<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Authorization Flow in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ise-authorization-flow/m-p/4474418#M1084000</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1246830"&gt;@naoki_Japan&lt;/a&gt; yes your understanding is correct, authorisation takes place separately, one for the computer and another for the user. As does authentication, the computer and user are also separately authenticated.&lt;/P&gt;</description>
    <pubDate>Mon, 27 Sep 2021 09:38:11 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2021-09-27T09:38:11Z</dc:date>
    <item>
      <title>ISE Authorization Flow</title>
      <link>https://community.cisco.com/t5/network-security/ise-authorization-flow/m-p/4474388#M1083997</link>
      <description>&lt;P&gt;I watched vide to learn how install the combination of machine and user authentication (dot1x) using ISE and AD.&lt;/P&gt;&lt;P&gt;And there is one things I am wandering regarding authorization flow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In that video, he created two authorization (for machine authentication and for user authentication).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do not understand why more than one authorization flows are processed.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 09:01:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-authorization-flow/m-p/4474388#M1083997</guid>
      <dc:creator>naoki_Japan</dc:creator>
      <dc:date>2021-09-27T09:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Flow</title>
      <link>https://community.cisco.com/t5/network-security/ise-authorization-flow/m-p/4474395#M1083998</link>
      <description>&lt;P&gt;Hi&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1246830"&gt;@naoki_Japan&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The authorisation settings for the computer and the user are separate because different settings maybe applied. For example when the computer is booting up and is authenticated/authorised via ISE, you may wish to apply an DACL or SGT to limit the computer access to only AD Domain Controllers to authenticate and download group policies. When the user then connects, depending on their group membership you will likely apply a different DACL or SGT during the Authorisation process, granting full access to the network.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 09:12:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-authorization-flow/m-p/4474395#M1083998</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-27T09:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Flow</title>
      <link>https://community.cisco.com/t5/network-security/ise-authorization-flow/m-p/4474413#M1083999</link>
      <description>&lt;P&gt;I think you are right. In the video, he set different conditions and policy (as you wrote).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In conclusion, only one authorization is processed at one time.&lt;/P&gt;&lt;P&gt;When PC is booting up, the&amp;nbsp; computer authentication process takes place and&lt;/P&gt;&lt;P&gt;,when user logs in, the user authentication process does.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding is right?&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 09:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-authorization-flow/m-p/4474413#M1083999</guid>
      <dc:creator>naoki_Japan</dc:creator>
      <dc:date>2021-09-27T09:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Flow</title>
      <link>https://community.cisco.com/t5/network-security/ise-authorization-flow/m-p/4474418#M1084000</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1246830"&gt;@naoki_Japan&lt;/a&gt; yes your understanding is correct, authorisation takes place separately, one for the computer and another for the user. As does authentication, the computer and user are also separately authenticated.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 09:38:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-authorization-flow/m-p/4474418#M1084000</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-27T09:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Authorization Flow</title>
      <link>https://community.cisco.com/t5/network-security/ise-authorization-flow/m-p/4475063#M1084022</link>
      <description>&lt;P&gt;I appreciate your support!!!!&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 00:25:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-authorization-flow/m-p/4475063#M1084022</guid>
      <dc:creator>naoki_Japan</dc:creator>
      <dc:date>2021-09-28T00:25:44Z</dc:date>
    </item>
  </channel>
</rss>

