<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Integration with Intune MDM in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-intune-mdm/m-p/5230125#M593420</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1573054"&gt;@ndahemmy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Q1- not sure about the PSK but certificate is always the best option.&lt;/P&gt;
&lt;P&gt;And you can define how long a certificate last. Althouth the good practice is not too long period&lt;/P&gt;
&lt;P&gt;Q2- These are the supported MDM on cisco doc&lt;/P&gt;
&lt;H2 id="ariaid-title3" class="title topictitle2"&gt;Supported Unified Endpoint Management and Mobile Device Management Servers&lt;/H2&gt;
&lt;SECTION class="body conbody"&gt;
&lt;P class="p B1_Body1-F9CE5028"&gt;Supported MDM servers include products from the following vendors:&lt;/P&gt;
&lt;UL id="id_24382__ul_efw_q3d_wv" class="ul"&gt;
&lt;LI id="id_24382__li_05641B995CF1415284BF08FA78A32955" class="li"&gt;
&lt;P class="p"&gt;Absolute&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Blackberry - BES&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Blackberry - Good Secure EMM&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="id_24382__li_6290FA0FCEBE4CD88FCC18D8122C30E6" class="li"&gt;
&lt;P class="p"&gt;Cisco Meraki Systems Manager&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Citrix XenMobile 10.x (On-prem)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="id_24382__li_13938E8E3A7D42CE983BEF115F09C8B3" class="li"&gt;
&lt;P class="p"&gt;Globo&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;IBM MaaS360&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="id_24382__li_57EF46BC58FB4BC98BE5A4080D1209DD" class="li"&gt;
&lt;P class="p"&gt;Ivanti (previously MobileIron UEM), core and cloud UEM services&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/SECTION&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Nov 2024 14:43:19 GMT</pubDate>
    <dc:creator>Flavio Miranda</dc:creator>
    <dc:date>2024-11-28T14:43:19Z</dc:date>
    <item>
      <title>ISE Integration with Intune MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-intune-mdm/m-p/5230105#M593412</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We intend to integrate ISE with with Microsoft Intune MDM. all of documentation i have seen, You have to register ISE as an application in Azure AD and use certificates for authentication. I have two questions in my mind if anyone has an answer kindly share.&lt;/P&gt;&lt;P&gt;Q1. Is it possibkle to use shared key or password instead of certificates ? thinking certificates expires am trying to think other alternatives.&lt;/P&gt;&lt;P&gt;Q2. Is it possible to integrate ISE in Intune itself instead of creating ISE as an application in Azure AD then the app use API to talk with ISE ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 13:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-intune-mdm/m-p/5230105#M593412</guid>
      <dc:creator>ndahemmy</dc:creator>
      <dc:date>2024-11-28T13:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Integration with Intune MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-intune-mdm/m-p/5230125#M593420</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1573054"&gt;@ndahemmy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Q1- not sure about the PSK but certificate is always the best option.&lt;/P&gt;
&lt;P&gt;And you can define how long a certificate last. Althouth the good practice is not too long period&lt;/P&gt;
&lt;P&gt;Q2- These are the supported MDM on cisco doc&lt;/P&gt;
&lt;H2 id="ariaid-title3" class="title topictitle2"&gt;Supported Unified Endpoint Management and Mobile Device Management Servers&lt;/H2&gt;
&lt;SECTION class="body conbody"&gt;
&lt;P class="p B1_Body1-F9CE5028"&gt;Supported MDM servers include products from the following vendors:&lt;/P&gt;
&lt;UL id="id_24382__ul_efw_q3d_wv" class="ul"&gt;
&lt;LI id="id_24382__li_05641B995CF1415284BF08FA78A32955" class="li"&gt;
&lt;P class="p"&gt;Absolute&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Blackberry - BES&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Blackberry - Good Secure EMM&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="id_24382__li_6290FA0FCEBE4CD88FCC18D8122C30E6" class="li"&gt;
&lt;P class="p"&gt;Cisco Meraki Systems Manager&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Citrix XenMobile 10.x (On-prem)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="id_24382__li_13938E8E3A7D42CE983BEF115F09C8B3" class="li"&gt;
&lt;P class="p"&gt;Globo&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;IBM MaaS360&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="id_24382__li_57EF46BC58FB4BC98BE5A4080D1209DD" class="li"&gt;
&lt;P class="p"&gt;Ivanti (previously MobileIron UEM), core and cloud UEM services&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/SECTION&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 14:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-intune-mdm/m-p/5230125#M593420</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2024-11-28T14:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Integration with Intune MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-intune-mdm/m-p/5230219#M593433</link>
      <description>&lt;P&gt;You didn't include Intune in supported MDM though it is supported as per below document&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE.pdf" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/UEM-MDM-Server-Integration/b_MDM_UEM_Servers_CiscoISE.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 19:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-intune-mdm/m-p/5230219#M593433</guid>
      <dc:creator>ndahemmy</dc:creator>
      <dc:date>2024-11-28T19:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Integration with Intune MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-intune-mdm/m-p/5230221#M593434</link>
      <description>&lt;P&gt;Sorry. Probably is the doc version.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;• Cisco Meraki Systems Manager&lt;BR /&gt;• Ivanti (previously MobileIron UEM) core and cloud UEM services&lt;BR /&gt;• Microsoft Endpoint Manager Intune&lt;BR /&gt;• JAMF Casper Suite&lt;BR /&gt;• VMware Workspace ONE (previously AirWatch)&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 19:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-intune-mdm/m-p/5230221#M593434</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2024-11-28T19:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Integration with Intune MDM</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-integration-with-intune-mdm/m-p/5230245#M593440</link>
      <description>&lt;P&gt;A1. No. If you want to use the GUID method, it requires using a certificate with the properly formatted GUID string. The other option is using the MAC address for performing the registration/compliance lookup against Intune, but that has other issues (docks, dongles, randomized MAC Addresses, etc).&lt;/P&gt;
&lt;P&gt;A2. Entra ID is the identity store behind Intune and they are tightly coupled. Creating the App Registration in Entra ID provides the Service Principal that is needed to interact with Intune. This is how is works on the MS side and is not specific to ISE.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 21:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-integration-with-intune-mdm/m-p/5230245#M593440</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-11-28T21:17:30Z</dc:date>
    </item>
  </channel>
</rss>

