<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authorization policies using certificates in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3989281#M455406</link>
    <description>&lt;P&gt;Thanks Mike and Andrea.&lt;BR /&gt;So on authentication part, if we integrate ISE with internal CA, would ISE be able to validate user's certificates?&lt;/P&gt;
&lt;P&gt;Second, I can find the requirements for CA to interoperate with ISE in compatibility guide. However, how about this case? Is this enough if I say that &lt;SPAN&gt;X.509 certificates&lt;/SPAN&gt;&amp;nbsp;issues by internal CA should be &lt;SPAN&gt;in Privacy-Enhanced Mail (PEM) or Distinguished Encoding Rule (DER) format?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 26 Nov 2019 12:13:35 GMT</pubDate>
    <dc:creator>raksec</dc:creator>
    <dc:date>2019-11-26T12:13:35Z</dc:date>
    <item>
      <title>Authorization policies using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3988911#M455401</link>
      <description>&lt;P&gt;Hello Experts,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The requirement is to provide different level of access to employees/contractors based on the department/BU they belong to. The employees/contractors would fall into different groups, e.g. employee1, employee2, contractor1, contractor2, and so on.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customer doesn't have an AD. They have Okta, but ISE-Okta integration doesn't provide user group details to ISE so we can't have authorization policies based on user group membership.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this case, we are thinking to use certificates to not only authenticate, but also to authorize employees/contractors. Customer agreed to deploy an internal Certificate Authority. However, before we proceed I wanna check the possibilities. We wanna use certificate attributes to provide different level of access to different user groups. How flexible and scalable is the solution? Any suggestions or recommendations?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Rakesh Kumar&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2019 14:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3988911#M455401</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-11-25T14:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policies using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3989062#M455403</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;basically you could think to apply different AuthZ policies based on CN.&lt;/P&gt;&lt;P&gt;If you use different CN for each department you can think to use this attribute for assigning different AuthZ result.&lt;/P&gt;&lt;P&gt;CN could be based on the hostname of the client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2019 17:11:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3989062#M455403</guid>
      <dc:creator>AndreaTornaghi</dc:creator>
      <dc:date>2019-11-25T17:11:54Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policies using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3989095#M455405</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/47336"&gt;@AndreaTornaghi&lt;/a&gt;&amp;nbsp;mentioned for Authz you have the ability to utilize several unique identifiers based on cert attributes.&amp;nbsp; From a pki perspective you could potentially manage different cert templates for each group.&amp;nbsp; For Authc you could use a CAP with the identity store set to 'not applicable'.&amp;nbsp; Essentially Authc would only occur based on trusted certs.&amp;nbsp; Then rely on Authz conditions to push policy based on unique identifiers.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2019 17:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3989095#M455405</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-11-25T17:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policies using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3989281#M455406</link>
      <description>&lt;P&gt;Thanks Mike and Andrea.&lt;BR /&gt;So on authentication part, if we integrate ISE with internal CA, would ISE be able to validate user's certificates?&lt;/P&gt;
&lt;P&gt;Second, I can find the requirements for CA to interoperate with ISE in compatibility guide. However, how about this case? Is this enough if I say that &lt;SPAN&gt;X.509 certificates&lt;/SPAN&gt;&amp;nbsp;issues by internal CA should be &lt;SPAN&gt;in Privacy-Enhanced Mail (PEM) or Distinguished Encoding Rule (DER) format?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 12:13:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3989281#M455406</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-11-26T12:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policies using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3989526#M455407</link>
      <description>You will need to ensure that the cert chain is in the ISE trust store. There is an Authz condition that looks like this that could be referenced: NetworkAccess:AuthenticationMethod EQUALS x509_PKI. Again, I would look into using unique identifiers to differentiate the groups. Check out the CERTIFICATE authz conditions for more detail on your available options.</description>
      <pubDate>Tue, 26 Nov 2019 14:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3989526#M455407</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-11-26T14:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policies using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3990014#M455408</link>
      <description>Thanks Mike.&lt;BR /&gt;&lt;BR /&gt;My question was on compatibility of ISE with a Certificate Authority. Customer has to choose a CA solution to deploy with the help of a third party. However, I have to make sure that the CA solution they choose should be compatible with ISE. Any suggestions on this part? &lt;BR /&gt;&lt;BR /&gt;I found some info in ISE compatibility guide:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/compatibility/b_ise_sdt_26.html#requirementsforca" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/compatibility/b_ise_sdt_26.html#requirementsforca&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Is the info provided by the link relevant to the requirement?</description>
      <pubDate>Wed, 27 Nov 2019 10:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3990014#M455408</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-11-27T10:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policies using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3990087#M455409</link>
      <description>The info in the link is relevant. Few things to note are: I would not rely on ISE as an enterprise CA solution. Pretty sure Cisco docs state that too. In my experiences Microsoft Active Directory Certificate Services is typically the third party ideal/preferred solution. However, this will vary upon customer requirements. I have managed several internal MS-AD CS pki, and have found it to be straightforward &amp;amp; easy to manage. Easy from the viewpoint of being able to manage certain components such as auto-enrollment via GPOs. HTH!</description>
      <pubDate>Wed, 27 Nov 2019 13:25:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3990087#M455409</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-11-27T13:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policies using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3990227#M455410</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/833210"&gt;@Mike.Cifelli&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;The info in the link is relevant. Few things to note are: I would not rely on ISE as an enterprise CA solution. Pretty sure Cisco docs state that too. In my experiences Microsoft Active Directory Certificate Services is typically the third party ideal/preferred solution. However, this will vary upon customer requirements. I have managed several internal MS-AD CS pki, and have found it to be straightforward &amp;amp; easy to manage. Easy from the viewpoint of being able to manage certain components such as auto-enrollment via GPOs. HTH!&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;that's correct, its only meant to produce certificates for clients authenticating to ISE (pxgrid clients, endpoints doing BYOD, and those endpoints that can't do BYOD (linux, iot, etc) but can onboard manually using the certificate provisioning portal). Its not meant for items like your web servers,etc&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 16:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3990227#M455410</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-11-27T16:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: Authorization policies using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3990552#M455411</link>
      <description>Thanks Jason and Mike.</description>
      <pubDate>Thu, 28 Nov 2019 04:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authorization-policies-using-certificates/m-p/3990552#M455411</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-11-28T04:33:35Z</dc:date>
    </item>
  </channel>
</rss>

