<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE and MS AD Domain User Authentciation in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-ms-ad-domain-user-authentciation/m-p/5273914#M595581</link>
    <description>&lt;P&gt;Take a look at your policies and the live logs to see what policy its hitting.&amp;nbsp; That way you can at least determine if you are hitting the right policy or not. That will give you information in which you might need to modify an existing rule or possibly re-order your policy.&lt;BR /&gt;You can also test the user account with a password or just doing a lookup to verify that ISE can query the username correctly. I don't know where you are at with your testing.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Mar 2025 14:06:20 GMT</pubDate>
    <dc:creator>Scott Fella</dc:creator>
    <dc:date>2025-03-21T14:06:20Z</dc:date>
    <item>
      <title>Cisco ISE and MS AD Domain User Authentciation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-ms-ad-domain-user-authentciation/m-p/5273805#M595570</link>
      <description>&lt;P&gt;Hello Guys,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Being new to cisco ISE am trying to authenticate windows PC using DOT1X with following test cases:-&lt;/P&gt;
&lt;P&gt;01. By using local PC Windows11 login credentials and ISE Internal users am able to authenticate. Everything is okay&lt;/P&gt;
&lt;P&gt;01. By using local PC Windows11 login credentials and ISE MS AD User am able to authenticate. Everything is okay&lt;/P&gt;
&lt;P&gt;03. but am not able to authenticate user after login to PC with Windows domain users . How can i do it . Is there any reference to implement this test case.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Uni&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 08:31:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-ms-ad-domain-user-authentciation/m-p/5273805#M595570</guid>
      <dc:creator>uni1389</dc:creator>
      <dc:date>2025-03-21T08:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MS AD Domain User Authentciation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-ms-ad-domain-user-authentciation/m-p/5273832#M595574</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - &lt;FONT color="#FF6600"&gt;For &lt;STRONG&gt;03&lt;/STRONG&gt;&lt;/FONT&gt; : Check the ISE&lt;STRONG&gt; live logs&lt;/STRONG&gt; when trying&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Have a look at&amp;nbsp;&lt;A href="https://www.mixednetworks.com/cisco-ise/cisco-ise-join-active-directory/" target="_blank"&gt;https://www.mixednetworks.com/cisco-ise/cisco-ise-join-active-directory/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; M.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 09:49:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-ms-ad-domain-user-authentciation/m-p/5273832#M595574</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2025-03-21T09:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MS AD Domain User Authentciation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-ms-ad-domain-user-authentciation/m-p/5273899#M595580</link>
      <description>&lt;P&gt;Thanks this part has been done , but still not able to authenticate domain users.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 13:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-ms-ad-domain-user-authentciation/m-p/5273899#M595580</guid>
      <dc:creator>uni1389</dc:creator>
      <dc:date>2025-03-21T13:47:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MS AD Domain User Authentciation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-ms-ad-domain-user-authentciation/m-p/5273914#M595581</link>
      <description>&lt;P&gt;Take a look at your policies and the live logs to see what policy its hitting.&amp;nbsp; That way you can at least determine if you are hitting the right policy or not. That will give you information in which you might need to modify an existing rule or possibly re-order your policy.&lt;BR /&gt;You can also test the user account with a password or just doing a lookup to verify that ISE can query the username correctly. I don't know where you are at with your testing.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 14:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-ms-ad-domain-user-authentciation/m-p/5273914#M595581</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-03-21T14:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MS AD Domain User Authentciation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-ms-ad-domain-user-authentciation/m-p/5273920#M595582</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;-&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1443554"&gt;@uni1389&lt;/a&gt;&amp;nbsp; Not sure what part you are talking about ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp; M.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 14:21:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-ms-ad-domain-user-authentciation/m-p/5273920#M595582</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2025-03-21T14:21:26Z</dc:date>
    </item>
  </channel>
</rss>

