<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE (user certificate ambiguity error) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-user-certificate-ambiguity-error/m-p/4052842#M559177</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;1. The simplest solution would be to create some conditions in your authentication policy, thus based on the attributes of the incoming RADIUS request, you know to which domain the user belongs to, and configure ISE to look for a specific join point.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;2. Have you set the "Match Client Certificate against Certificate in Identity Store" to "Only to resolve Identity Ambiguity" or to "Always perform binary comparison"?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, take a look at &lt;A title="this bug" href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf21978/?rfs=iqvred" target="_self"&gt;this bug&lt;/A&gt; and upgrade to a proper version and patch level of ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 26 Mar 2020 13:13:14 GMT</pubDate>
    <dc:creator>Cristian Matei</dc:creator>
    <dc:date>2020-03-26T13:13:14Z</dc:date>
    <item>
      <title>Cisco ISE (user certificate ambiguity error)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-user-certificate-ambiguity-error/m-p/4052761#M559172</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Receiving an authentication error in ISE (2.x) relating to user certificate ambiguity.&lt;/P&gt;&lt;P&gt;Setup - AD Join connector configured for user and machine in several domains.&lt;/P&gt;&lt;P&gt;Clients - Win 10 - EAP-TLS for machine and user network access.&lt;/P&gt;&lt;P&gt;Issue:&lt;/P&gt;&lt;P&gt;Single domain user account in DomainA or DomainB works fine, but when trying to auth a client with identical user accounts in DomainA&amp;amp;DomainB authentication is rejected due to multiple matching records "resolve certificate identity ambiguity using certificates match".&lt;/P&gt;&lt;P&gt;Question - How to accommodate a user in multiple domains for authentication?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 11:04:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-user-certificate-ambiguity-error/m-p/4052761#M559172</guid>
      <dc:creator>Jay233</dc:creator>
      <dc:date>2020-03-26T11:04:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE (user certificate ambiguity error)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-user-certificate-ambiguity-error/m-p/4052842#M559177</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;1. The simplest solution would be to create some conditions in your authentication policy, thus based on the attributes of the incoming RADIUS request, you know to which domain the user belongs to, and configure ISE to look for a specific join point.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;2. Have you set the "Match Client Certificate against Certificate in Identity Store" to "Only to resolve Identity Ambiguity" or to "Always perform binary comparison"?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, take a look at &lt;A title="this bug" href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf21978/?rfs=iqvred" target="_self"&gt;this bug&lt;/A&gt; and upgrade to a proper version and patch level of ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 13:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-user-certificate-ambiguity-error/m-p/4052842#M559177</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-26T13:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE (user certificate ambiguity error)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-user-certificate-ambiguity-error/m-p/4053341#M559191</link>
      <description>&lt;P&gt;In addition to &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295226"&gt;@Cristian Matei&lt;/a&gt;'s comments, another way to resolve ambiguity issues when your have a user that exists in multiple domains would be to ensure you are using an identity value in your Certificate Authentication Profile that includes the domain name.&lt;/P&gt;&lt;P&gt;Typically, the CN would include just the computer or user name but options like UPN or Email would include the domain.&lt;/P&gt;&lt;P&gt;You would need to ensure, however, that the separate certificate templates in ADCS used to enrol both Computers and Users includes the value specified in the Cert Auth Profile.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 02:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-user-certificate-ambiguity-error/m-p/4053341#M559191</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-03-27T02:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE (user certificate ambiguity error)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-user-certificate-ambiguity-error/m-p/4053532#M559206</link>
      <description>Hi Greg,&lt;BR /&gt;Is the below necessary?&lt;BR /&gt;Use Explicit UPN&lt;BR /&gt;To reduce ambiguity when matching user information against Active Directory's User-Principal-Name (UPN) attributes, you must configure Active Directory to use Explicit UPN. Using Implicit UPN can produce ambiguous results if two users have the same value for sAMAccountName.&lt;BR /&gt;&lt;BR /&gt;To set Explicit UPN in Active Directory, open the Advanced Tuning page, and set the attribute REGISTRY.Services\lsass\Parameters\Providers\ActiveDirectory\UseExplicitUPN to 1.</description>
      <pubDate>Fri, 27 Mar 2020 10:33:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-user-certificate-ambiguity-error/m-p/4053532#M559206</guid>
      <dc:creator>Jay233</dc:creator>
      <dc:date>2020-03-27T10:33:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE (user certificate ambiguity error)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-user-certificate-ambiguity-error/m-p/4054651#M559238</link>
      <description>&lt;P&gt;I'm no AD expert but, as I understand it, the advanced tuning for the Explicit UPN would be more for solving ambiguity issues within a single domain. I don't believe this would be required with your use case for multiple domains.&lt;/P&gt;
&lt;P&gt;See the following link for more information about iUPN versus eUPN:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://jorgequestforknowledge.wordpress.com/2010/10/12/user-principal-names-in-ad-part-1/" target="_blank" rel="noopener"&gt;User Principle Names in AD&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AFAIK, however, the UPN is not automatically generated for a computer account by default. If you intend to use the UPN value in the certificate for both Computers and Users, you will likely need to make sure the UPN attribute is set for the computer account during or after the domain join and before the certificate is enrolled so the value is populated in the certificate SAN.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-03-30 at 9.52.24 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70214i7802A249CBF64FA6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-03-30 at 9.52.24 am.png" alt="Screen Shot 2020-03-30 at 9.52.24 am.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-03-30 at 9.53.40 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70215i593CD4271CB9D6CB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-03-30 at 9.53.40 am.png" alt="Screen Shot 2020-03-30 at 9.53.40 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Mar 2020 22:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-user-certificate-ambiguity-error/m-p/4054651#M559238</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-03-29T22:58:27Z</dc:date>
    </item>
  </channel>
</rss>

