<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Certificate-based authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3798502#M485665</link>
    <description>&lt;P&gt;John,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;OU or other field:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;not suitable to determine the identity, not suitable for authentication&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;suitable for conditions in the authorization rules, so you can assign different results for different values&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 09 Feb 2019 21:37:32 GMT</pubDate>
    <dc:creator>Peter Koltl</dc:creator>
    <dc:date>2019-02-09T21:37:32Z</dc:date>
    <item>
      <title>ISE Certificate-based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3793524#M485656</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a customer that need to authenticate and authorize endpoints using some advanced certificate fields like extended key usage, organization unit and much more without going to any other external identity source like AD , just from the certificate fields using EAP-TLS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it&amp;nbsp;possible ?&amp;nbsp;If yes is below steps&amp;nbsp;are the right way to do it or there is a missing or wrong piece ?&lt;/P&gt;&lt;P&gt;1- import PKI CA certificate and intermediate certificates as trusted to ISE, and sign the ISE self-signed certificate from the CA.&lt;/P&gt;&lt;P&gt;2- create CAP and will not specify any identity store.&lt;/P&gt;&lt;P&gt;3- create authentication policy to match endpoints certificate with the trusted chain.&lt;/P&gt;&lt;P&gt;4- create authorization policy using fields from certificate, like from organization unit X and departement Y apply that authorization profile and so on.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Feb 2019 18:26:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3793524#M485656</guid>
      <dc:creator>john5</dc:creator>
      <dc:date>2019-02-02T18:26:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate-based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3793612#M485658</link>
      <description>&lt;P&gt;For certificate based authentication following options are available:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="certification based.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/29190iC21394540CC6A2A0/image-size/large?v=v2&amp;amp;px=999" role="button" title="certification based.png" alt="certification based.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Feb 2019 03:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3793612#M485658</guid>
      <dc:creator>pan</dc:creator>
      <dc:date>2019-02-03T03:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate-based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3793620#M485661</link>
      <description>&lt;P&gt;Hi pan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so there is no way to authenticate and authorize them based on something like organization unit or department or other certificate fields , right ?&lt;/P&gt;</description>
      <pubDate>Sun, 03 Feb 2019 04:03:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3793620#M485661</guid>
      <dc:creator>john5</dc:creator>
      <dc:date>2019-02-03T04:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate-based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3798502#M485665</link>
      <description>&lt;P&gt;John,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;OU or other field:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;not suitable to determine the identity, not suitable for authentication&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;suitable for conditions in the authorization rules, so you can assign different results for different values&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Feb 2019 21:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3798502#M485665</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2019-02-09T21:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate-based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3798697#M485670</link>
      <description>&lt;P&gt;Just to expand on this.&amp;nbsp; Don't confuse authentication and authorization.&amp;nbsp; Each of them act independently.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the authentication phase, you use an certificate authentication profile (CAP) to tell ISE where to find the identity in the certificate.&amp;nbsp; Usually the general SAN field setting is all you need, i.e. don't specify where in the SAN field.&amp;nbsp; If you don't tie the CAP into AD there is no AD lookup in the authentication phase.&amp;nbsp; All ISE is validating during authentication is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The cert is issued by a CA ISE trusts for client authentication.&lt;/LI&gt;
&lt;LI&gt;The cert is not expired.&lt;/LI&gt;
&lt;LI&gt;The cert is not revoked.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Once you move to authorization you have the many options available to you.&amp;nbsp; You can use information in the cert (OU, O, etc.) to provide different authorization results.&amp;nbsp; You can also have ISE take the identity pulled during authentication and do an AD lookup for AD group attributes or any other AD attributes you have mapped into ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Feb 2019 16:05:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3798697#M485670</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-02-10T16:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate-based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3798968#M485673</link>
      <description>Hi John,&lt;BR /&gt;&lt;BR /&gt;Just to add on this.&lt;BR /&gt;You can use the Cert attributes fields in the authentication policy to determine let's say if this certificate issuer common name= X then authenticate against this CAP file (you can perform this by using the sub-rule option in the authentication policy).&lt;BR /&gt;In the CAP file you don't need to specify an AD to lookup against.&lt;BR /&gt;But the Cert field specified in the CAP must exist in the certificate otherwise it will fail + it will perform the checks that Paul mentioned in his reply.&lt;BR /&gt;Then in the authorization policy you can also use the cert fields to add an authorization profile with DACL,Vlan ....&lt;BR /&gt;I attached this snapshot from my ISE config and it is working fine.</description>
      <pubDate>Mon, 11 Feb 2019 08:12:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3798968#M485673</guid>
      <dc:creator>bern81</dc:creator>
      <dc:date>2019-02-11T08:12:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate-based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3798971#M485675</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sample-1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/29808i63F24440E59DFCB8/image-size/large?v=v2&amp;amp;px=999" role="button" title="sample-1.PNG" alt="sample-1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 08:14:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-based-authentication/m-p/3798971#M485675</guid>
      <dc:creator>bern81</dc:creator>
      <dc:date>2019-02-11T08:14:36Z</dc:date>
    </item>
  </channel>
</rss>

