<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.2 EAP-TLS User Accounts in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-2-eap-tls-user-accounts/m-p/1553968#M288582</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a project to deploy dot1x wireless using using certificate authentication only - ie, once a certificate is presented to the ACS that is issued by a trusted CA, the connection is permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So no further checking of user/machine credentials required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is, in this case, is there any requirement for user accounts to be defined on the ACS?&amp;nbsp; From the documentation it isn't clear.&amp;nbsp; I am expecting that the ACS will extract the username from the certificate CN or SAN for reporting purposes, and add them as a dynamic user, so no need to define user accounts.&amp;nbsp; The clients will be varying - anything from handheld devices to Windows machines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I have this right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 00:33:41 GMT</pubDate>
    <dc:creator>paul_murphy</dc:creator>
    <dc:date>2019-03-11T00:33:41Z</dc:date>
    <item>
      <title>ACS 5.2 EAP-TLS User Accounts</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-eap-tls-user-accounts/m-p/1553968#M288582</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a project to deploy dot1x wireless using using certificate authentication only - ie, once a certificate is presented to the ACS that is issued by a trusted CA, the connection is permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So no further checking of user/machine credentials required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is, in this case, is there any requirement for user accounts to be defined on the ACS?&amp;nbsp; From the documentation it isn't clear.&amp;nbsp; I am expecting that the ACS will extract the username from the certificate CN or SAN for reporting purposes, and add them as a dynamic user, so no need to define user accounts.&amp;nbsp; The clients will be varying - anything from handheld devices to Windows machines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I have this right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-eap-tls-user-accounts/m-p/1553968#M288582</guid>
      <dc:creator>paul_murphy</dc:creator>
      <dc:date>2019-03-11T00:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 EAP-TLS User Accounts</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-eap-tls-user-accounts/m-p/1553969#M288583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No need to create a user account&lt;/P&gt;&lt;P&gt;BTW In ACS 5 the concept of a dynamic user does not apply&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 06:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-eap-tls-user-accounts/m-p/1553969#M288583</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2010-11-10T06:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 EAP-TLS User Accounts</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-eap-tls-user-accounts/m-p/1553970#M288585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So is it really as simple as this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Define the network clients: APs / WLCs + radius stuff&lt;/P&gt;&lt;P&gt;2) Issue cert to ACS&lt;/P&gt;&lt;P&gt;3) Install internal CA cert and mark as trusted&lt;/P&gt;&lt;P&gt;4) Enable EAP-TLS as the authentication mechanism&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 09:30:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-eap-tls-user-accounts/m-p/1553970#M288585</guid>
      <dc:creator>paul_murphy</dc:creator>
      <dc:date>2010-11-10T09:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 EAP-TLS User Accounts</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-eap-tls-user-accounts/m-p/1553971#M288591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, in a nutshel that's all what is needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;BR /&gt;Tiago&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;If&amp;nbsp; this helps you and/or answers your question please mark the question as&amp;nbsp; "answered" and/or rate it, so other users can easily find it.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 09:56:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-eap-tls-user-accounts/m-p/1553971#M288591</guid>
      <dc:creator>Tiago Antunes</dc:creator>
      <dc:date>2010-11-10T09:56:33Z</dc:date>
    </item>
  </channel>
</rss>

