<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dot1x Cert AuthN and AD attribute for AuthZ in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454555#M524861</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks George. No, they can't replace the username in the Cert. This is&amp;nbsp; PIV authentication, they don't have control over the card.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 15 May 2017 17:39:34 GMT</pubDate>
    <dc:creator>jideji</dc:creator>
    <dc:date>2017-05-15T17:39:34Z</dc:date>
    <item>
      <title>Dot1x Cert AuthN and AD attribute for AuthZ</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454552#M524858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Team, &lt;/P&gt;&lt;P&gt;I have a customer doing dot1x EAP-TLS&amp;nbsp; certification authentication, and he would like to use other attributes in AD in the authorization policy.&amp;nbsp; AD is currently join to ISE, and we&amp;nbsp; are&amp;nbsp; using&amp;nbsp; AD external group membership on the authorization AND condition. However, the issue we are running into is that, during the&amp;nbsp; AD group membership lookup, ISE is using the CN field on the Certificate as the username to lookup the group i.e “CN = Jacob Ideji”&amp;nbsp; but&amp;nbsp; that username doesn’t exist in AD, the actual&amp;nbsp; username in AD is “jacob1” hence, the group lookup fails with no such user “Jacob Ideji”&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our goal is to authenticate with a certificate and between the authentication and authorization phase, we need to take the Subject Alternative Name Other Name from the certificate and look up in AD the account which has an “altSecurityIdentities” attribute which matches the SAN Other Name and use the sAMAccountName returned as the identity which ISE uses to query active directory group membership.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is; can&amp;nbsp; we use&amp;nbsp; Identity re-write&amp;nbsp; feature to accomplish the above requirement, or if there is a better way to accomplish this Please any assistance will be greatly appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 May 2017 14:55:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454552#M524858</guid>
      <dc:creator>jideji</dc:creator>
      <dc:date>2017-05-15T14:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Cert AuthN and AD attribute for AuthZ</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454553#M524859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know this isn’t the question, but this sounds unusual to me (and I don’t know if there’s a way to do what you are asking) so my question back to you is, is there a reason why they can’t place a username in the certificate field that can be used for authz lookups?  Even something that can be re-written without depending on another lookup to derive the username would be good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 May 2017 17:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454553#M524859</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2017-05-15T17:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Cert AuthN and AD attribute for AuthZ</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454554#M524860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know this isn’t the question, but this sounds unusual to me (and I don’t know if there’s a way to do what you are asking) so my question back to you is, is there a reason why they can’t place a username in the certificate field that can be used for authz lookups?  Even something that can be re-written without depending on another lookup to derive the username would be good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 May 2017 17:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454554#M524860</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2017-05-15T17:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Cert AuthN and AD attribute for AuthZ</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454555#M524861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks George. No, they can't replace the username in the Cert. This is&amp;nbsp; PIV authentication, they don't have control over the card.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 May 2017 17:39:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454555#M524861</guid>
      <dc:creator>jideji</dc:creator>
      <dc:date>2017-05-15T17:39:34Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Cert AuthN and AD attribute for AuthZ</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454556#M524862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with George that this could be tricky and may not be supported. &lt;/P&gt;&lt;P&gt;ISE fetches the attributes to resolve the identity and can perform binary comparison against an AD for that identity. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rewrite rules for identity are available in Advanced Settings under your joined AD however I have never used them in conjunction with binary comparison. &lt;/P&gt;&lt;P&gt;I think if you can come up with a general rule which is converting "Jacob Ideji" to “jacob1" it could work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will finally defer to the TMEs for their solution. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 May 2017 18:05:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454556#M524862</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2017-05-15T18:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Cert AuthN and AD attribute for AuthZ</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454557#M524863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hope I understood the problem correctly - perhaps this will help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can select a specific identity source during Authentication, and force ISE to use a SAN (and other attributes if needed) to authenticate the user.&amp;nbsp; Not sure if this is specific enough to meet your goal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Cert.PNG" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/107236_Cert.PNG" style="width: 707px; height: 371px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 May 2017 00:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454557#M524863</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-05-16T00:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Cert AuthN and AD attribute for AuthZ</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454558#M524864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Arne, you up to something here. let me&amp;nbsp; try this. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 May 2017 01:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454558#M524864</guid>
      <dc:creator>jideji</dc:creator>
      <dc:date>2017-05-16T01:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Cert AuthN and AD attribute for AuthZ</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454559#M524865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again&amp;nbsp; Arne. Just want to let you know the results of my testing. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using the certificate authentication profile&amp;nbsp; get me half way,&amp;nbsp; while the Identity is in a format&amp;nbsp; that is stored in active directory, we are still&amp;nbsp; unable to get&amp;nbsp; the active directory username&amp;nbsp; i.e “jacob1” . Remember before we change&amp;nbsp; to using the certificate authentication profile, ISE is using the CN “jacob ideji” as the identity which doesn’t exist in AD.&amp;nbsp; the username we will like to retrieve from AD is “jacob1”. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 May 2017 00:56:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454559#M524865</guid>
      <dc:creator>jideji</dc:creator>
      <dc:date>2017-05-18T00:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Cert AuthN and AD attribute for AuthZ</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454560#M524866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jacob&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't fully understand the problem now. &lt;/P&gt;&lt;P&gt;The recommendation in my previous post was successful ?&amp;nbsp; I mean, I assume you were able to extract the attribute from the cert and use that to authenticate in AD, right?&lt;/P&gt;&lt;P&gt;Is the missing thing now, that once you matched the cert to a user in AD, you want to resolve that user's alternate username (whatever that means) ?&lt;/P&gt;&lt;P&gt;Have you played around with Attributes under the AD External Identity Source?&amp;nbsp; Here you can selectively retrieve directory attributes that you are interested in.&amp;nbsp; I reckon if the user is found in AD, then AD will return additional attributes that you specify below and then you can use them in your policies.&amp;nbsp; I have never done this but it might be worth a go.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="AD Attributes.png" class="image-1 jive-image" src="/legacyfs/online/fusion/107313_AD Attributes.png" style="width: 620px; height: 362px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 May 2017 01:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454560#M524866</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-05-18T01:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Cert AuthN and AD attribute for AuthZ</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454561#M524867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scratching my answer after re-reading your post. The cert profile is to match a cert field as the username. As George said, you have an unusual need such that none of the certificate fields would be what used for identities directly, such as sAMAccountName, UPN, and email, but one field to match the AD attribute &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;altSecurityIdentities&lt;/SPAN&gt;. AFAIK AD does not use that to hunt identities so one potential is to use LDAP and tweak the schema to use &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;altSecurityIdentities&lt;/SPAN&gt; as the subject objectclass.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 May 2017 01:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-cert-authn-and-ad-attribute-for-authz/m-p/3454561#M524867</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-05-18T01:30:50Z</dc:date>
    </item>
  </channel>
</rss>

