<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Supplicant Settings for 2Factor dot1x Authenitcation in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487766#M511839</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a customer who wants to use SafeNet for 2-factor authentication for dot1x.&lt;/P&gt;&lt;P&gt;According to the SafeNet ISE integration guide for VPN, SafeNet is added as a Radius Server Token so I am guessing the same configuration will be applied for dot1x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. What various options do we have for supplicant configuration for a) Windows b) MAC c) Mobile Endpoints endpoints ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. The customer also wants the user to only enter its user-id and passcode and does not want the user to enter the AD password. Is this possible ? I've seen an integration with Duo using EAP-GTC but that requires AD username and password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 Mar 2018 19:01:29 GMT</pubDate>
    <dc:creator>umahar</dc:creator>
    <dc:date>2018-03-05T19:01:29Z</dc:date>
    <item>
      <title>Supplicant Settings for 2Factor dot1x Authenitcation</title>
      <link>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487766#M511839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a customer who wants to use SafeNet for 2-factor authentication for dot1x.&lt;/P&gt;&lt;P&gt;According to the SafeNet ISE integration guide for VPN, SafeNet is added as a Radius Server Token so I am guessing the same configuration will be applied for dot1x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. What various options do we have for supplicant configuration for a) Windows b) MAC c) Mobile Endpoints endpoints ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. The customer also wants the user to only enter its user-id and passcode and does not want the user to enter the AD password. Is this possible ? I've seen an integration with Duo using EAP-GTC but that requires AD username and password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 19:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487766#M511839</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2018-03-05T19:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: Supplicant Settings for 2Factor dot1x Authenitcation</title>
      <link>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487767#M511840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct that ISE supports EAP-GTC with a RADIUS token server as the ID source.&lt;/P&gt;&lt;P&gt;1.a. Windows can use &lt;SPAN style="text-decoration: line-through;"&gt;either native supplicant or&lt;/SPAN&gt; AnyConnect&lt;/P&gt;&lt;P&gt;1.b. macOS native supplicant and Apple iOS are not specifying the inner method on the endpoints' side. We should be able to use ISE allowed protocols to influence EAP-GTC selected as the inner method.&lt;/P&gt;&lt;P&gt;1.c. My Google Nexus 5X running Android 8.1.0 test device has GTC as one of the options for Phase 2 auth. Thus, I believe newer Android devices likely all have such support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Most token vendors have the options to either OTP alone or combining it with another password. Thus, I believe SafeNet has similar options.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 21:16:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487767#M511840</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-03-05T21:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: Supplicant Settings for 2Factor dot1x Authenitcation</title>
      <link>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487768#M511841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll test these options out in lab.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have another customer who uses RSA token for windows login. &lt;/P&gt;&lt;P&gt;Is it possible to use this RSA token for dot1x authentication in EAP-GTC like we do user authentication in Peap-Mschapv2 by selecting 'Use My Windows login' ?&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 22:30:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487768#M511841</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2018-03-05T22:30:15Z</dc:date>
    </item>
    <item>
      <title>Re: Supplicant Settings for 2Factor dot1x Authenitcation</title>
      <link>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487769#M511842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After looking again, I am not finding the option to set token or EAP-GTC with Windows native supplicant. Sorry for my mistake. I must have been thinking of smart card.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2018 23:48:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487769#M511842</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-03-05T23:48:33Z</dc:date>
    </item>
    <item>
      <title>Re: Supplicant Settings for 2Factor dot1x Authenitcation</title>
      <link>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487770#M511844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Viktor did mention this briefly. &lt;/P&gt;&lt;P&gt;I think on Windows 10 this can be achieved natively by using EAP-TTLS.&lt;/P&gt;&lt;P&gt;We definitely need a guide or a doc as I see more customers looking for 2FA on dot1x. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2018 15:27:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487770#M511844</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2018-03-06T15:27:28Z</dc:date>
    </item>
    <item>
      <title>Re: Supplicant Settings for 2Factor dot1x Authenitcation</title>
      <link>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487771#M511846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you got everything worked out, please contribute it as a doc to this community. Thanks a lot!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Mar 2018 02:47:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/supplicant-settings-for-2factor-dot1x-authenitcation/m-p/3487771#M511846</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-03-09T02:47:02Z</dc:date>
    </item>
  </channel>
</rss>

