End-to-End Flow: Authentication + Authorization + Posture

1. The core idea

Authentication and posture do not “happen inside ISE”. They are distributed transactions across:

  • Endpoint ↔ NAD

  • NAD ↔ ISE (RADIUS/EAP)

  • ISE ↔ identity sources (AD/LDAP/Kerberos)

  • Endpoint posture module ↔ ISE posture services (often HTTPS-based)

  • Certificate validation components (CRL/OCSP) when certificates are used

  • DNS and NTP that keep the above functioning

Every additional hop adds RTT, jitter sensitivity, and failure probability.


2. Actors and responsibilities

Endpoint (Supplicant)

  • Initiates 802.1X/EAP conversation (wired or wireless), or VPN auth.

  • May run posture module (Cisco Secure Client / AnyConnect ISE posture module).

  • Uses certificates (EAP-TLS) or username/password (PEAP/EAP-MSCHAPv2, etc).

NAD (Network Access Device)

Examples: switch, WLC, VPN headend, firewall, controller.

  • Acts as the first policy enforcement point (PEP).

  • Relays EAP inside RADIUS (EAPoL ↔ RADIUS EAP messages).

  • Handles UDP retransmissions and timeouts at the RADIUS layer.

  • Applies VLAN/SGT/dACL/ACL decisions from ISE.

Cisco ISE

  • Policy engine (PDP) for authentication and authorization.

  • Session state controller.

  • Integrates with external identity stores (AD, LDAP).

  • Hosts posture services and posture policy evaluation.

  • Returns Access-Accept/Reject/Challenge plus authorization attributes.

Identity stores (AD / LDAP / Kerberos)

  • Validate machine/user identity and group membership.

  • Require DNS correctness, time synchronization, and correct site selection.


3. A practical sequence (high-level)

spinner

4. Why latency hits posture harder than authentication

Authentication is often a bounded handshake (though it can be multi–round-trip under EAP).

Posture, however, is stateful and can involve:

  • Requirement retrieval

  • Local checks (processes, registry, AV status, file versions)

  • Optional remediation

  • Periodic reassessment

  • CoA events / session updates

Each of these steps adds time and introduces additional dependencies, which magnify the impact of latency.


5. The “single cause” myth

When people say “ISE is slow”, they often ignore the broader dependency chain, including:

  • NAD ↔ ISE RTT

  • ISE ↔ AD RTT

  • DNS resolution time for service discovery and SRV records

  • Kerberos time skew sensitivity (NTP)

  • PKI revocation checking delays (CRL / OCSP)

  • Posture module communications and reassessment intervals

ISE is frequently where the symptoms surface, not where the root cause actually lives.


Last updated