<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Marvin, Neno, Many thanks for in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-ad-integration/m-p/2567434#M75602</link>
    <description>&lt;P&gt;Marvin, Neno,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for you guys response!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tina&lt;/P&gt;</description>
    <pubDate>Thu, 11 Dec 2014 14:38:43 GMT</pubDate>
    <dc:creator>Tong Zhang</dc:creator>
    <dc:date>2014-12-11T14:38:43Z</dc:date>
    <item>
      <title>ISE AD integration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-integration/m-p/2567431#M75598</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very often, when we integrate ISE with customer AD and try to join ISE into domains, customer will ask what kind of service account they'll create for us to use to join the domain.&amp;nbsp; Based on Cisco documentation, the service account should allow ISE to read the AD user/machine records, and should also "has sufficient privileges to create and remove machine accounts in the domain, or alter the passwords for previously created machine accounts".&amp;nbsp; Often, the latter part alerts the customer, and we've been pushed back and asked why.&amp;nbsp; Based on the normal use cases, seems ISE only need to read the record rather than create account, what is the reason we need the capability to create the machine account?&amp;nbsp; If the credential not support creating machine account, what's the impact?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance!&lt;/P&gt;&lt;P&gt;Tina&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:15:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-integration/m-p/2567431#M75598</guid>
      <dc:creator>Tong Zhang</dc:creator>
      <dc:date>2019-03-11T05:15:37Z</dc:date>
    </item>
    <item>
      <title>When you integrate ISE with</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-integration/m-p/2567432#M75599</link>
      <description>&lt;P&gt;When you integrate ISE with AD, one of the things done by the service account (or other account used) is to join the ISE servers themselves to AD.&lt;/P&gt;&lt;P&gt;Once that is done, you could probably remove that particular privilege from the defined account if it's inconsistent with organizational security policy.&lt;/P&gt;&lt;P&gt;(Note that a 1.3 upgrade requires rejoining the ISE nodes so the privilege would need to be reinstated during the post-upgrade rejoin.)&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 00:42:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-integration/m-p/2567432#M75599</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-12-11T00:42:27Z</dc:date>
    </item>
    <item>
      <title>Hello Tina, Marvin makes a</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-integration/m-p/2567433#M75600</link>
      <description>&lt;P&gt;Hello Tina, Marvin makes a very good point that ISE does not require a "Service Account" like ACS does. With ISE, once the deployment is joined to the domain, the AD account is no longer used so it can be disabled or even deleted. In addition, many of my customers don't even use a "service" account to join ISE. Instead, they use their own account or some other network related account.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 06:49:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-integration/m-p/2567433#M75600</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-12-11T06:49:28Z</dc:date>
    </item>
    <item>
      <title>Marvin, Neno, Many thanks for</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-integration/m-p/2567434#M75602</link>
      <description>&lt;P&gt;Marvin, Neno,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for you guys response!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tina&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 14:38:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-integration/m-p/2567434#M75602</guid>
      <dc:creator>Tong Zhang</dc:creator>
      <dc:date>2014-12-11T14:38:43Z</dc:date>
    </item>
    <item>
      <title>Tina,You're welcome.Please</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ad-integration/m-p/2567435#M75604</link>
      <description>&lt;P&gt;Tina,&lt;/P&gt;&lt;P&gt;You're welcome.&lt;/P&gt;&lt;P&gt;Please take a moment to rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 14:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ad-integration/m-p/2567435#M75604</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-12-11T14:59:28Z</dc:date>
    </item>
  </channel>
</rss>

