THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.
Affected Software Product | Affected Release | Affected Release Number | Comments |
---|---|---|---|
Identity Services Engine System Software | 2 | 2.0, 2.0.1, 2.1.0, 2.2.0, 2.3.0, 2.4.0, 2.6.0, 2.7.0 | For ISE versions 2.0, 2.1, 2.2, 2.3 , 2.4, 2.6, and 2.7 – all patch versions |
Identity Services Engine System Software | 3 | 3.0.0, 3.1.0, 3.2.0, 3.3.0 |
For ISE 3.0 – all patch versions For ISE 3.1 - Patch 7 and earlier For ISE 3.2 - Patch 3 and earlier For ISE 3.3 - unpatched version only |
Defect ID | Headline |
CSCwc36589 | ISE Intune MDM integration may disrupt due to End of Support for MAC Address-Based APIs from Intune |
Across all affected releases, Cisco Identity Services Engine (ISE) uses the Microsoft network access control (NAC) API for Microsoft Intune Mobile Device Management (MDM) / Unified Endpoint Management (UEM) integration. Microsoft will deprecate the NAC API on March 31, 2024 (deprecation date was postponed from December 31, 2023).
This will impact Cisco ISE customers using Microsoft Intune for MDM for wired, wireless, and VPN deployment scenarios in the following ways:
For further information, refer to New Microsoft Intune service for NAC.
Microsoft will deprecate the Intune NAC service API on March 31, 2024. This API supports the method for Cisco ISE to determine corporate asset ownership or registration and retrieve endpoint security compliance using MAC address and UDID-based queries. Once deprecated, all queries from Cisco ISE to Intune will need to utilize the Microsoft Compliance Retrieval API. Microsoft’s Compliance Retrieval API supports Global Unique Identifier (GUID) as the unique identifier and, as of July 31, 2023, also supports MAC address-based queries.
In Cisco ISE releases earlier than Release 3.1, the integration between Cisco ISE and Intune was done with the Cisco ISE MDM APIv2 using the Intune NAC service, which used the MAC address or UDID (in the case of VPN flows where the MAC address was not available) of the endpoint as the means of endpoint identification. Cisco ISE Release 3.1 introduced MDM APIv3, which also supports the use of a GUID for endpoint identification. Microsoft Intune supports MDM APIv3 with their Compliance Retrieval API.
Microsoft and Cisco strongly recommend the use of Cisco ISE Release 3.1 or later together with GUID embedded in the certificate. As some operating system vendors begin to limit the ability of applications to access MAC addresses due to privacy concerns, it becomes more of a challenge for MDM vendors to collect and rely on MAC addresses. As a result, although MAC address-based queries are supported by Microsoft’s Compliance Retrieval API, due to limitations imposed by the operating system vendors with later versions of operating systems, there will likely be more endpoints without MAC addresses known to the MDM. And, for wired and wireless-based endpoints, if the MAC address is not known to Intune, then no valid response will be received by Cisco ISE.
This limitation is also seen for VPN-based endpoints where the MAC address is discovered by the VPN client and not passed on to Cisco ISE. For these endpoints, it will not be possible to check their registration or compliance status with Intune after the deprecation of the NAC Service API.
Once Microsoft deprecates the NAC service API, Cisco ISE API queries to Intune will fail, and Intune-managed endpoints will appear as not-registered. Cisco ISE will also trigger an alarm indicating that the Intune API is unreachable.
For Wi-Fi scenarios, complete the following steps to continue the use of the Microsoft Intune MDM integration:
For VPN scenarios or for Wi-Fi scenarios where authentication does not use GUID-embedded certificates, upgrade to any of the following Cisco ISE release patches:
Microsoft’s Compliance Retrieval API does not currently support “Ethernet MAC” for MAC Address-based APIs. This will affect Cisco ISE customers using Microsoft Intune for MDM for wired infrastructure. This limitation will be addressed by Microsoft in January 2024. For wired infrastructure scenarios, it is strongly recommended to migrate to GUID-embedded certificates before upgrading to Cisco ISE 3.1 P8, 3.2 P4, or ISE 3.3 P1.
There is no plan to backport the fixes to Cisco ISE releases 3.0 and earlier.
Version | Description | Section | Date |
2.1 | Updated the Workaround/Solution section. | Workaround/Solution | 2023-DEC-06 |
2.0 | Updated the Problem Description, Background, Problem Symptoms, and Workaround/Solution. | Problem Description, Background, Problem Symptoms, Workaround/Solution | 2023-NOV-07 |
1.3 | Updated Background and Workaround/Solution sections | — | 2023-SEP-01 |
1.2 | Updated the Title, Problem Description, Background, Problem Symptom, and Workaround/Solution Sections | — | 2022-NOV-09 |
1.1 | Updated the Background Section | — | 2022-JUL-29 |
1.0 | Initial Release | — | 2022-JUL-13 |
For further assistance or for more information about this field notice, contact the Cisco Technical Assistance Center (TAC) using one of the following methods:
To receive email updates about Field Notices (reliability and safety issues), Security Advisories (network security issues), and end-of-life announcements for specific Cisco products, set up a profile in My Notifications
Unleash the Power of TAC's Virtual Assistance