<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RADIUS authentication to strip '@domainname.com' from user principal name in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-authentication-to-strip-domainname-com-from-user/m-p/3746824#M488220</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have ISE VM 2.0.0.306 which is using RADIUS authentication just for AAA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am having a certificate issue with our Palo Alto remote access VPN. When the client connects their VPN the firewall looks at the User Principal Name which is "username@domainname.com" in some cases it might be "username@other.domainname.com"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem is the authentication doesn't work because the firewall is supposed to only send the username of the UPN when authenticating to LDAP. It should not be sending anything after the '@' symbol.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I send the VPN authentication request to ISE would it be possible for ISE to strip everything after the&amp;nbsp;@ symbol and then&amp;nbsp;authenticate against&amp;nbsp;AD?&lt;/P&gt;</description>
    <pubDate>Wed, 14 Nov 2018 19:06:39 GMT</pubDate>
    <dc:creator>waqas gondal</dc:creator>
    <dc:date>2018-11-14T19:06:39Z</dc:date>
    <item>
      <title>RADIUS authentication to strip '@domainname.com' from user principal name</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-to-strip-domainname-com-from-user/m-p/3746824#M488220</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have ISE VM 2.0.0.306 which is using RADIUS authentication just for AAA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am having a certificate issue with our Palo Alto remote access VPN. When the client connects their VPN the firewall looks at the User Principal Name which is "username@domainname.com" in some cases it might be "username@other.domainname.com"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem is the authentication doesn't work because the firewall is supposed to only send the username of the UPN when authenticating to LDAP. It should not be sending anything after the '@' symbol.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I send the VPN authentication request to ISE would it be possible for ISE to strip everything after the&amp;nbsp;@ symbol and then&amp;nbsp;authenticate against&amp;nbsp;AD?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 19:06:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-to-strip-domainname-com-from-user/m-p/3746824#M488220</guid>
      <dc:creator>waqas gondal</dc:creator>
      <dc:date>2018-11-14T19:06:39Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS authentication to strip '@domainname.com' from user principal name</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-to-strip-domainname-com-from-user/m-p/3746842#M488222</link>
      <description>&lt;P&gt;Definitely. Check out:&lt;/P&gt;
&lt;P&gt;&lt;A title="ISE 2.0 Administrator Guide" href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/admin_guide/b_ise_admin_guide_20.pdf" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/admin_guide/b_ise_admin_guide_20.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Specifically "Identity Rewrite". You can put square brackets around any part of the identity you wish and then tokenize as you see fit. After ISE performs the changes you wish, it will then authenticate with that identity.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 19:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-to-strip-domainname-com-from-user/m-p/3746842#M488222</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2018-11-14T19:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS authentication to strip '@domainname.com' from user principal name</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-to-strip-domainname-com-from-user/m-p/3746974#M488224</link>
      <description>&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;It addresses my issue but now I have a certificate problem. I pointed the firewall to ISE for Radius authentication of VPN users.&lt;/P&gt;
&lt;P&gt;ISE has a certificate form the issuing CA and so do the clients but the Firewall is saying there is a self signed cert in the chain when VPN users enter their credentials.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 22:39:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-to-strip-domainname-com-from-user/m-p/3746974#M488224</guid>
      <dc:creator>waqas gondal</dc:creator>
      <dc:date>2018-11-14T22:39:27Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS authentication to strip '@domainname.com' from user principal name</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-authentication-to-strip-domainname-com-from-user/m-p/3746978#M488226</link>
      <description>Suggest you open a separate thread and provide screenshot of your trusted certificates.&lt;BR /&gt;&lt;BR /&gt;Make sure client presented to endpoints is from a well know root. If you don’t have this and using your own PKI then the complete chain needs to be trusted on the clients.&lt;BR /&gt;</description>
      <pubDate>Wed, 14 Nov 2018 22:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-authentication-to-strip-domainname-com-from-user/m-p/3746978#M488226</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-11-14T22:44:04Z</dc:date>
    </item>
  </channel>
</rss>

