<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wrong authorization profile due to bad identification in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218648#M592917</link>
    <description>&lt;P&gt;Thanks. I would try to do these two things, first, I would remove the internal endpoints from "AD1_Internal_copy" identity sequence, second, I would add the identity sequence to the certificate profile. If you are using this identity sequence in other authentication rules and you don't want to change it because of that, then you can clone it and apply the changes only on the interested authentication rule.&lt;/P&gt;</description>
    <pubDate>Fri, 01 Nov 2024 15:25:07 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2024-11-01T15:25:07Z</dc:date>
    <item>
      <title>Wrong authorization profile due to bad identification</title>
      <link>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5216158#M592718</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Curios to know if anyone else had this issue. Computers are configured to authenticate using machine cert. Identity configured in&lt;/P&gt;&lt;DIV class=""&gt;"Certificate Authentication Profile" set to SAN. I have ISE joined to two domains and I'm using Identity source sequence. For some reason, some computers from domain1 get authorization profile for domain2. Looking at the logs I see that ISE has different info for SAN &amp;amp; AD-Host-Resolved-Identities.&lt;/DIV&gt;</description>
      <pubDate>Mon, 28 Oct 2024 12:54:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5216158#M592718</guid>
      <dc:creator>CorpNetwork</dc:creator>
      <dc:date>2024-10-28T12:54:29Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong authorization profile due to bad identification</title>
      <link>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5217424#M592834</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; Authentication and authorization are separate policies from ISE perspective; as I understand, your challenge to fix is that computers from AD1 match authorization profile of AD2; to fix it, you just need smarter condition within your authorization, based on AD groups &amp;amp; domain or SAN values.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 13:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5217424#M592834</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2024-10-30T13:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong authorization profile due to bad identification</title>
      <link>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218239#M592894</link>
      <description>&lt;P&gt;Keep in mind it is going to work top down.&amp;nbsp; If ISE finds a reference in the 1st domain it will try to authenticate it.&amp;nbsp; Does any type of trust exist between the 2 domains.&amp;nbsp; ISE deployments can support multiple certificate chains and profiles but each node can only support a single cert for EAP.&amp;nbsp; Are the devices from both domains using the same Network Access Devices?&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 17:24:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218239#M592894</guid>
      <dc:creator>wsteele@conres.com</dc:creator>
      <dc:date>2024-10-31T17:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong authorization profile due to bad identification</title>
      <link>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218451#M592896</link>
      <description>&lt;P&gt;Thank you for your reply. There is no trust between domains (had but got removed). ISE is joined to both domains. Clients are using the same NAD. I don't experience this with all clients. Based on the attached logs (pictures) you can see ISE is "confused" on what device is connected to that port&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 08:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218451#M592896</guid>
      <dc:creator>CorpNetwork</dc:creator>
      <dc:date>2024-11-01T08:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong authorization profile due to bad identification</title>
      <link>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218454#M592898</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295226"&gt;@Cristian Matei&lt;/a&gt; Look at picture ISE2.png attached to the initial post and tell me what you understand from it. Why is the "resolving identity W11-5006650 from AD1 when the actual machine is called WH5011879 (member of the other domain).&lt;/P&gt;&lt;P&gt;Multumesc &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 08:20:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218454#M592898</guid>
      <dc:creator>CorpNetwork</dc:creator>
      <dc:date>2024-11-01T08:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong authorization profile due to bad identification</title>
      <link>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218475#M592900</link>
      <description>&lt;P&gt;Please share your sanitized authentication and authorization policies for review. The issue could be caused by some loose conditions on the policies and also it would depend on the attributes parsed from the endpoints certificates.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 09:29:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218475#M592900</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-11-01T09:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong authorization profile due to bad identification</title>
      <link>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218578#M592909</link>
      <description>&lt;P&gt;Hi Aref.&amp;nbsp;&lt;/P&gt;&lt;P&gt;See attached files&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 13:10:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218578#M592909</guid>
      <dc:creator>CorpNetwork</dc:creator>
      <dc:date>2024-11-01T13:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong authorization profile due to bad identification</title>
      <link>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218648#M592917</link>
      <description>&lt;P&gt;Thanks. I would try to do these two things, first, I would remove the internal endpoints from "AD1_Internal_copy" identity sequence, second, I would add the identity sequence to the certificate profile. If you are using this identity sequence in other authentication rules and you don't want to change it because of that, then you can clone it and apply the changes only on the interested authentication rule.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 15:25:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5218648#M592917</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-11-01T15:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong authorization profile due to bad identification</title>
      <link>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5281908#M595977</link>
      <description>&lt;P&gt;Hello. Short update &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; We encountered this problem again while moving from PEAP to EAP-TLS. Long story short, I believe this was caused by MAR- setup with the maximum 1 year cache.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 10:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wrong-authorization-profile-due-to-bad-identification/m-p/5281908#M595977</guid>
      <dc:creator>CorpNetwork</dc:creator>
      <dc:date>2025-04-16T10:12:42Z</dc:date>
    </item>
  </channel>
</rss>

