06-18-2024 11:58 AM
Hi,
Our customer wants to integrate Cisco ISE with Azure AD, and they want to use AutoPilot to autoprovision the computers. But how can we authenticate and authorize a computer that dont have anything?
If we integrate with Intune this will work?
Enviroment:
Two nodes ISE 3.3 Patch 2
Regards
06-18-2024 12:45 PM
Hello Leonardo, if you are going to authenticate Laptops that don't have absolutely anything of configuration and don't have credentials to present/supplicant configured, I would recommend you to configure on ISE a policy set that catches all the authentication attempts from the SSIDs/Switches that these laptops are connected to via MAB, and push an ACL so the endpoints only get access to the Domain controllers or the servers that you use to provision them. Once they are able to present their credentials or certificate with the help of a supplicant, you can authenticate them using an external identity source like Azure AD,
Here you have an example of EAP TLS authentication using Azure:
Regarding the intune integration, as long as ISE can validate that the devices are compliant in Intune, you could use this in your authorization policies for the devices that are allowed to connect without a supplicant configured.
06-18-2024 12:54 PM
Hi Dalbanil,
Thanks for you answer.
The integration with Intune will allow to create rules based on the device registered at the Intune? Because our customer
wants to deploy auto pilot for the computers. When arrive a new computer it doesnt have the certificate and GPO to ISE allow thisdevice to enter in the network? The intune integration will solve this question?
06-18-2024 03:47 PM - edited 06-18-2024 04:25 PM
@Leonardo Santana, the AutoPilot registration and Intune registration are separate things. When an AutoPilot registered device is received by a user, they would need to connect it to the network to complete the build/installation. This would require network connectivity to internet-based systems like Entra ID and Intune.
In this initial phase, the device would have no certificate and would not yet be enrolled with Intune, so ISE would have nothing to use for authentication and nothing to identify it as a Corporate-owned device. You would likely need to look at options like the following for this initial connectivity.
Once the Intune enrolment is complete and the device has a certificate enrolled with the GUID, the user could connect to the secure Wired/Wireless corporate networks.
Ideally, MS would add some method to connect to an 802.1x secured network during the initial stages, but they never even implemented that in traditional builds using SCCM, so I won't hold my breath for that.
06-18-2024 03:57 PM
Hi Greg thanks for your answer. Its was very valuable to me.
I´ll these option for the initial connectivity.
Intune is for posture purposes right?
06-18-2024 04:24 PM
@Leonardo Santana... yes, the Intune integration with ISE would be used to perform Intune MDM registration/compliance checks against the device/user sessions as a condition for Authorization.
For more information, you might be interested in the webinar I delivered on ISE Integration with Intune MDM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide