cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
214
Views
0
Helpful
2
Replies

Cisco ISE authentication via certificate and authorization via Azure

Hi All,

I'm configuring Cisco ISE policy sets according to this document:

https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635/show-comments/true

In that document when authentication is via certificate, it includes certificate issuer and subject, however in authorization part certificate issuer and subject also are added and additionally Azure groups and MDM.

Wanted to check why certificate issuer and subject are added in authorization rules (all examples), what is difference adding them or not?

Thanks

 

2 Replies 2

Greg Gibbs
Cisco Employee
Cisco Employee

The Authorization policies are evaluated by any session that passes Authentication.

In general, I match those values in the Authentication policy to define which CAP/ISS to use. I use the same conditions in my Authorization policies to ensure that the session that hit my expected Authorization policy was also authenticated by the expected Authentication policy (as much as possible).

It is not a requirement, but my personal preference for best practice.

Hi @Greg Gibbs 

Thanks for explanation. 

Without certificate Issuer/Subject in Authorization Policies all our tests were successful.

However if there are some Policy Sets and if each one includes many Authorization Policies, certificate Issuer/Subject change will require all Authorization Policies change, therefore wanted to check what's the difference.