<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Linux Machine account in AD for EAP-TLS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450071#M516966</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please provide the info of CN, SAN, and Subject from a sample certificate. And, the identity field shown in live logs and auth detail report.&lt;/P&gt;&lt;P&gt;Attached are two screen captures to show how to get the SPN of a computer; one via "Test User" and the other via Active Directory. For computers, ISE looks them up by sAMSAccountName (e.g. tt-corp$), the SPN values with prefix host/ (e.g. host/tt-corp), UPN (e.g. tt-corp$@demo.local) and also the distigneshedName (e.g. CN=TT-CORP,CN=Computers,DC=demo,DC=local).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do check out the lab guide I mentioned as it has info how to configure a certificate template to issue certificates for computers and users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/videos/17054"&gt; Video Link : 17054 &lt;/A&gt;&lt;A href="https://community.cisco.com/videos/17055"&gt; Video Link : 17055 &lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 May 2018 01:27:07 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2018-05-28T01:27:07Z</dc:date>
    <item>
      <title>Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450066#M516961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a situation where customer is looking to perform EAP-TLS authentication of Linux machines against corporate AD. We managed to generate and install machine certificates on a test Linux (Ubunty) host and run 802.1X supplicant. We also manually created a machine account in AD with the name matching CN in the certificate. However, when ISE trying to perform lookup for the host in AD, it returns ERROR_NO_SUCH_USER. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like the machine object that we created in AD is just a placeholder, not a proper account, so the question: is it possible to manually create a proper machine account? If yes, then what it involves? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is no way to create an account manually, what are the other options? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. &lt;/P&gt;&lt;P&gt;Stan &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 05:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450066#M516961</guid>
      <dc:creator>skozlovs</dc:creator>
      <dc:date>2018-05-25T05:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450067#M516962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please explain your intent? Why do you need an account in AD?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using the internal CA On ISE and the client provisioning portal to issue the certificate? If not why are you using external ca and not ISE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it’s fine to install a machine certificate on the Linux machine and present this to ISE for certificate  authentication&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 11:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450067#M516962</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-05-25T11:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450068#M516963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please check what certificate field is selected in the drop-down "Use Identity From" in the Certificate Authentication profile for such authenticate requests. Then, use "Test User" function in the AD join point to perform the lookup test. Also check the subject principal name (SPN) attribute set for the computers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you registered in the community as a partner, then you may also check out &lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-76360"&gt;[ISE Lab Guide] ISE Active Directory Integration&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt;, which gives an example how the certificate fields matter for EAP-TLS.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 14:42:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450068#M516963</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-05-25T14:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450069#M516964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First point of clarification:&amp;nbsp; Client does not authenticate against AD when performing EAP-TLS, but against PKI and certificates.&amp;nbsp; There are cases where authentication is also based on cert comparison stored in id store, but I don't think you are looking at that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I expect the part you are interested in is the authorization of the machine based on its presence in AD, or membership in group or other attributes.&amp;nbsp; For this use case, I would consider simply adding into AD for access based on LDAP.&amp;nbsp; The requirements to join a Linux client to AD are quite involved, so if just looking to validate existence or attribs, LDAP likeliest the easiest path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And yes, per Hsing's point, need to make sure Cert Auth Profile is matching on correct field for lookups into AD (or LDAP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 17:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450069#M516964</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-05-25T17:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450070#M516965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;"authorization of the machine based on its presence in AD, or membership in group" - that is exactly the use case. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Clarification on some of the points: &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;External CA (integrated with AD) is used to issues Win certificates and sign Lunix machine certs. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;There is no intent to do cert binary comparison. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;Here is what we've done:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;"Test User" function for t&lt;/SPAN&gt;est Machine account returns FAIL with "ERROR_NO_SUCH_USER", but test User account with the same name returns SUCCESS. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;In The Cert Auth Profile we tried to use all possible attributes i.e. CN, SAN, Subject, no luck. Also, &lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;I'm unable to find "&lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;subject principal name (SPN) attribute" in the AD computers. There is userPrincipalName, but no "subject"... Is this correct attribute or I missed something? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;We also tried to use LDAP as identity store in Cert Auth Profile, however it has Binary Comparison always ON (no option to untick it) that makes things even more complicated. In this case we receive error: "Cannot retrieve user's certificate" even if the certificate is loaded into subject's AD account. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;"adding into AD for access based on LDAP" - We've setup ISE to do LDAP search in the root container (Directory Organization), &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;Any other suggestions? &lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;Stan&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2018 01:02:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450070#M516965</guid>
      <dc:creator>skozlovs</dc:creator>
      <dc:date>2018-05-28T01:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450071#M516966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please provide the info of CN, SAN, and Subject from a sample certificate. And, the identity field shown in live logs and auth detail report.&lt;/P&gt;&lt;P&gt;Attached are two screen captures to show how to get the SPN of a computer; one via "Test User" and the other via Active Directory. For computers, ISE looks them up by sAMSAccountName (e.g. tt-corp$), the SPN values with prefix host/ (e.g. host/tt-corp), UPN (e.g. tt-corp$@demo.local) and also the distigneshedName (e.g. CN=TT-CORP,CN=Computers,DC=demo,DC=local).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do check out the lab guide I mentioned as it has info how to configure a certificate template to issue certificates for computers and users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/videos/17054"&gt; Video Link : 17054 &lt;/A&gt;&lt;A href="https://community.cisco.com/videos/17055"&gt; Video Link : 17055 &lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2018 01:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450071#M516966</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-05-28T01:27:07Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450072#M516967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the hostname shown as mixed cases (e.g. Alex-Jr-Corp1) in the SPN HOST entries, the lookup might fail.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2018 01:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450072#M516967</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-05-28T01:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450073#M516969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally have some progress. After we added &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;SPN to the computer object ISE is able to do lookup in AD and Win machine can authenticate with GPO generated certificate. However, Linux machine certificate FAILED with the same "ERROR_NO_SUCH_USER"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;SPAN&gt;So the problem now is in the Linux cert. One thing I noted in the Radius logs is that the usernames in successful authentications appears like: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:host12345$@domain.xxx.xx"&gt;host12345$@domain.xxx.xx&lt;/A&gt;&lt;SPAN&gt;, but failed one are like: host54321.domain.xx.xx. I guess&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt; $ and @ are used to construct the Username from some of the cert objects..... What objects are used? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;In the Linux cert we don't use SAN, my understanding it shouldn't matter as long as CN is matching SPN in AD object. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Stan&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2018 05:32:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450073#M516969</guid>
      <dc:creator>skozlovs</dc:creator>
      <dc:date>2018-05-28T05:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450074#M516971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will contact you offline to get a better understanding.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2018 20:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450074#M516971</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-05-28T20:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450075#M516973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally we resolved this issue. Steps required: &lt;/P&gt;&lt;P&gt;1. In AD create a computer object with name identical to the Linux/Unix host name. &lt;/P&gt;&lt;P&gt;2. In the object properties add servicePrincipalName (&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;SPN) values with prefix host/ (e.g. host/[name] or host/[name].[domain]). &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;3. In the Linux/Unix machine certificate add SAN equal to SPN. Could be short name (e.g. &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;host/[name]) or FQDN (e.g. &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;host/[name].[domain]). Prefix host/ is a must. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We tested &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;sAMSAccountName, UPN, &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;distigneshedName and some other field, but none of them seems to be used for the authentication/authorization. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jun 2018 00:01:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450075#M516973</guid>
      <dc:creator>skozlovs</dc:creator>
      <dc:date>2018-06-01T00:01:26Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450076#M516975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the update. I think it could be due to some hardening or other restrictions in the AD infrastructure so that other fields not working for lookups.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jun 2018 03:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450076#M516975</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-06-01T03:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Machine account in AD for EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450077#M516977</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Don't forget that you have identity rewrite or prefix/suffix stripping logic to help normalize the lookups to something like sAMAccountName.&amp;nbsp; Also, I find LDAP simpler to use sometimes if focus is on authorization since you can define the schema.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jun 2018 14:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-machine-account-in-ad-for-eap-tls/m-p/3450077#M516977</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-06-01T14:32:44Z</dc:date>
    </item>
  </channel>
</rss>

