<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Collector &amp;amp; Cisco ISE - Failed Logins in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/239600#M39995</link>
    <description>&lt;P&gt;Example tag / access role:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE tag.png" style="width: 791px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29428iA5D88F057690AFB2/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE tag.png" alt="ISE tag.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 25 Jan 2025 00:32:55 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2025-01-25T00:32:55Z</dc:date>
    <item>
      <title>Identity Collector &amp; Cisco ISE - Failed Logins</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/239572#M39991</link>
      <description>&lt;P&gt;Hello!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have recently started going down the path of testing Identity Collector with Cisco ISE SGTs. We currently have SGTs deployed to one of our sites and wanted to see how the integration works.&lt;/P&gt;&lt;P&gt;I was able to successfully get ISE connected to identity collector and SGT information from that site is being ingested. How ever when looking at logs for the mappings I noticed that there are only failed logins with Make sure the Account exists in AD description message.&lt;/P&gt;&lt;P&gt;A little bit about how are authentications are being handled. Are Computers (Desktops &amp;amp; Laptops) with security group computers are authenticating with EAP-TLS with a machine based certificate tied to the GUID of the device.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some of our wireless clients that can't use EAP-TLS we use PEAP/MSCHAPv2 with a static username and password defined in ISE and not AD.&lt;/P&gt;&lt;P&gt;In the provided screenshot you can see both of these scenarios.&lt;/P&gt;&lt;P&gt;My questions then are.&lt;/P&gt;&lt;P&gt;I assume the reason why I am getting the make sure the account exists in AD is because the security gateway is doing a LDAP Query? This would be failing due to the Source usernames not being in AD as users (GUIDs are in as computers and the static ISE usernames are not in AD at all).&lt;/P&gt;&lt;P&gt;Even with the integration in this state am I still able to enforce the SGTs through access groups and roles or do you need a successful login?&lt;/P&gt;&lt;P&gt;And if you need a successful login how can that be achieved with machine based auth and static usernames in ISE?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SmartConsoleLogs.png" style="width: 849px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29423iEB0C4543A62EFBC3/image-size/large?v=v2&amp;amp;px=999" role="button" title="SmartConsoleLogs.png" alt="SmartConsoleLogs.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Environment:&lt;/P&gt;&lt;P&gt;Cluster Running R81.20&lt;/P&gt;&lt;P&gt;Identity Collector&lt;/P&gt;&lt;P&gt;ISE 3.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any input is greatly appreciated!&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 17:28:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/239572#M39991</guid>
      <dc:creator>Austin35</dc:creator>
      <dc:date>2025-01-24T17:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector &amp; Cisco ISE - Failed Logins</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/239592#M39993</link>
      <description>&lt;P&gt;Group information can comes from LDAP, so if the users aren't defined there, those messages seem reasonable.&lt;BR /&gt;I believe you can define Identity Tags that match what is in Cisco ISE and those will be associated with the relevant users/machines (the capitalization should be identical to what's in ISE).&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 23:26:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/239592#M39993</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-24T23:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector &amp; Cisco ISE - Failed Logins</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/239596#M39994</link>
      <description>&lt;P&gt;For context, what patch level are the Involved components, Check Point JHF, Cisco ISE 3.3 (patch 4?) and AD environment version?&lt;/P&gt;
&lt;P&gt;How are your access roles defined also verify the LDAP account unit credentials and DN.&lt;/P&gt;
&lt;P&gt;From there we would leverage the following useful commands:&lt;/P&gt;
&lt;P&gt;pdp idc groups_consolidation enable | disabled&lt;/P&gt;
&lt;P&gt;pdp conciliation idc_multiple_users enabled | disabled&lt;/P&gt;
&lt;P&gt;pdp idc groups_update on | off | status&lt;/P&gt;
&lt;P&gt;Refer also: sk182935, sk165457, sk180392&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 00:16:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/239596#M39994</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-01-25T00:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector &amp; Cisco ISE - Failed Logins</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/239600#M39995</link>
      <description>&lt;P&gt;Example tag / access role:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE tag.png" style="width: 791px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29428iA5D88F057690AFB2/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE tag.png" alt="ISE tag.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 00:32:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/239600#M39995</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-01-25T00:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector &amp; Cisco ISE - Failed Logins</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/239745#M40012</link>
      <description>&lt;P&gt;Cisco ISE 3.3 P4&amp;nbsp;&lt;/P&gt;&lt;P&gt;R81.20 JHF 65&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I looked through those SKs and they are about AD Group membership and that side is working fine. Our SE was able to get me in touch with one of the regional architects and we poked around at our configuration and did some testing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is what we came up with,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current configuration is that we have an identity collector with 1 query pool with both our AD and ISE tied to it.&lt;/P&gt;&lt;P&gt;AD and LDAP membership are working fine, Our ISE authentications do not have user information as we are doing device auth vs user auth.&lt;/P&gt;&lt;P&gt;When we ran some tests, we noticed that in the identity collector there are two mappings for the same IP in identity collector logs one being the username tied to the IP from AD, and the other being the GUID of the device authentication in ISE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-01-27 152655.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29452iC3964D9886795344/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-01-27 152655.png" alt="Screenshot 2025-01-27 152655.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Speculation then being because the AD and the ISE are in the same query pool, identity collector or pdp is unable to correlate the two. From his recommendation we are going to be trying to separate the ISE and AD into two different Identity collector servers to get them out of the same query pool and see if that resolves the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 23:00:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/239745#M40012</guid>
      <dc:creator>Austin35</dc:creator>
      <dc:date>2025-01-27T23:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector &amp; Cisco ISE - Failed Logins</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/247787#M41403</link>
      <description>&lt;P&gt;Hey!&lt;BR /&gt;&lt;BR /&gt;I'm facing a very similar situation ... Have you been able to solve it?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2025 12:30:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/247787#M41403</guid>
      <dc:creator>SteveMad</dc:creator>
      <dc:date>2025-04-30T12:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector &amp; Cisco ISE - Failed Logins</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/248623#M41566</link>
      <description>&lt;P&gt;For awareness there is a new IDC version available to support Cisco ISE 3.4 and other enhancements.&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 10:47:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Collector-amp-Cisco-ISE-Failed-Logins/m-p/248623#M41566</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-05-12T10:47:22Z</dc:date>
    </item>
  </channel>
</rss>

