<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACS 5.2 - Machine certificate authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-2-machine-certificate-authentication/m-p/1678568#M261319</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The result of an identity policy can reference results of one of the following kinds&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;- identity store (for password based authentication)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;- certificate authentication profile (for certificate based authentication)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The error you are seeing is when a password based authentication request is received but the result of the selected identity policy is a certificate authentication profile&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;If you want the identity policy to support both methods I think what you need to do is create an identity sequence. (&lt;SPAN class="cuesBreadcrumbStatic"&gt;Users and Identity Stores&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff;"&gt; &amp;gt;&lt;/SPAN&gt;Identity Store Sequences&lt;SPAN style="background-color: #ffffff;"&gt; &amp;gt; &lt;/SPAN&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;Create)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;- Select "Certificate Based" option and then the Certificate Authentication Profile&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;- Select "Password Based" and then the identity stores to be used for authentication&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;Then select the identity sequence as the result in the identity policy&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 May 2011 16:26:41 GMT</pubDate>
    <dc:creator>jrabinow</dc:creator>
    <dc:date>2011-05-24T16:26:41Z</dc:date>
    <item>
      <title>ACS 5.2 - Machine certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-machine-certificate-authentication/m-p/1678567#M261307</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to authenticate a windows computer in ACS 5.2 for 802.1x only with a certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Computer is from a different active directory than the one that is configured in ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried importing the cert into "external indentity Stores" &amp;gt; "certificate authorities", then setup the computer to use smart card or certificate, then selected the certificate from the other AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i look at the ACS log, here is the message i can see&amp;nbsp; :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="https://172.16.66.40/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Facsadmin%2FFailure_Reason%2FAuthentication_Failure_Code_Lookup.rptdesign&amp;amp;rptFailureReason=22044+Identity+policy+result+is+configured+for+certificate+based+authentication+methods+but+received+password+based&amp;amp;__locale=en_US&amp;amp;iportalID=TKNENRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="color: red; margin-top: 0pt;" target="_self"&gt;22044 Identity policy result is configured for certificate based authentication methods but received password based&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:06:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-machine-certificate-authentication/m-p/1678567#M261307</guid>
      <dc:creator>ThibaultMean</dc:creator>
      <dc:date>2019-03-11T01:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 - Machine certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-machine-certificate-authentication/m-p/1678568#M261319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The result of an identity policy can reference results of one of the following kinds&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;- identity store (for password based authentication)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;- certificate authentication profile (for certificate based authentication)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The error you are seeing is when a password based authentication request is received but the result of the selected identity policy is a certificate authentication profile&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;If you want the identity policy to support both methods I think what you need to do is create an identity sequence. (&lt;SPAN class="cuesBreadcrumbStatic"&gt;Users and Identity Stores&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff;"&gt; &amp;gt;&lt;/SPAN&gt;Identity Store Sequences&lt;SPAN style="background-color: #ffffff;"&gt; &amp;gt; &lt;/SPAN&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;Create)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;- Select "Certificate Based" option and then the Certificate Authentication Profile&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;- Select "Password Based" and then the identity stores to be used for authentication&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&lt;SPAN class="cuesBreadcrumbLast"&gt;Then select the identity sequence as the result in the identity policy&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 May 2011 16:26:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-machine-certificate-authentication/m-p/1678568#M261319</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2011-05-24T16:26:41Z</dc:date>
    </item>
  </channel>
</rss>

