<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using OUID for Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-ouid-for-authentication/m-p/3911718#M457682</link>
    <description>&lt;P&gt;So it sounds like I could match on the AD's guid, but what I'm trying to do is validate an eap-tls user based on possession of the client certificate AND somehow lining their guid up with finding them in AD as my external identity source.&amp;nbsp; Currently it seems like AD is only searchable from an authorization perspective looking at my conditions.&lt;/P&gt;</description>
    <pubDate>Wed, 21 Aug 2019 15:22:15 GMT</pubDate>
    <dc:creator>s1nsp4wn</dc:creator>
    <dc:date>2019-08-21T15:22:15Z</dc:date>
    <item>
      <title>Using OUID for Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ouid-for-authentication/m-p/3909234#M457631</link>
      <description>&lt;P&gt;ISE 2.4 Patch 9&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way (conditionally or otherwise) I can get ISE to match on object guid?&amp;nbsp; We currently use EAP-TLS for wireless authentication, but I want it so not only do users have to have a client certificate provided by us, the guid on that cert must be used as an attribute that ISE will search AD for before allowing the person on the network.&amp;nbsp; I've searched all the attributes and see plenty of issuer and subject-based attributes, but nothing specific to guid.&amp;nbsp; The thought process is that usernames and emails can change, but a globally unique id won't ever change.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 14:50:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ouid-for-authentication/m-p/3909234#M457631</guid>
      <dc:creator>s1nsp4wn</dc:creator>
      <dc:date>2019-08-16T14:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: Using OUID for Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ouid-for-authentication/m-p/3911231#M457633</link>
      <description>&lt;P&gt;&lt;A href="https://support.microsoft.com/en-us/help/291010/requirements-for-domain-controller-certificates-from-a-third-party-ca" target="_blank"&gt;Requirements for domain controller certificates from a third-party CA&lt;/A&gt;&amp;nbsp;shows to include the domain controller GUID in an other name entry of the subject alternative name. If so, you may condition on&amp;nbsp;CERTIFICATE·Subject Alternative Name - Other Name&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 02:34:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ouid-for-authentication/m-p/3911231#M457633</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-08-21T02:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: Using OUID for Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ouid-for-authentication/m-p/3911718#M457682</link>
      <description>&lt;P&gt;So it sounds like I could match on the AD's guid, but what I'm trying to do is validate an eap-tls user based on possession of the client certificate AND somehow lining their guid up with finding them in AD as my external identity source.&amp;nbsp; Currently it seems like AD is only searchable from an authorization perspective looking at my conditions.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 15:22:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ouid-for-authentication/m-p/3911718#M457682</guid>
      <dc:creator>s1nsp4wn</dc:creator>
      <dc:date>2019-08-21T15:22:15Z</dc:date>
    </item>
  </channel>
</rss>

