but there is no way to integrate them into AD. We are using EAP-TLS with user certificate for authentication, and authorization is based on User to AD Group mapping.&lt;/P&gt;
&lt;P&gt;For Linux we are not using them in our network but there are some guides if you search in Google (&lt;A href="https://www.redhat.com/sysadmin/linux-active-directory" target="_blank"&gt;https://www.redhat.com/sysadmin/linux-active-directory&lt;/A&gt;)&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 06:49:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205570#M592305</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2024-10-09T06:49:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and MacOS + Linux in Windows AD/CA environment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205580#M592306</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324840"&gt;@JPavonM&lt;/a&gt;&amp;nbsp;and how you generating user certificates? manually for each user i.e. on employment start day and distributing using JAMF? (everything what JAMF is able to do, Intune should be too, as it using same Apple API) What about renewals?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 08:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205580#M592306</guid>
      <dc:creator>Tibor M</dc:creator>
      <dc:date>2024-10-09T08:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and MacOS + Linux in Windows AD/CA environment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205594#M592309</link>
      <description>&lt;P&gt;The user certificates are geenrated in the on-premises AD (or Entra ID) and distributed from JamF.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.jamf.com/en-US/bundle/technical-paper-8021x-current/page/Overview_of_8021x.html" target="_blank"&gt;https://learn.jamf.com/en-US/bundle/technical-paper-8021x-current/page/Overview_of_8021x.html&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://travellingtechguy.blog/jamf-adcs-connector/" target="_blank"&gt;https://travellingtechguy.blog/jamf-adcs-connector/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://www.youtube.com/watch?v=oRkpkN1Z3aI" target="_blank"&gt;https://www.youtube.com/watch?v=oRkpkN1Z3aI&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;And this guide to integrate JamF with InTune:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.jamf.com/en-US/bundle/technical-paper-scep-proxy-current/page/Enabling_as_SCEP_Proxy_for_Configuration_Profiles.html" target="_blank"&gt;https://learn.jamf.com/en-US/bundle/technical-paper-scep-proxy-current/page/Enabling_as_SCEP_Proxy_for_Configuration_Profiles.html&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://macnotes.wordpress.com/2020/11/11/configuring-azure-web-application-proxy-for-jamf-pro-scep-certificates/" target="_blank"&gt;https://macnotes.wordpress.com/2020/11/11/configuring-azure-web-application-proxy-for-jamf-pro-scep-certificates/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 08:03:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205594#M592309</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2024-10-09T08:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and MacOS + Linux in Windows AD/CA environment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205740#M592321</link>
      <description>&lt;P&gt;See the ISE BERG (Big Encyclopedic Resources Guide) @ &lt;A href="https://cs.co/ise-berg" target="_blank"&gt;https://cs.co/ise-berg&lt;/A&gt; :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cs.co/ise-berg#apple" target="_blank"&gt;https://cs.co/ise-berg#apple&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cs.co/ise-berg#linux" target="_blank"&gt;https://cs.co/ise-berg#linux&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 12:34:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5205740#M592321</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-10-09T12:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and MacOS + Linux in Windows AD/CA environment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5206292#M592349</link>
      <description>&lt;P&gt;thanks all. I little bit hoped that somebody comes with real example how to configure Intune to use on-prem CA and push those certs to apple. now it looks like nobody using macs in enterprise (and if I can, I throw them from a window on 7th floor immediately, its just complicating everything for us).&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 07:08:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5206292#M592349</guid>
      <dc:creator>Tibor M</dc:creator>
      <dc:date>2024-10-10T07:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and MacOS + Linux in Windows AD/CA environment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5206762#M592379</link>
      <description>&lt;P&gt;Intune is fully capable of deploying SCEP profiles for MacOS devices, so this could be done using your on-prem CA as long as it support SCEP/NDES. Cisco ISE has no interaction in this process.&lt;/P&gt;
&lt;P&gt;If you're looking for information on how to setup the SCEP profiles, see the following links.&amp;nbsp;If you need more support around this, you would need to seek that from Microsoft.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/mem/intune/protect/certificates-profile-scep" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/mem/intune/protect/certificates-profile-scep&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="V5XKdd" role="heading" aria-level="3"&gt;
&lt;DIV class="ZtihLe"&gt;
&lt;DIV class="OwbDmd"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="OwbDmd"&gt;&lt;A href="https://www.youtube.com/watch?v=EUtMOoqEyHo" target="_blank" rel="noopener"&gt;https://www.youtube.com/watch?v=EUtMOoqEyHo&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV class="OwbDmd"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 21:20:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-macos-linux-in-windows-ad-ca-environment/m-p/5206762#M592379</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-10-10T21:20:17Z</dc:date>
    </item>
  </channel>
</rss>

