10-05-2018 08:25 AM - edited 10-05-2018 08:29 AM
I have integrated ISE with external MDM services (JAMF). We currently have a rule in place of ISE to check to see if the the apple MacBook Air is registered in the MDM cloud and if it is registered it will provide specific authorization.
The issue we have come across are the dongles that attach to the MacBook Airs has their own mac address and therefore not in the MDM cloud. We are trying to come up with another way of checking to see if the MacBook Airs are within the MDM cloud.
One way of checking is looking for the serial number in the MDM but the downside is we would have to build 30,000 different policies to check for the serial number.
Is there any suggestion that would provide a solution for us?
10-07-2018 11:30 PM
Researching !
10-08-2018 05:42 AM
This is a common problem with the whole MDM checking scenario. All ISE knows really is the MAC address of the authenticating network adapter at the time of authentication. If the MAC address is not in the MDM the whole things breaks down. We have had this issue with Google phones not registering their wireless MAC address into MDMs.
For most of my installs, I just skip the MDM check and authenticate the certificate pushed by the MDM to the client device during registration. If you have your CA environment properly setup the only way a certificate should arrive on the client device is via MDM registration. So if my main goal is to say "Is this a corporate device because it is registered with the MDM?" then the presence of the certificate tells ISE that.
Now if you are checking for compliance status, then you have to do the full integration.
10-08-2018 05:54 AM
10-08-2018 05:59 AM
10-08-2018 10:04 AM
We are experiencing similar difficulties. Can we only choose one method of client authentication? Either certificate or AD credentials? Because we currently utilize the authenticating account in order to provide the appropriate level of content filtering. Maybe there's something we can do with having multiple certificates where each cert ISE can segment the device to a particular VLAN or have a Security Group Tag and we can utilize that instead for our tiered content filtering...
10-08-2018 11:17 AM
The certificate should be a user certificate containing their user's AD account that was used to authenticate the device to the MDM. ISE will extract the AD user account from the certificate and you can do any AD look-ups you want to put users into different classes of access.
10-08-2018 12:59 PM
10-08-2018 01:11 PM
10-08-2018 08:03 AM
We have this same issue. Currently there is no solution for it until ISE 2.5 is released. In ISE 2.5 cisco is finally moving to UUID for device identifiers. UUID is stored in JAMF so there won't be any mac address collision issues.
10-08-2018 08:34 AM
10-08-2018 12:07 PM
ISE and AnyConnect already collect the UUID in some cases. Cisco has just never used it. It's a part of the cisco-av-pair. It's called mdm-tlv=device-uid. Cisco is going to more universally collect the UID and use it within the ISE logic. There'll be an update to ISE and anyconnect to support it in the future.
10-08-2018 12:25 PM
09-10-2020 06:36 PM
Hi,
I see that this topic has had no movement for the past couple of years, but how did you manage to get around this?
Regards,
Jayson
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide