Jump to content

Cisco ISE integration to WS1 UEM


Go to solution Solved by Sascha Warno,

Recommended Posts

Hello

We currently are looking into splitting our devices to different netoworks/firewall rules, this ofcourse we wanna make as dynamic and automatic as possible. It may be possible in the future that this could be 5-6 different networks with different firewall rules.

Today we only have one network for our MDM-devices and ISE is looking at the OID when the device tries to connect to send it to the correct network

I would preferbly not want to use different certificates for different networks/firewall rules, we looked at the ISE integration you can do, i'm not completly sure of how you can query UEM, is smartgroups possible to query?
If not i quite don't understand what the benefits of the integration would be

I've read both documentation from CISCO and Omnissa
Cisco Identity Services Engine Administrator Guide, Release 3.4 - Secure Access [Cisco Identity Services Engine] - Cisco
https://techzone.omnissa.com/resource/integrating-workspace-one-uem-and-cisco-ise-v31-and-beyond

We run UEM on-premise
Anyone else runs this and have any input to help us further?

Link to comment
Share on other sites

  • Replies 3
  • Created
  • Last Reply

Top Posters In This Topic

Hey Leo,

It adds device status into the equation for network access, if a device is non complaint or compromised, that data can be used by ISE to block access. 

you can also do IP range based enrollment to split your devices into groups or use Tags and Workspace ONE Intelligence to tag and add to smart groups according to IP Range etc. 

I hope that answers your question

Link to comment
Share on other sites

  • Employee
  • Solution

As Michael stated, the integration adds compliance information to the authorization by providing a MDM device identifier during the authentication with certificates. The integration only gathers basic device information from the MDM service that could be used (https://docs.ansible.com/ansible/latest/collections/cisco/ise/endpoint_module.html#parameter-mdmAttributes that listing is missing MDMUdid) but seem not usable in your specific use case. My understanding is you want to organize the devices inside Cisco ISE?! There is no easy way for an API based automation as the listing of networkdevices on the ISE side only gives basic info on and you would need to drill down into every device returned to find its associated MDMUdid which you could use to find extra info using the UEM APIs. 

Link to comment
Share on other sites

Ok then I understand what it's meant for, ofcourse it's a good thingy to be able to block network access in that way.

I was hoping it was able to query something like smartgroups or tags.
For our Windows endpoints (not UEM managed, we use SCCM for them) we use Active Directory groups to manage this which is working very neat.

Group 1 = Net1
Group2 = Net2 etc.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...