Sure, we commonly use EAP chaining to address this use case. Please see "HowTo: EAP Chaining Deployment Configurations" on the ISE Design Guide page.
Specifically see the section beginning on page 15 which describes:
In this example, these rules will be defined based on the EAP-Chaining results:
• If both user and machine both succeeded
• If user succeeded and machine failed
• No chaining is supported