<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE certificate based authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862532#M472700</link>
    <description>&lt;P&gt;Jason, Mike,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What you guys are saying that makes sense. So how do we configure this? What's the recommended configuration in ISE to validate endpoint's certificates issued by ISE?&lt;/P&gt;</description>
    <pubDate>Fri, 24 May 2019 16:47:10 GMT</pubDate>
    <dc:creator>raksec</dc:creator>
    <dc:date>2019-05-24T16:47:10Z</dc:date>
    <item>
      <title>ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862247#M472694</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a customer who doesn’t have on-prem user directory and CA. They are very much interested in ISE. However, the challenge is to have dot1x authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can we use certificate based authentication for dot1x and configure ISE to act as a CA server and issue certificates to endpoints? I know that ISE issues the certs for BYOD only. But I think we can use certificate provisioning portal to manually download and install the certs to endpoints. So in this case, when the certificates are issued by ISE and dot1x is triggered, how can ISE validate the endpoint’s certificate?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;P.S. Cucstomer doesn’t want to create local user database in ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Rakesh Kumar&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 10:46:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862247#M472694</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-05-24T10:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862273#M472695</link>
      <description>You can certainly do that with ISE. It would work.&lt;BR /&gt;&lt;BR /&gt;How would you validate whose authenticating? One user would be initiating the every download since you aren’t able to authenticate the user using the portal?&lt;BR /&gt;&lt;BR /&gt;What are they using for an identity source? Perhaps a proxy could be setup?&lt;BR /&gt;&lt;BR /&gt;Seems like a lot of manual labor.&lt;BR /&gt;</description>
      <pubDate>Fri, 24 May 2019 11:51:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862273#M472695</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-24T11:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862278#M472696</link>
      <description>&lt;P&gt;Hi Jason,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been posting a lot of questions these days and all are about the same customer. They have Jumpcloud, which is directory as a service in cloud. I checked with some folks and found that Jumpcloud is not supported/validated. Apart from that, they have G-Suite and JAMF for MAC users.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So if we have admin downloading all the certificates for all the endpoints, the distribution can be done using any other medium. Let's assume that is not a problem. Consider endpoints are having certificates then how ISE would validate them without having AD/LDAP/Local database?&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 12:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862278#M472696</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-05-24T12:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862291#M472697</link>
      <description>Consider endpoints are having certificates then how ISE would validate them without having AD/LDAP/Local database?&lt;BR /&gt;&lt;BR /&gt;As long as the internal ISE Chain is in your trusted store in ISE and you confirm they can be used for authentication then there should not be any problems there. ISE will actually maintain record of issued certificates and you can tweak the internal CA settings. The PSNs act as an OCSP responder for the internal ISE CA that will be used to verify. Also, if interested I am pretty sure you can use scep with the internal ISE CA.&lt;BR /&gt;&lt;BR /&gt;HTH!</description>
      <pubDate>Fri, 24 May 2019 12:19:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862291#M472697</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-05-24T12:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862293#M472698</link>
      <description>Is there anyway they could automate this with JAMF as an MDM EMM? These have their own CA sometimes as well. They might be able to authenticate to the cloud.&lt;BR /&gt;&lt;BR /&gt;What about some sort of authentication proxy?&lt;BR /&gt;&lt;BR /&gt;I would recommend trying out the certificate provisioning portal to see what’s going on so you understand. But pretty sure that it would work by generating generic certs per endpoint.&lt;BR /&gt;&lt;BR /&gt;You really should think about&lt;BR /&gt;</description>
      <pubDate>Fri, 24 May 2019 12:22:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862293#M472698</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-24T12:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862317#M472699</link>
      <description>I don’t see how this is an issue if they’re not using user name validation and authorization policy. If they’re just validating that the certificate is good from its own internal certificate authority then why wouldn’t that work fine?&lt;BR /&gt;</description>
      <pubDate>Fri, 24 May 2019 13:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862317#M472699</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-24T13:04:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862532#M472700</link>
      <description>&lt;P&gt;Jason, Mike,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What you guys are saying that makes sense. So how do we configure this? What's the recommended configuration in ISE to validate endpoint's certificates issued by ISE?&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 16:47:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862532#M472700</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-05-24T16:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862546#M472701</link>
      <description>Recommendation would be to setup the ise certificate authority and authorization rules&lt;BR /&gt;This will require plus licensing minimum 100 to cover the use of the certificate portal. Unless of course you’re profiling devices as well&lt;BR /&gt;&lt;BR /&gt;Very basic steps here&lt;BR /&gt;Step 1 setup CA&lt;BR /&gt;step 2 setup authorization rules&lt;BR /&gt;If EAP tls then Permit access&lt;BR /&gt;If mab then redirect to portal saying you need to be on boarded by an admin?&lt;BR /&gt;Step 3 use certificate provisioning portal (see admin guide) to generate certificates&lt;BR /&gt;Step 4 install on client and configure supplicant&lt;BR /&gt;</description>
      <pubDate>Fri, 24 May 2019 17:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862546#M472701</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-24T17:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862560#M472702</link>
      <description>&lt;P&gt;So if I understood correctly then step 2 is doing certificate validation and authorizing users?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If they don't have certs then cert provisioning will be done by step 3 and 4? But how we can have different authorization policies for different set of users?&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 17:54:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862560#M472702</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-05-24T17:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862571#M472707</link>
      <description>You have a variety of options. You just need to decide what conditions in ISE you want to utilize to accomplish both authentication &amp;amp; authorization. Examples:&lt;BR /&gt;&lt;BR /&gt;Authentication policy conditions:&lt;BR /&gt;RadiusFlowType EQUALS wired8021x&lt;BR /&gt;NetworkAccess:EAPAuthentication EQUALS EAP-TLS&lt;BR /&gt;&lt;BR /&gt;Authorization policy conditions:&lt;BR /&gt;CERTIFICATE:Subject Alt Name CONTAINS &amp;lt;your identifier&amp;gt;&lt;BR /&gt;NetworkAccess:AuthenticationMethod EQUALS x509_PKI&lt;BR /&gt;DEVICE Type EQUALS &amp;lt;your device type group/s&amp;gt;&lt;BR /&gt;&lt;BR /&gt;I suggest playing in ISE with the conditions and/or reviewing guides. HTH!</description>
      <pubDate>Fri, 24 May 2019 17:45:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862571#M472707</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-05-24T17:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862591#M472708</link>
      <description>&lt;P&gt;Thanks Jason and Mike, that was helpful. Will try with different set of conditions.&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 18:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862591#M472708</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-05-24T18:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862594#M472831</link>
      <description>Those are all the general steps&lt;BR /&gt;Per those steps You will need to look at the certificate provisioning portal in the admin guide to generate certs&lt;BR /&gt;</description>
      <pubDate>Fri, 24 May 2019 18:31:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862594#M472831</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-24T18:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862595#M472832</link>
      <description>You won’t be authenticating users unless again you connect to an external identity source through some sort of proxy or gateway&lt;BR /&gt;&lt;BR /&gt;Our compatible integration points are listed in the ise comparability matrix&lt;BR /&gt;</description>
      <pubDate>Fri, 24 May 2019 18:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862595#M472832</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-24T18:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862599#M472833</link>
      <description>&lt;P&gt;Yes Jason, you are right. We won't be able to authenticate users if we do not have a user directory (AD/Local). Using certificates also, ISE will be just able to validate the certs, not users. However, if customer agrees to this then we can have some sort of control on whether someone is having valid credentials. And having some certificate attributes in authorization conditions, ISE can apply different authorization policies to different set of users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 18:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862599#M472833</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-05-24T18:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862607#M472834</link>
      <description>Right but you want have any user credentialed entered by the user. You would have to populate certificate attributes manually and key off the data in the certificate.&lt;BR /&gt;</description>
      <pubDate>Fri, 24 May 2019 19:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3862607#M472834</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-24T19:01:20Z</dc:date>
    </item>
  </channel>
</rss>

