Hi Guys,
I have integrated AirWatch as an MDM server with ISE 2.3.
The authentication is successful using EAP-TLS but authorization policy is not working.
There is no requirement for BYOD. All the IOS devices are preregistered on Airwatch. If device register status is registered, the access is allowed if it is unregistered, it will be denied.
The below is my policy
1. IOS REGISTERED DEVICE if MDM:deviceregisteredstatus equals registered, allow Access
2. IOS PREAUTH if SSID=IOS then trigger PreAuthIOS authorization profile (this profile will return preauthIOS acl to Wireless controller to allow traffic to DNS, DHCP and to MDM server to check the status)
3. IOS UNREGISTERED DEVICE if MDM:deviceregisteredstatus equals unregistered, DenyAccess
-
Just connected my iPhone. It gets an IP Address and I can see WiFi symbol but cannot browse the Internet.
The FLOW - let me know your thoughts
- Any new registered iPhone on Airwatch triggers the Preauth (2nd policy) and goes out to Internet to talk to only Airwatch to confirm the device register status
- ISE gets device register status and issues change of authorization (CoA) for endpoint and then it would trigger 1st policy if the status from MDM is registered but triggers 3rd policy if the status from MDM is unregistered
I do not think CoA is happening with my test iPhone.
Below are the RADIUS logs
Cisco Identity Services Engine
22037 |
Authentication Passed |
|
12506 |
EAP-TLS authentication succeeded |
|
24715 |
ISE has not confirmed locally previous successful machine authentication for user in Active Directory |
|
15036 |
Evaluating Authorization Policy |
|
15048 |
Queried PIP - Network Access.UseCase (2 times) |
|
15048 |
Queried PIP - Network Access.ISE Host Name |
|
15048 |
Queried PIP - MDM.DeviceRegisterStatus |
|
15016 |
Selected Authorization Profile - iOS-PreAuth |
|
22081 |
Max sessions policy passed |
|
22080 |
New accounting session created in Session cache |
|
11503 |
Prepared EAP-Success |
|
24432 |
Looking up user in Active Directory - TESTAD |
|
24355 |
LDAP fetch succeeded - company.com |
|
24416 |
User's Groups retrieval from Active Directory succeeded - TESTAD |
|
11002 |
Returned RADIUS Access-Accept |
|
|
Although the test connection to MDM is successful. I think ISE is not making an API call to Airwatch at all.
The error from PSN is Identity Services Engine
External MDM Server Connection Failure. : Reason is Connection Failed to the MDM server host -
|
I have disabled proxy on ISE PAN and added firewall rule so ISE can directly talk to Airwatch. We don't see any drops on Firewall.
The TAC case is already logged. As per Cisco, depending on the polling interval (default is 240 minutes) ISE fetch status of all devices from Airwatch stores under Identity database. Not sure about this.
When ISE makes an API call, who is the source? PAN or PSN?
-
It seems I have provided too much information? But let me know if you guys have worked with MDM or know any of the theory or concepts abut the flow.
Thanks.