cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
742
Views
1
Helpful
2
Replies

Passive ID Mapping and SAML SSO

ccotting
Cisco Employee
Cisco Employee

Looking for some input on a use case we’re attempting configure.

Use Case:

Auth device via endpoint cert = permit and redirect to IdP for user auth

User auth successful = permit and apply dacl per AD group mapping

Problem:  IdP is home grown, only able to pass back the user ID and email address in the assertion

Question:  Understanding passive ID has a restriction of CWA not being supported, since we are doing machine auth via the certificate, are we able to do the following:

Auth Z

Use case = guest flow = permit (reauth occurs) - COA reauth result

CWA auth’d & posture unknown = posture

Posture=compliant & passiveid=ad group x then dacl

Machine in AD group X = permit, redirect to SSO for auth

1 Accepted Solution

Accepted Solutions

hslai
Cisco Employee
Cisco Employee

Passive ID in ISE 2.1 is not vetted for DOT1X so might not work well with machine auth.

View solution in original post

2 Replies 2

hslai
Cisco Employee
Cisco Employee

Passive ID in ISE 2.1 is not vetted for DOT1X so might not work well with machine auth.

Jason Kunst
Cisco Employee
Cisco Employee

What about Machine cert + CWA?