<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE and EAP-TLS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960242#M404491</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;If I only want to install the certificate manually on the user device does I still need a SCEP server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Apr 2013 22:40:09 GMT</pubDate>
    <dc:creator>rchockeelopez</dc:creator>
    <dc:date>2013-04-22T22:40:09Z</dc:date>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960217#M404396</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We're planning on implementing eap-tls for our corporate iPads and in the past I've successfully tested it authenticating against ACS5.3 but now that we've moved to ISE (1.1.1.24) I'm getting an error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://ari-net-ise1.nhsg.grampian.scot.nhs.uk/mntreport/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Fiseadmin%2FFailure_Reason%2FAuthentication_Failure_Code_Lookup.rptdesign&amp;amp;rptFailureReason=22045+Identity+policy+result+is+configured+for+password+based+authentication+methods+but+received+certificate+based+authentication+request&amp;amp;__locale=en_US&amp;amp;iportalID=TSDQNRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="color: red; margin-top: 0pt;" target="_self"&gt;22045&amp;nbsp; Identity policy result is configured for password based authentication&amp;nbsp; methods but received certificate based authentication request&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried two different profiles, one with a certificates and AD credentials and the other one with just certificates but the error message is the same for both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EAP-TLS is enabled in&amp;nbsp; the 'Default Network Access' authentication result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone shine a light on where I'm going wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960217#M404396</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2019-03-11T02:22:14Z</dc:date>
    </item>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960218#M404397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to define a certificate authentication profile and then select this as the result (Identity Source) in the authentication policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can create a certicate authentication profile at: Administration-&amp;gt;Identity management-&amp;gt;External Identity Sources-&amp;gt;Certificate Authentication Profile&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There error you are seeing occurs when trying to "authenticate" the request based on a clinet certifcate but result is an identity store (AD, LDAP etc)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2012 10:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960218#M404397</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2012-08-01T10:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960219#M404398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you go the authentication policy page and expand your rules you can choose the result to be certificate authentication profile that you created.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a mixture of peap or other password based methods, your best option is to create an identity sequence store. This allows you to use a certificate authentication profile along with a list of databases for password based authentication also. One you create this rule, go back to authentication policies and set this as the result and you should be good to go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2012 10:49:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960219#M404398</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-01T10:49:32Z</dc:date>
    </item>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960220#M404400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help so far Tarik and jrabinow I'm no longer getting that message, instead I'm getting the following message when I try to connect:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;12519 EAP-TLS failed SSL/TLS handshake because of an unsupported certificate in the client certificate chain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We're using MS certificate services, the ipad has the root CA certificate and the active ca services server certificate as well as the user certificate. The ISE has a certificate generated on the active cert services server&amp;nbsp; and also has the root CA certificate in it's certificate store.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the certificates seem to be valid back to the root CA certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 15:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960220#M404400</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2012-08-06T15:32:49Z</dc:date>
    </item>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960221#M404401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any intermediate certificates? If so, then you will have to import those in to the ISE certificate trusted certificate store, and you will have to select the checkbox "Trust for client with eap-tls"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_cert.html#wp1053515"&gt;http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_cert.html#wp1053515&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 15:47:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960221#M404401</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-06T15:47:00Z</dc:date>
    </item>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960222#M404403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We've got 1.1 so the options are a bit different but I've installed the root certificate and the ca server certificate on ISE in the certificate store and 'Trust for client authentication' is enabled. &lt;/P&gt;&lt;P&gt;There is a sub-option 'Enable Validation of Certificate Extensions (accept only valid certificate)' that I enabled when I installed the certificate but when I look at it now it's greyed out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition the primary and secondary ISE certificates also has the trust option enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 07:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960222#M404403</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2012-08-07T07:37:47Z</dc:date>
    </item>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960223#M404406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post a screeshot of the certificate that is installed on the Ipad? Also post a screenshot of the certificate on ISE. I would like to see the serial numbers of the root to see if they are identical.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 07:41:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960223#M404406</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-07T07:41:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960224#M404408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Screenshots attached&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 09:02:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960224#M404408</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2012-08-07T09:02:14Z</dc:date>
    </item>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960225#M404411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you get me the screenshot of the root certificate that is installed on the ipad, along with another screenshot of the user certificate (I will like to see the "issued to" and "issued by" attributes)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 10:39:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960225#M404411</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-07T10:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960226#M404415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The root certificate on the iPad is the same as the root certificate on the ISE, see the attached images.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 12:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960226#M404415</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2012-08-07T12:40:16Z</dc:date>
    </item>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960227#M404418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There seems to be an intermediate certificate or you have the wrong root certificate imported into the ISE. Can you click on the certificate path (top right tab). Take a look at the "issued by" field in the usercert.png and then look at the name of the root certs that you attached. The signer of your user cert is NHSG-CS-01, the root cert on the ISE node is NHSG-CS-ROOT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 17:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960227#M404418</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-07T17:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960228#M404423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NHSG-CS-01 is the active CS server that issued the certificate, NHSG-CS-ROOT is off at the recommendation of a microsoft employee when she helped our server team setup CS an so can't issue certificates.&lt;/P&gt;&lt;P&gt;The NHSG-CS-01 certificate is on both the iPad and ISE and on the ISE it's enabled for authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2012 08:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960228#M404423</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2012-08-08T08:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960229#M404429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;P&gt;So I removed NHSG-CS-ROOT from both the iPad profile and the ISE certificate store leaving the ipad with only the personal certificate and the NHSG-CS-01 certificate. &lt;/P&gt;&lt;P&gt;The ISE certificate store now has with both primary and secondary ISE certificates and the NHSG-CS-01 certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the two ISE certificates I've unchecked the 'Trust for client authentication' check boxes so the only certificate in the certificate store that has that check box checked is NHSG-CS-01.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authentication is still failing with the same message about the unsupported certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interestingly each time I appy the policy to the ipad and try to connect wirelessly it prompts to accept the primary ISE certificate that was issued by NHSG-CS-01, that shouldn't be happening should it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2012 12:44:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960229#M404429</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2012-08-08T12:44:45Z</dc:date>
    </item>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960230#M404432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Martin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post the certificate path using windows so I can see the whole path of the user cert and the full details of it also (I need to see the key usage and enhanced key usage). Also I need to see the full details of the NHSG-CS-01 (path and key usage and enhanced key usage). It may be that you are using a signing certificate to issue this cert and that might not be supported since we need server authentication OID to present in order to use certificate based authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ise/1.0/install_guide/ise10_vmware.html#wp1053064"&gt;http://www.cisco.com/en/US/docs/security/ise/1.0/install_guide/ise10_vmware.html#wp1053064&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;take a look at figure 4-3 for this setting on the vmswitch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2012 14:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960230#M404432</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-08T14:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960231#M404436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've attached the path detail, etc.&lt;/P&gt;&lt;P&gt;There was no extended key usage in the NHSG-CS-01 certificate, key usage was Digital Signature, Certificate Signing, Off-line CRL Signing and CRL Signing (86).&lt;/P&gt;&lt;P&gt;In the personal certificate the key usage was Digital Signature, Key Encipherment (a0) and the enhanced key usage was Server Authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2012 08:27:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960231#M404436</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2012-08-09T08:27:15Z</dc:date>
    </item>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960232#M404441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Martin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then that makes sense, since the ISE uses certificate based authentication when using eap-tls the certificate doesnt have the OIDs to support certificate based authentication. Here is a guide that shows the requirements needed in order to authenticate clients via certificates:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://support.microsoft.com/kb/814394"&gt;http://support.microsoft.com/kb/814394&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the comment in the article in this case the IAS is the radius server and the same holds true for ISE:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The IAS or the VPN server computer certificate is configured with the&amp;nbsp; Server Authentication purpose. The object identifier for Server&amp;nbsp; Authentication is 1.3.6.1.5.5.7.3.1. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the Cisco eap-tls deployment guide which references the same as above:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a008009256b.shtml#wp39121"&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a008009256b.shtml#wp39121&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2012 13:18:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960232#M404441</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-09T13:18:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960233#M404445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help, that makes sense even to me now that you've pointed it out. I know very little about certificates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've asked one of my colleagues in our server team to add the usage to the template and once he does I'll test and update this discussion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2012 13:56:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960233#M404445</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2012-08-09T13:56:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960234#M404451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Annoyingly we've now got a client certificate with client authentication and server authentication as the enhanced key usage but we're now hitting a different error message, 22047 "Principal username attribute is missing in client certificate".&lt;/P&gt;&lt;P&gt;So the client certificate has the extended attributes of Server Authentication and Client Authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2012 15:06:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960234#M404451</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2012-08-10T15:06:48Z</dc:date>
    </item>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960235#M404456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please post a screenshot of you user cert. If there isnt a prinicpal username then we need to see if the subject alternative name contains the correct format of the username.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2012 16:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960235#M404456</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-10T16:48:13Z</dc:date>
    </item>
    <item>
      <title>ISE and EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960236#M404458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;P&gt;You're right, there is no subject alternative name (or principal name) on my user certificate so I had a look at a certificate I generated from the User template and it does have a subject alternative name which contains:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other Name:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Principal Name=&lt;AD username=""&gt;@&lt;FULL ad="" domain=""&gt;&lt;/FULL&gt;&lt;/AD&gt;&lt;/P&gt;&lt;P&gt;RFC822 Name=&lt;EMAIL address="" associated="" with="" my="" ad="" account=""&gt;&lt;/EMAIL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I presume thats what should be in the personal certificate I generate for the iPad?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 08:01:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-eap-tls/m-p/1960236#M404458</guid>
      <dc:creator>M. Wisely</dc:creator>
      <dc:date>2012-08-13T08:01:26Z</dc:date>
    </item>
  </channel>
</rss>

