<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE - getting user identity using certificate authentication from machine certificates in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-getting-user-identity-using-certificate-authentication-from/m-p/4076899#M560048</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;,&amp;nbsp; I wasn't aware of EasyConnect, but definitely something that would work for us as an alternative. Thanks for the suggestion! Yeah didn't plan on trying with the windows supplicant.&lt;/P&gt;</description>
    <pubDate>Thu, 30 Apr 2020 05:33:40 GMT</pubDate>
    <dc:creator>cisco2020</dc:creator>
    <dc:date>2020-04-30T05:33:40Z</dc:date>
    <item>
      <title>ISE - getting user identity using certificate authentication from machine certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-getting-user-identity-using-certificate-authentication-from/m-p/4076455#M560046</link>
      <description>&lt;P&gt;At the moment we are doing EAP-TLS with machine based certificate authentication. As such in ISE radius live logs we see the machine name. There is a requirement to do user based firewall policies on Palo Alto with the radius log information passed from ISE. Since we are using machine certificates, it doesn't seem this will work without switching over to user certificates for EAP-TLS. Is my understanding correct? Or is there a trick to get the user identity information for these type of authentications? I ask because a user will login to windows using their AD account, so even though auth is done with the machine certificate, is there a way for ISE to see the windows login account?&lt;/P&gt;&lt;P&gt;This is what we see in the radius live logs, showing the machine name for identity.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-04-01 at 2.59.33 pm.jpg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/73303i4DFB362B8228A97D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-04-01 at 2.59.33 pm.jpg" alt="Screen Shot 2020-04-01 at 2.59.33 pm.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 15:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-getting-user-identity-using-certificate-authentication-from/m-p/4076455#M560046</guid>
      <dc:creator>cisco2020</dc:creator>
      <dc:date>2020-04-29T15:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - getting user identity using certificate authentication from machine certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-getting-user-identity-using-certificate-authentication-from/m-p/4076745#M560047</link>
      <description>&lt;P&gt;You are already using 802.1X, but perhaps there is a way to leverage ISE EasyConnect feature (&lt;A href="https://community.cisco.com/t5/security-documents/ise-easy-connect/ta-p/3638861" target="_self"&gt;read about it here)&lt;/A&gt; to link ISE to AD, and when user has logged in, then a WMI event is sent to ISE (which should also be available as a SYSLOG that your Palo Alto can consume).&lt;/P&gt;
&lt;P&gt;Doing Machine + UserAuth using the native Windows Supplicant is also possible - but it's fraught with issues/limitations about switching between wired/wireless, and machines waking up from sleep, MAR cache, etc. All these issues are apparently resolved with TEAP (Tunneled EAP) - it's available in ISE 2.7 and Windows 10 Insider Preview.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 22:36:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-getting-user-identity-using-certificate-authentication-from/m-p/4076745#M560047</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-04-29T22:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - getting user identity using certificate authentication from machine certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-getting-user-identity-using-certificate-authentication-from/m-p/4076899#M560048</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;,&amp;nbsp; I wasn't aware of EasyConnect, but definitely something that would work for us as an alternative. Thanks for the suggestion! Yeah didn't plan on trying with the windows supplicant.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2020 05:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-getting-user-identity-using-certificate-authentication-from/m-p/4076899#M560048</guid>
      <dc:creator>cisco2020</dc:creator>
      <dc:date>2020-04-30T05:33:40Z</dc:date>
    </item>
  </channel>
</rss>

