Integrate Intune MDM with Identity Services Engine
Step-by-step guide to connecting Cisco ISE with Microsoft Intune for secure device compliance enforcement.
Prerequisites
Before starting, ensure you have:
- Working knowledge of Cisco ISE MDM services.
- Familiarity with Microsoft Azure Intune services.
- Cisco ISE version 3.0 or later.
- Access to Microsoft Azure portal with administrative rights cisco.com.
Why Integrate Intune with ISE?
- Enhanced Security: ISE queries Intune for device compliance attributes before granting network access.
- Granular Control: Apply Access Control Lists (ACLs) based on device compliance state.
- Unified Management: Centralize endpoint compliance and access policies across your enterprise cisco.com.
Configuration Steps
1. Import Certificates from Intune to ISE
- Log in to the Azure portal.
- Open certificate details via the browser lock icon.
- Export the Root CA and intermediate certificates in BASE64 format.
- In ISE, go to Administration > System > Certificates > Trusted Certificates and import them cisco.com.
2. Register ISE as an Application in Azure
- Navigate to Azure Active Directory > App registrations.
- Create a new application named “ISE”.
- Assign required permissions:
- Microsoft Graph: Read directory data, Intune device configuration.
- Intune API: Get device compliance information.
- Azure AD: Sign in and read user profile.
- Click Grant Permissions to apply changes cisco.com.
3. Import ISE Certificates into Azure
- Export ISE system certificates from all nodes.
- Convert them to BASE64 using PowerShell (legacy option) or upload directly in Azure.
- Update the Azure App Manifest with certificate details under
keyCredentials. - Upload the updated manifest back to Azure cisco.com.
4. Configure ISE with Azure Endpoints
In ISE, navigate to Administration > Network Resources > External MDM and add a new server:
- Intune Auto Discovery URL
- Azure AD Graph API Endpoint
- OAuth 2.0 Token Endpoint
- Client ID (from Azure App registration) cisco.com.
Troubleshooting
- Connection to Server Failed: Ensure the full certificate chain (including
graph.microsoft.com) is imported into ISE Trusted Store. - Failed to Acquire Auth Token: Verify correct ISE certificate chain in the Azure manifest and confirm permissions are granted in Azure.
- SSL Errors: Import missing certificates and validate trust paths cisco.com.
Related Resources
- Cisco Documentation: Integrate Intune MDM with ISE
- Microsoft Docs: Register an Application with Microsoft Identity Platform
- Cisco Technical Support & Documentation cisco.com