We are using a Meraki Wireless network, we have rolled out ISE to authenticate the users. We have a tired structure if the machine and user cert are on then the user has full access. If they only have valid AD credentials they get a BYOD type access...