<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE and MacBook in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5303812#M596996</link>
    <description>You don’t do this. This is not possible on MacOS without an MDM. An MDM must be used.&lt;BR /&gt;</description>
    <pubDate>Sun, 29 Jun 2025 17:54:45 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2025-06-29T17:54:45Z</dc:date>
    <item>
      <title>Cisco ISE and MacBook</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079447#M589051</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I am looking for pointers from the community as I have very little experience with Macbooks. We have previously only dealt with Windows clients and they happily authenticate as a device using EAP-TLS to AD over wired and wireless.&amp;nbsp;In our experience, Macbooks do not play well with AD so I am looking for an alternative solution.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to get the Macbook to authenticate to Cisco ISE itself, but I also have the problem that we use Ruckus WiFi which cannot do URL redirect. So the usual solutions become hard to implement as they all seem to need a workflow involving URL-redirect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a simple way to get the Macbook registered with Cisco ISE so that it can authenticate as a device ? I do not mind a manual process as we only have a few Macbooks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for reading&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 12:36:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079447#M589051</guid>
      <dc:creator>BruceR214</dc:creator>
      <dc:date>2024-04-26T12:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MacBook</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079469#M589052</link>
      <description>&lt;P&gt;How are the MacBooks managed?&amp;nbsp; You should have an MDM solution for them.&amp;nbsp; Use said MDM to push certificates to the MacBooks and do EAP-TLS authentication with those certificates to ISE.&amp;nbsp; If you also want Posture/compliance checks, integrate that MDM with ISE.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 12:54:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079469#M589052</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-04-26T12:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MacBook</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079475#M589055</link>
      <description>&lt;P&gt;We have them on Intune currently, and we can push SCEP certificates to them.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 12:56:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079475#M589055</guid>
      <dc:creator>BruceR214</dc:creator>
      <dc:date>2024-04-26T12:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MacBook</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079477#M589056</link>
      <description>&lt;P&gt;Perfect.&amp;nbsp; Use InTune to push a SCEP enrollment profile to them to obtain a certificate from the PKI.&amp;nbsp; Use InTune to configure the wired/wireless on the MacBook to authenticate with EAP-TLS to ISE.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want compliance checks as well then integrate InTune with ISE.&amp;nbsp; &lt;A href="https://cs.co/ise-berg#Intune" target="_blank" rel="noopener"&gt;https://cs.co/ise-berg#Intune&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 12:58:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079477#M589056</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-04-26T12:58:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MacBook</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079577#M589065</link>
      <description>&lt;P&gt;OK, sounds good.&lt;/P&gt;&lt;P&gt;I have never used SCEP before, but I can see that the certificate does get to the MacBook.&lt;/P&gt;&lt;P&gt;When the MacBook tries to authenticate, where should ISE check the certificate against. For a Windows PC it checks with the AD Computer object.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, is is possible for the MacBook to connect to WiFi before the user login happens ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 13:36:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079577#M589065</guid>
      <dc:creator>BruceR214</dc:creator>
      <dc:date>2024-04-26T13:36:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MacBook</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079587#M589066</link>
      <description>&lt;P&gt;It can if you have an AD object created for that.&amp;nbsp; If not then you can choose to rely on the certificate trust itself to validate device ownership.&amp;nbsp; This depends on how secure your PKI environment is, where its exposed, who can enroll a certificate, keys non-exportable etc.&amp;nbsp; &amp;nbsp;This is where InTune comes back into play as well.&amp;nbsp; If you don't have an AD object to check against, you can have ISE check against InTune for the existence of that MacBook as your "second factor" other than the existence of the certificate itself.&lt;/P&gt;
&lt;P&gt;It is not.&amp;nbsp; Wireless has no concept of an "open mode".&amp;nbsp; Most of my customers use dedicated, physically protected "build ports" that do not have any authentication commands on them for the sole purpose of provisioning/imaging computers.&amp;nbsp; Some other of my customers use the guest network for provisioning through things like AutoPilot.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 13:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079587#M589066</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-04-26T13:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MacBook</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079715#M589070</link>
      <description>&lt;P&gt;Thanks for all this information, I will be trying it out next week.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 15:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5079715#M589070</guid>
      <dc:creator>BruceR214</dc:creator>
      <dc:date>2024-04-26T15:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MacBook</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5303767#M596995</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;We're looking to achieve &lt;STRONG&gt;machine and user authentication for our MacBooks&lt;/STRONG&gt;, much like how we currently secure our Windows fleet. Our goal is to do this &lt;STRONG&gt;without deploying an MDM solution like Jamf&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;Here's our main concern: If we settle for a user-only authentication policy for Macs, could that create a security vulnerability that eventually impacts our Windows machines as well? Is this a valid worry in your experience?&lt;/P&gt;&lt;P&gt;I've heard that &lt;STRONG&gt;Active Directory objects&lt;/STRONG&gt; might be key to pulling this off. If you've managed to implement something similar, could you please walk us through the technical specifics? We'd love to understand:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;How do you configure Active Directory for this setup?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;What does the entire authentication flow look like from a MacBook's perspective?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Are there any architectural diagrams or step-by-step guides you could share?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your insights and knowledge would be incredibly valuable!&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jun 2025 14:52:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5303767#M596995</guid>
      <dc:creator>00u17</dc:creator>
      <dc:date>2025-06-29T14:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and MacBook</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5303812#M596996</link>
      <description>You don’t do this. This is not possible on MacOS without an MDM. An MDM must be used.&lt;BR /&gt;</description>
      <pubDate>Sun, 29 Jun 2025 17:54:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-macbook/m-p/5303812#M596996</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-06-29T17:54:45Z</dc:date>
    </item>
  </channel>
</rss>

