<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5232163#M593561</link>
    <description>&lt;P&gt;Yes, the MDM integration features require the Premier licensing. See the ISE Licensing Guide for more information.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/ise-licensing-guide-og.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/ise-licensing-guide-og.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The Intune Certificate Connector provides integration with your PKI, not with another MDM (Jamf Pro, in this case).&lt;/P&gt;
&lt;P&gt;This conversation has strayed far past the original topic of discussion. For any new queries, please submit a new question on the Community.&lt;/P&gt;</description>
    <pubDate>Tue, 03 Dec 2024 21:59:36 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2024-12-03T21:59:36Z</dc:date>
    <item>
      <title>ISE 3.2 Azure AD - Intune authentication/authorization certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/4964762#M585358</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;By reading many times this article would like to clarify the following on a Cloud only environment (Azure AD and Intune, NO ADCS and NO traditional AD):&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-azure-ad-and-intune/tac-p/4964737#toc-hId--1958732351" target="_blank" rel="noopener"&gt;Cisco ISE with Microsoft Active Directory, Azure AD, and Intune - Page 2 - Cisco Community&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Authentication Questions:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;1. For dot1x authentication with Entra ID (Azure AD) &lt;STRONG&gt;using REST&lt;/STRONG&gt;, only user authentication is possible, and not computer authentication? There is no need for a certificate as only the user credentials (Azure AD credentials) are needed every time the user is connected to the network? So No need to deploy/push a certificate for authentication to succeed?&lt;/P&gt;
&lt;P&gt;2. For dot1x authentication with Entra ID (Azure AD) &lt;STRONG&gt;using EAP-TLS, &lt;/STRONG&gt;do we need to deploy a certificate for the user? and a separate certificate for the device? If we don't have ADCS, is there any method to deploy the user and device certificate? I see a device certificate is automatically sent by Intune to the registered devices (device cert signed by “&lt;SPAN&gt;Microsoft Intune MDM Device CA”), but what about a user certificate?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. Can the Intune deployed certificate&amp;nbsp; signed by “Microsoft Intune MDM Device CA” be used for authentication? I see it is only referenced in the authorization part on the document, but not for authentication. And as I believe is a device certificate it can be used only for device authentication but not user authentication?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Authorization&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Finally for authorization, will be just ISE query to intune if the device is compliant or not, and for that is it correct that it will use the device certificate (the one that&amp;nbsp;is automatically sent by Intune to the registered devices, device cert signed by “Microsoft Intune MDM Device CA”) ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So for authentication and authorization it uses the same certificate? or uses different certificates? user certificate for authentication? and device certificate for authorization?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 02:16:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/4964762#M585358</guid>
      <dc:creator>Carlos T</dc:creator>
      <dc:date>2023-11-23T02:16:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/4964774#M585361</link>
      <description>&lt;P&gt;&lt;EM&gt;1. For dot1x authentication with Entra ID (Azure AD)&amp;nbsp;&lt;STRONG&gt;using REST&lt;/STRONG&gt;, only user authentication is possible, and not computer authentication? There is no need for a certificate as only the user credentials (Azure AD credentials) are needed every time the user is connected to the network? So No need to deploy/push a certificate for authentication to succeed?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;As discussed in the referenced document, there is no way to authenticate a 'Device' against Entra ID.&lt;BR /&gt;For the EAP-TTLS(PAP) use case, no certificate is required. It requires ROPC configured as per the&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html" target="_blank" rel="noopener"&gt;Configure ISE 3.0 REST ID with Azure Active Directory&lt;/A&gt;&amp;nbsp;guide. This use case is also limited to max 50 authentications per second as per the &lt;A href="https://cs.co/ise-scale" target="_blank" rel="noopener"&gt;Performance and Scalability Guide for Cisco ISE&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;As there is no way for ISE to learn the GUID, it is not possible to use Intune compliance as an authorization condition for this use case.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;2. For dot1x authentication with Entra ID (Azure AD)&amp;nbsp;&lt;STRONG&gt;using EAP-TLS,&amp;nbsp;&lt;/STRONG&gt;do we need to deploy a certificate for the user? and a separate certificate for the device? If we don't have ADCS, is there any method to deploy the user and device certificate? I see a device certificate is automatically sent by Intune to the registered devices (device cert signed by “Microsoft Intune MDM Device CA”), but what about a user certificate?&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Yes, you must have a user certificate for EAP-TLS You would need a PKI solution that is capable of integrating with Intune to enrol a computer and/or user certificate on behalf of the endpoint. The certificate must also have the GUID inserted for ISE to perform a compliance check against Intune.&lt;/P&gt;
&lt;P&gt;Intune does not enrol a User certificate that is suitable for dot1x User authentication or Intune compliance check by ISE.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;3. Can the Intune deployed certificate&amp;nbsp; signed by “Microsoft Intune MDM Device CA” be used for authentication? I see it is only referenced in the authorization part on the document, but not for authentication. And as I believe is a device certificate it can be used only for device authentication but not user authentication?&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This question was answered in this duplicate post -&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/td-p/4964739" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/network-access-control/ise-3-2-dot1x-authentication-with-intune-issued-certificates/td-p/4964739&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The referenced document discusses how Windows presents the Computer cert in the Computer state and the User cert in the User state. ISE performs authorization based on the certificate values presented by the client in the relevant state.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 02:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/4964774#M585361</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-11-23T02:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5110311#M589495</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I also have the same question about the user certificate of Azure Entra ID users. According to this configuration guide &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/218197-configure-ise-3-2-eap-tls-with-azure-act.html" target="_self"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/218197-configure-ise-3-2-eap-tls-with-azure-act.html&lt;/A&gt;&amp;nbsp;I tried with ISE3.2 patch 5. But authentication was not successful.&lt;STRONG&gt; Authentication using EAP-TLS process how that user certificate deploys for each user ?&amp;nbsp; Do we have to deploy user certificate for each user&lt;/STRONG&gt;, or it automatically done from cisco ISE.?&lt;BR /&gt;User certificate:&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screenshot (244).png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218673i3E6B8420B5A5653E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot (244).png" alt="Screenshot (244).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 May 2024 14:33:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5110311#M589495</guid>
      <dc:creator>carrols1</dc:creator>
      <dc:date>2024-05-19T14:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5111507#M589511</link>
      <description>&lt;P&gt;I'm not sure I understand the question. You mention that &lt;STRONG&gt;Authentication&lt;/STRONG&gt; was not successful, but you only shared a screenshot of your &lt;STRONG&gt;Authorization&lt;/STRONG&gt; policy. What is the exact problem, what does the relevant policy look like, and what are you seeing the detailed logs?&lt;/P&gt;
&lt;P&gt;As stated in the documents, ISE authentication is only performed based on a valid and trusted certificate. With EAP-TLS, ISE needs to trust the client certificate, and the client needs to trust the ISE EAP certificate so you need to ensure both the client and ISE have the necessary Root/Intermediate CA certificates in their relevant trust stores.&lt;/P&gt;
&lt;P&gt;The certificate enrolment on the client is done by Intune. Each user should have a unique certificate and ISE is not involved in the enrolment process.&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 22:36:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5111507#M589511</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-05-20T22:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5231276#M593506</link>
      <description>&lt;P&gt;I have two questions:&lt;/P&gt;&lt;P&gt;1. If I use on-prem PKI will that have to be called from Intune as certificate connector?&lt;/P&gt;&lt;P&gt;2. Can I still continue without PxGrid on ISE if I want to use on-prem PKI for NAC via azure ise?&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2024 10:47:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5231276#M593506</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2024-12-02T10:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5231647#M593523</link>
      <description>&lt;P&gt;1. If you intend to use the MDM integration for ISE to check compliance against Intune, then Intune must be integrated with your PKI so the GUID can be inserted in the certificate.&lt;/P&gt;
&lt;P&gt;2. pxGrid has no specific relation to either the PKI or authorization against Entra ID&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2024 22:48:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5231647#M593523</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-12-02T22:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5231969#M593550</link>
      <description>&lt;P&gt;1. Is that possible without ISE premier license? I thought for compliance check we need ISE premier? I have essentials license, do I need to upgrade to advantage or premier?&amp;nbsp;&lt;/P&gt;&lt;P&gt;and if the certificate connector in Intune integrates with Jamf Pro (to support mac-os) in above scenario?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2024 15:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5231969#M593550</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2024-12-03T15:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5232163#M593561</link>
      <description>&lt;P&gt;Yes, the MDM integration features require the Premier licensing. See the ISE Licensing Guide for more information.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/ise-licensing-guide-og.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/ise-licensing-guide-og.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The Intune Certificate Connector provides integration with your PKI, not with another MDM (Jamf Pro, in this case).&lt;/P&gt;
&lt;P&gt;This conversation has strayed far past the original topic of discussion. For any new queries, please submit a new question on the Community.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2024 21:59:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5232163#M593561</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-12-03T21:59:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5317198#M597623</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying to determine the best way to implement&amp;nbsp;802.1X with EAP-TLS&amp;nbsp;on&amp;nbsp;ISE 3.3 patch 7, specifically for both&amp;nbsp;machine and user authentication&amp;nbsp;on devices &amp;amp; users that are&amp;nbsp;joined to Entra ID — similar to how it works with traditional on-prem AD-joined computers and users.&lt;/P&gt;
&lt;P&gt;Would the section titled&amp;nbsp;"Entra Joined Device and Entra User with TEAP (EAP-TLS) and EAP Chaining"&amp;nbsp;in your original thread be the most appropriate approach to mirror the old setup?&lt;/P&gt;
&lt;P&gt;From what I understand (please correct me if I'm wrong),&amp;nbsp;true machine authentication—as it was done with AD computer accounts—is&amp;nbsp;not directly possible&amp;nbsp;with Entra ID.&lt;BR /&gt;&lt;BR /&gt;Thank you in advance.&lt;BR /&gt;Mile.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 13:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5317198#M597623</guid>
      <dc:creator>migkniatovits</dc:creator>
      <dc:date>2025-08-04T13:20:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5317386#M597638</link>
      <description>&lt;P&gt;Yes, that scenario would likely fit your use case.&lt;/P&gt;
&lt;P&gt;As discussed in that blog, neither authentication of the device nor user are possible against Entra ID when using EAP-TLS.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 05:24:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5317386#M597638</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-08-05T05:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5317408#M597640</link>
      <description>&lt;P&gt;Hi Greg,&lt;/P&gt;
&lt;P&gt;Thank you for your prompt response.&lt;/P&gt;
&lt;P&gt;Would you recommend a different approach in this case?&lt;BR /&gt;Have you encountered a similar scenario where a customer had implemented both machine and user authentication for on-premises Active Directory, and later aimed to migrate their users to Entra ID?&lt;/P&gt;
&lt;P&gt;Looking forward to your insights.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 06:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5317408#M597640</guid>
      <dc:creator>migkniatovits</dc:creator>
      <dc:date>2025-08-05T06:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 Azure AD - Intune authentication/authorization certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5317891#M597665</link>
      <description>&lt;P&gt;That would be the closest possible option with the current capabilities.&lt;/P&gt;
&lt;P&gt;There is a feature enhancement coming in ISE 3.5 that will allow you to perform Authorization of the Entra Joined device based on group/attribute as well (similar to the EAP-TLS User Authorization flow). This may also be available after that via a patch in 3.4.&lt;/P&gt;
&lt;P&gt;The simple fact of the matter is that Entra ID is not AD in the cloud, so 'like-for-like' will have it's limitations.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 23:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-azure-ad-intune-authentication-authorization/m-p/5317891#M597665</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-08-05T23:34:54Z</dc:date>
    </item>
  </channel>
</rss>

