A cloud-based identity and access management service for securing user authentication and resource access
The correct mental model (why this
The correct mental model (why this breaks)
Cisco ISE does not perform an interactive user sign‑in:
- No browser
- No redirect
- No modern OAuth flow with MFA challenges
- No user presence during EAP authentication
Therefore:
- MFA can never succeed at Wi‑Fi join time
- Entra ID classifies the authentication as:
- Public client
- Non‑interactive
- Non‑browser
- Conditional Access can only scope these flows by client app type, not by cloud app
- Non‑interactive
- Public client
This exact limitation is documented and confirmed in Microsoft Q&A for Cisco ISE + Entra ID scenarios.
Recommended Conditional Access design (Microsoft‑aligned)
Split policies by Client App condition (not Cloud Apps)
Yes — Client App conditions are the correct and supported approach.
Policy A – Interactive user access (MFA enforced)
Purpose: All normal user sign‑ins
Assignments
- Users: All users
- Client apps:
- Browser
- Mobile apps and desktop clients
Controls
- Require MFA
- (Optionally) Require compliant device
This policy covers:
- Office apps
- Browser access
- Teams
- Outlook
- Azure Portal
This policy works as expected.
Policy B – Non‑interactive / legacy / EAP flows (MFA excluded)
Purpose: Allow Cisco ISE Wi‑Fi authentication to continue
Assignments
- Users: All users
- Client apps:
- Other clients
- Exchange ActiveSync clients (if needed)
- Legacy authentication clients (optional but recommended to scope carefully)
Controls
- Do not require MFA
- Optional: require trusted location (see below)
This is the only supported way to prevent MFA from breaking Cisco ISE authentication without disabling MFA per-user.
Microsoft explicitly states that public clients cannot be included/excluded at the cloud app level, therefore client app type is required