![Understanding Authentication Policies > Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World | Cisco Press Understanding Authentication Policies > Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World | Cisco Press](https://www.ciscopress.com/content/images/chap13_9781587143250/elementLinks/13fig17_alt.jpg)
Understanding Authentication Policies > Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World | Cisco Press
![CCIE Enterprise Wireless (v1.0) – Wireless Security and Identity Management – 4.2.b Internal and external identity sources CCIE Enterprise Wireless (v1.0) – Wireless Security and Identity Management – 4.2.b Internal and external identity sources](http://www.netprojnetworks.com/wp-content/uploads/2019/12/00-9-1024x365.png)
CCIE Enterprise Wireless (v1.0) – Wireless Security and Identity Management – 4.2.b Internal and external identity sources
![Understanding Authentication Policies > Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World | Cisco Press Understanding Authentication Policies > Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World | Cisco Press](https://www.ciscopress.com/content/images/chap13_9781587143250/elementLinks/13fig02_alt.jpg)