Hello!
I have recently started going down the path of testing Identity Collector with Cisco ISE SGTs. We currently have SGTs deployed to one of our sites and wanted to see how the integration works.
I was able to successfully get ISE connected to identity collector and SGT information from that site is being ingested. How ever when looking at logs for the mappings I noticed that there are only failed logins with Make sure the Account exists in AD description message.
A little bit about how are authentications are being handled. Are Computers (Desktops & Laptops) with security group computers are authenticating with EAP-TLS with a machine based certificate tied to the GUID of the device.
Some of our wireless clients that can't use EAP-TLS we use PEAP/MSCHAPv2 with a static username and password defined in ISE and not AD.
In the provided screenshot you can see both of these scenarios.
My questions then are.
I assume the reason why I am getting the make sure the account exists in AD is because the security gateway is doing a LDAP Query? This would be failing due to the Source usernames not being in AD as users (GUIDs are in as computers and the static ISE usernames are not in AD at all).
Even with the integration in this state am I still able to enforce the SGTs through access groups and roles or do you need a successful login?
And if you need a successful login how can that be achieved with machine based auth and static usernames in ISE?
Environment:
Cluster Running R81.20
Identity Collector
ISE 3.3
Any input is greatly appreciated!