<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC with Identity Policy using Azure AD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4861523#M1101929</link>
    <description>&lt;P&gt;Hi Marvin, sorry if I ask you directly and please, let me know if it's better to open another thread but I'm currently stuck on this. May you please explain me a little more this configuration? I'm currently trying (at least I presume) to do exactly the same. Local AD is configured as Realm under FMC and used in identity policy (locally we use passive auth with passive identities provided by ISE-PIC, no full ISE installation in place), local AD is synchronized to Azure AD. I configured a Remote Access VPN connection profile in order to authenticate the users with Azure AD and the authentication works fine, but the Realm for the logged-in user is set as "Discovered Identities" and not matched to the local AD realm, so it does not match any rule that use identity policy. What am I missing? Thank you in advance for your attention&lt;/P&gt;</description>
    <pubDate>Fri, 23 Jun 2023 16:01:38 GMT</pubDate>
    <dc:creator>nic-m</dc:creator>
    <dc:date>2023-06-23T16:01:38Z</dc:date>
    <item>
      <title>FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4751225#M1096556</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We are currently running FMC and FTD with user identity access control polices. FMC is integrated with ISE, which in turn is integrated with our on-premises Microsoft Active Directing domain using WMI so that user to IP mappings can be passed to FMC from windows security events. This is all working ok.&lt;/P&gt;&lt;P&gt;We are now in the process of migrating devices and users to Azure AD. We have tested 802.1X EAP-TLS wired and wireless authentication for Azure users with ISE and this is working without any issues. We now need to test identity polices, however I dont think that will work as even if ISE publishes the Azure AD user to pxGrid (captured from the certificate CN &lt;A href="mailto:user@xxx.onmicrosoft.com" target="_blank"&gt;user@xxx.onmicrosoft.com&lt;/A&gt;), FMC will not be able to lookup the user to confirm group membership etc as the Realm configuration only support AD or LDAP sources.&lt;/P&gt;&lt;P&gt;Is support for FMC integration with Azure AD on the roadmap? Are there any workarounds to support this?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 10:07:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4751225#M1096556</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2023-01-09T10:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4751371#M1096563</link>
      <description>&lt;P&gt;My customers needing this have a local AD DC synced to Azure. FMC is then integrated with the AD realm via that DC.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 14:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4751371#M1096563</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-01-09T14:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4751518#M1096582</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This may work as a temporary solution, however long term we want to move away from on-prem Microsoft AD and use Azure only. To support this I assume that FMC will need to support direct integration with Azure (like how ISE does today) to be able to query user to group membership?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 17:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4751518#M1096582</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2023-01-09T17:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4752267#M1096623</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/774498"&gt;@dm2020&lt;/a&gt; for the longer term, we hope to see Azure AD realm type added in release 7.4 later this year.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 16:21:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4752267#M1096623</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-01-10T16:21:37Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4752534#M1096644</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;- Good to know that this feature is on the roadmap. Appreciated&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 00:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4752534#M1096644</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2023-01-11T00:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4861523#M1101929</link>
      <description>&lt;P&gt;Hi Marvin, sorry if I ask you directly and please, let me know if it's better to open another thread but I'm currently stuck on this. May you please explain me a little more this configuration? I'm currently trying (at least I presume) to do exactly the same. Local AD is configured as Realm under FMC and used in identity policy (locally we use passive auth with passive identities provided by ISE-PIC, no full ISE installation in place), local AD is synchronized to Azure AD. I configured a Remote Access VPN connection profile in order to authenticate the users with Azure AD and the authentication works fine, but the Realm for the logged-in user is set as "Discovered Identities" and not matched to the local AD realm, so it does not match any rule that use identity policy. What am I missing? Thank you in advance for your attention&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 16:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4861523#M1101929</guid>
      <dc:creator>nic-m</dc:creator>
      <dc:date>2023-06-23T16:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4862476#M1102000</link>
      <description>&lt;P&gt;Sorry, forgot to tag &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 13:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4862476#M1102000</guid>
      <dc:creator>nic-m</dc:creator>
      <dc:date>2023-06-26T13:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4862553#M1102006</link>
      <description>&lt;P&gt;Are you gathering the same samAccountName for the user and using that as the unambiguous identity throughout?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 14:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4862553#M1102006</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-06-26T14:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4862650#M1102011</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt; and thank you very much for your reply. I think it's exactly here where I'm stuck. Azure AD sends as &lt;SPAN&gt;Unique User Identifier (Name ID) the azure his userprincipalname but I tried to customize it with the user.onpremisessamaaccountname or user.onpremisesuserprincipalname and all I get are weird characters in the username and the realm is still discovered identities.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you can share any pointer to what customize in the SAML claims in order to get it working it would be great.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you very much again&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 16:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4862650#M1102011</guid>
      <dc:creator>nic-m</dc:creator>
      <dc:date>2023-06-26T16:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4863251#M1102050</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/182530"&gt;@nic-m&lt;/a&gt;&amp;nbsp;&amp;nbsp;I'm not sure about this one.&lt;/P&gt;
&lt;P&gt;I suggest you open a TAC case. Please let us know what you find out.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 14:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4863251#M1102050</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-06-27T14:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4864085#M1102106</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt; I was able to solve this. I used a transformation to change the Unique User Identifier value set as user.userprincipalname from the Azure format (that is, for example user@domain.com to the local realm one (for example user@domain.local) as shown below&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GENERIC04.png" style="width: 858px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/188841i959BC6CA406D98E2/image-size/large?v=v2&amp;amp;px=999" role="button" title="GENERIC04.png" alt="GENERIC04.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In this way the user realm is correctly set in the FMC and identity policies work.&lt;/P&gt;
&lt;P&gt;I really would like to thank you for your time and for point me in the right direction with your first answer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 16:15:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4864085#M1102106</guid>
      <dc:creator>nic-m</dc:creator>
      <dc:date>2023-06-28T16:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4864113#M1102108</link>
      <description>&lt;P&gt;That's really good to know &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/182530"&gt;@nic-m&lt;/a&gt; . I was thinking about transformations since we do something similar in ISE sometimes but I couldn't see how we could do so in FMC.&lt;/P&gt;
&lt;P&gt;Doing it at the Azure end seems to be the trick - good work!&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 16:57:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4864113#M1102108</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-06-28T16:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4873695#M1102636</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt; I have to thank you. Your first reply to me, asking about gathering the same samAccountName, pointed me out to the right direction on what it was needed and I had to try to achieve in some way. And I found the way I posted above. Also the TAC confirmed that.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 16:02:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/4873695#M1102636</guid>
      <dc:creator>nic-m</dc:creator>
      <dc:date>2023-07-13T16:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: FMC with Identity Policy using Azure AD</title>
      <link>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/5294883#M1121194</link>
      <description>&lt;P&gt;FYI - updates since this thread was published:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://secure.cisco.com/secure-firewall/v7.4/docs/azure-ad-user-identity-with-ise" target="_blank"&gt;https://secure.cisco.com/secure-firewall/v7.4/docs/azure-ad-user-identity-with-ise&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://secure.cisco.com/secure-firewall/docs/azure-ad-active-auth-azureduo-sso-saml" target="_blank"&gt;https://secure.cisco.com/secure-firewall/docs/azure-ad-active-auth-azureduo-sso-saml&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2025 13:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-with-identity-policy-using-azure-ad/m-p/5294883#M1121194</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-05-29T13:44:58Z</dc:date>
    </item>
  </channel>
</rss>

