05-18-2018 11:55 AM - edited 01-04-2019 08:13 AM
On Windows OS native supplicant, there is a setting that reads ‘Automatically use my Windows logon name and password (and domain if any)’. This setting allows OS to reuse PC login credential for 802.1X authentication to gain network access, thus saving user from having to login twice using same credentials for both the PC and the network. This was not possible on Google Chromebook prior to OS v66 so as a workaround SAML was used to gather user identity instead as documented in Google Suite Guest SSO (Single Sign On) with ISE via SAML for Chromebooks. Google Chrome OS v66 introduced a new feature where user can SSO to the network using Google login credentials. Previously, when the network requires 802.1X authentication, the Chromebook user had to sign-in to the Chromebook using Google account and then connect to the network by providing credentials which may or may not be identical to the Chromebook sign-in credential. With the new feature on v66, domain admin can configure enrolled Chromebooks with WiFi settings, where it can reuse Chromebook sign-in credential for network login automatically. This requires the authentication server, typically a RADIUS server to be able to authenticate using the Google account which is not possible with ISE today. As a workaround, customer can synchronize accounts to Google domain from an on-prem AD server that ISE can authenticate with. The setup is shown in the following diagram:
Note: Steps 1 - 10 is not required if the ISE EAP identity certificate is already generated as 2048 key length and SHA-256 digest.
Create Initial Wi-Fi profile so Chromebook is connected to the G-Suite prior to user login. This step can be modified to open SSID instead if such SSID allows access to G-Suite resources.
Setting | Value |
---|---|
Name | SECURED-PRE |
Service set identifier (SSID) | SECURED |
Automatically connect | Checked |
Security type | WPA/WPA2 Enterprise (802.1X) |
Extensible Authentication Protocol | PEAP |
Inner Protocol | MS-CHAP v2 |
Outer identity | PreAuth |
Username | Service account setup for preauth access. This could be G-Suite account or AD/Internal account |
Password | Service account password |
Server Certificate Authority | ISE EAP Identity Certificate previously imported |
Restrict access to this Wi-Fi network by platform | Chromebooks |
Apply network | by device |
Setting | Value |
---|---|
Name | SECURED-USER |
Service set identifier (SSID) | SECURED |
Automatically connect | Checked |
Security Type | WPA/WPA2 Enterprise (802.1X) |
Extensible Authentication Protocol | PEAP |
Inner Protocol | MS-CHAP v2 |
Outer identity | OuterID |
Username | ${LOGIN_ID} |
Password | ${PASSWORD} |
Server Certificate Authority | ISE EAP Identity Certificate previously imported |
Restrict access to this Wi-Fi network by platform | Chromebooks |
Apply network | by user |
Running into an issue when trying to save the "User WiFi Profile". The Google console throws an error stating "A network with this SSID and security type already exists". Made sure the network is being applied by user. Any ideas? I suppose a work around would be 2 separate SSID's for pre and post logon. According to this doc it should be able to be done on a single SSID.
@michaelpassalacqua Note that one of the two Wi-Fi profiles I've created are applied to the user while the other one is applied to the device.
Thanks for providing the guide.
We've encountered an issue when users try to log into the configured SSID, we get the following error on the chromebooks 'Authentication certificate rejected locally'.
Are there any steps we need to take to resolve this message?
Thanks
seankin, that generally means the ISE RADIUS/EAP certificate is not trusted by the chromebook. I would double check that ISE RADIUS/EAP certificate has been imported and trusted by the client for the connection.
Sorry to dig up an old thread, but the 'Authentication certificate rejected locally' is something we can't get over @howon. I verified by going to the chrome://settings/certificates and seeing the EAP certificate in Others. Plus I even added our corporate Root/Intermediate certificate and I see them under Authority section. But still the 'Authentication certificate rejected locally' appears. These certs are internal only and not publicly signed.
I've verified the certs are valid, they do not expire until 2030 and using SHA256 with RSA other than that there is not much to go on. Any information will help. Thank you.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: