<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authentication using username-password/certificates by ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859307#M472872</link>
    <description>Please explain further your exact needs and why:&lt;BR /&gt;We already have EAP chaining for windows that ties together machine and user credentials with Anyconnect NAM&lt;BR /&gt;For Mac and windows You can do machine certificates with CWA chaining&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 20 May 2019 12:09:29 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2019-05-20T12:09:29Z</dc:date>
    <item>
      <title>Authentication using username-password/certificates by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859161#M472870</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a use case where users should be authenticated by username-password/certificates both simultaneously for Windows/Mac. Is this possible?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Rakesh Kumar&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2019 07:49:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859161#M472870</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-05-20T07:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using username-password/certificates by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859307#M472872</link>
      <description>Please explain further your exact needs and why:&lt;BR /&gt;We already have EAP chaining for windows that ties together machine and user credentials with Anyconnect NAM&lt;BR /&gt;For Mac and windows You can do machine certificates with CWA chaining&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 20 May 2019 12:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859307#M472872</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-20T12:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using username-password/certificates by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859309#M472873</link>
      <description>&lt;P&gt;Not talking about EAP-chaining which combines user/machine authentication. Here is the use case:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Authenticating users by using password and certificates both simultaneously for windows/mac.&lt;/LI&gt;
&lt;LI&gt;Authenticating machines by using password and certificates both simultaneously for windows/mac.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 20 May 2019 12:13:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859309#M472873</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-05-20T12:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using username-password/certificates by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859334#M472876</link>
      <description>You have several security protocols that you can use to accomplish either/or. From a security standpoint you are better off using certificates with eap-tls. Why couldnt you enforce CAC authentication to the domain that authenticates the user based on user principal name, and then implement NAM to auth the computer via certificate and the user either with cert or common access card.</description>
      <pubDate>Mon, 20 May 2019 13:05:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859334#M472876</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-05-20T13:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using username-password/certificates by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859455#M472877</link>
      <description>Supplicants only send 1 or the other at a time. You can do machine auth before login and then user auth upon login (windows). Please explain further why and how&lt;BR /&gt;</description>
      <pubDate>Mon, 20 May 2019 15:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859455#M472877</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-20T15:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using username-password/certificates by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859494#M472879</link>
      <description>If that is directed at me I missed the simultaneously piece. However, if there are already solutions available to auth both users &amp;amp; comps via certificates I dont see a benefit to adding username/pass. Just my opinion. Regardless, I dont know enough about the requirements to provide more details.</description>
      <pubDate>Mon, 20 May 2019 15:55:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859494#M472879</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-05-20T15:55:56Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using username-password/certificates by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859919#M472880</link>
      <description>&lt;P&gt;Guys,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First of all, my use case is not related to EAP-chaining. This is similar to what works for anyconnect where ASA validates the user's certificate first, then checks with RADIUS server to validate user's password.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me try again to explain the customer's requirement again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;User 'John' has a corporate laptop. For instance, keep laptop authentication out of this. When John tries to connect to network, he should be authenticated by his password as well as certificate provided to him. ISE should be able to validate both types of credentials.&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2019 08:20:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3859919#M472880</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-05-21T08:20:51Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using username-password/certificates by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3861049#M472881</link>
      <description>&lt;P&gt;Jason already answered. ASA supports multiple authentications combining with user/machine certificate for remote-access VPN connections while ISE is supporting mostly single authentications, except for EAP chaining and CWA chaining for wired and wireless.&lt;/P&gt;
&lt;P&gt;I agreed with&amp;nbsp;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/833210" target="_blank"&gt;Mike.Cifelli&lt;/A&gt;&amp;nbsp;that using MFA, such as smart cards (e.g. CAC cards), is the way to go.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 16:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3861049#M472881</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-05-22T16:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using username-password/certificates by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3861315#M472882</link>
      <description>Understood, thank you all.</description>
      <pubDate>Thu, 23 May 2019 04:01:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-using-username-password-certificates-by-ise/m-p/3861315#M472882</guid>
      <dc:creator>raksec</dc:creator>
      <dc:date>2019-05-23T04:01:53Z</dc:date>
    </item>
  </channel>
</rss>

