<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.7 Machine + User authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4079052#M560116</link>
    <description>&lt;P&gt;So - I ran some test today and unfortunately no sucess. I have three WLAN profiles configured: user-auth, machine-auth and both-auth, all of these are identical besides auth type.&lt;/P&gt;&lt;P&gt;When I'm logged into Windows - all three profiles are working fine (user - user certificate, machine - machine cert, both - user cert).&lt;/P&gt;&lt;P&gt;On a login screen - "user" and "machine" are ok but "both" can't find the certificate. It also looks like "was machine authenticated" flag is not being set after hitting the first rule (machine group check).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it require to configure something in AD maybe? I've also checked it with "single sign-on" enabled and disabled with the same result.&lt;/P&gt;</description>
    <pubDate>Mon, 04 May 2020 15:32:49 GMT</pubDate>
    <dc:creator>Piotr Grabowski</dc:creator>
    <dc:date>2020-05-04T15:32:49Z</dc:date>
    <item>
      <title>ISE 2.7 Machine + User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078004#M560043</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I found a few discussions about the subject but I'd like to confirm. My idea (for wireless connections) is to use machine auth before user logins and user auth after login. I configured machine group verification as a first step and "was machine authenticated" + user group verification as a second one and the situation is that when I'm logged in and connecting to wireless - it works. Before login (on a login screen), when I try to connect to wireless it says that the certificate is needed for connection (both - user and machine certs are of course installed). In a wireless profile "machine or user auth" is configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What should I do/check to make it work? Is it possible to configure it that way in Windows 10?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Piotr&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2020 16:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078004#M560043</guid>
      <dc:creator>Piotr Grabowski</dc:creator>
      <dc:date>2020-05-01T16:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Machine + User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078088#M560044</link>
      <description>&lt;P&gt;In the world of Windows, you can either be in one of two states at a time, NOT both at the same time.&amp;nbsp; When you are not logged in, the computer is in "machine state" and will present machine credentials.&amp;nbsp; When you login, the computer is now in "user state" and will present user credentials.&amp;nbsp; So if it works when you are logged in, then you know the user certificate is good and everything is fine there.&amp;nbsp; If it does not work when you are logged out, then that tells me there is an issue with the computer certificate or Windows ability to choose the correct certificate.&amp;nbsp; Open MMC (run as administrator), add snap-in for "Certificates", choose machine/computer account.&amp;nbsp; In there, expand the folder under Certificates-&amp;gt;Personal.&amp;nbsp; That is where the computer certificates will be stored if they are there.&amp;nbsp; If you find your certificate there that you want to use, make sure the Extended Key Usage (EKU) includes "Client Authentication".&amp;nbsp; Also, make sure there are no other certificates with the same EKU.&amp;nbsp; If there are, then the computer is having a hard time picking the correct certificate.&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2020 18:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078088#M560044</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-05-01T18:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Machine + User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078262#M560055</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/624773" target="_blank"&gt;Colby LeMaire&lt;/A&gt;&amp;nbsp;is correct on this.&lt;/P&gt;
&lt;P&gt;However, the upcoming Windows 10 May Update (v2004) is going to support TEAP. With EAP Chaining support in TEAP, we may use EAP-MSCHAPv2 for user auth and EAP-TLS for machine auth.&lt;/P&gt;
&lt;P&gt;REF:&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-gpwl/d69d280d-757b-46e9-98c1-198c298fffde" target="_self"&gt;Change Tracking of [MS-GPWL]: Group Policy: Wireless/Wired Protocol Extension&lt;/A&gt;&amp;nbsp;shows&lt;/P&gt;
&lt;P&gt;&amp;gt; ... &lt;SPAN&gt;Also updated .. that 'EAP-TEAP method is supported on Windows 10 v2004 and later.&lt;/SPAN&gt;&amp;nbsp;...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 05:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078262#M560055</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-05-02T05:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Machine + User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078293#M560058</link>
      <description>&lt;P&gt;Thanks, I will test and confirm it on Monday but I'm pretty sure that when I choose "computer auth" in WLAN configuration - it works fine authenticating the machine, when "user auth" is selected it also works fine with user's certificate. The issue is when "user or computer" is selected - after restarting Windows, when I try to connect to wireless on a login screen, it tells me that "this connection requires a certificate, contact administrator".&lt;/P&gt;&lt;P&gt;Can it be something with the wireless profile in Windows?&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 09:39:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078293#M560058</guid>
      <dc:creator>Piotr Grabowski</dc:creator>
      <dc:date>2020-05-02T09:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Machine + User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078337#M560059</link>
      <description>&lt;P&gt;It is possible.&amp;nbsp; Can you post screenshots of your wireless profile configuration?&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 15:16:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078337#M560059</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-05-02T15:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Machine + User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078371#M560060</link>
      <description>&lt;P&gt;I don't have access to my test laptop today, but as far as I remember:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WPA2-Enterprise, Smart-card or certificate, Use a certificate + simple cert selection.&lt;/P&gt;&lt;P&gt;Advanced settings: user or computer, enable single sign-on (60 sec).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will check it on Monday&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 18:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078371#M560060</guid>
      <dc:creator>Piotr Grabowski</dc:creator>
      <dc:date>2020-05-02T18:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Machine + User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078456#M560064</link>
      <description>&lt;P&gt;Try and go without the option [ ] Enable single sign-on for this network.&lt;/P&gt;</description>
      <pubDate>Sun, 03 May 2020 04:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4078456#M560064</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-05-03T04:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Machine + User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4079052#M560116</link>
      <description>&lt;P&gt;So - I ran some test today and unfortunately no sucess. I have three WLAN profiles configured: user-auth, machine-auth and both-auth, all of these are identical besides auth type.&lt;/P&gt;&lt;P&gt;When I'm logged into Windows - all three profiles are working fine (user - user certificate, machine - machine cert, both - user cert).&lt;/P&gt;&lt;P&gt;On a login screen - "user" and "machine" are ok but "both" can't find the certificate. It also looks like "was machine authenticated" flag is not being set after hitting the first rule (machine group check).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it require to configure something in AD maybe? I've also checked it with "single sign-on" enabled and disabled with the same result.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2020 15:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4079052#M560116</guid>
      <dc:creator>Piotr Grabowski</dc:creator>
      <dc:date>2020-05-04T15:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Machine + User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4387432#M566751</link>
      <description>&lt;P&gt;I'm hoping to get some help with EAP-Chaining which always confuses me. I have read few articles and they are saying when using EAP-TLS, I can only do machine &lt;STRONG&gt;OR&lt;/STRONG&gt; user authentication but &lt;STRONG&gt;not both&lt;/STRONG&gt; at the same time. However, what is stopping me from create an authorization policy with two conditions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Permit access&amp;nbsp;if:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the user is part of the domain&amp;nbsp;&lt;STRONG&gt;AND&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;the machine is part of the domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Doesn't it mean I'm doing machine AND user authentication without EAP chaining?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Apr 2021 10:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4387432#M566751</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2021-04-15T10:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Machine + User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4387829#M566763</link>
      <description>&lt;P&gt;It has to do with how the Windows supplicant works. Have a look at this blog written by one of the ISE TMEs.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.networkworld.com/article/2940463/machine-authentication-and-user-authentication.html" target="_blank"&gt;https://www.networkworld.com/article/2940463/machine-authentication-and-user-authentication.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Windows has two distinct states for Computer vs. User. When moving to a different state, the supplicant initiates a new RADIUS session, so the authZ policy you're describing will not work. The only real way to tie the Computer and User credentials together is via EAP Chaining using either AnyConnect NAM or TEAP in Windows.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Apr 2021 23:35:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4387829#M566763</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-04-15T23:35:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.7 Machine + User authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4389837#M566808</link>
      <description>&lt;P&gt;EAP-Chaining means you are chaining together both the machine credential and the user credential in a single authentication transaction.&lt;/P&gt;
&lt;P&gt;Only 2 protocols support this: EAP-FAST and TEAP.&lt;/P&gt;
&lt;P&gt;EAP-FAST is only supported on Cisco AnyConnect with ISE.&lt;/P&gt;
&lt;P&gt;TEAP is only supported by Windows 10 20H1/19041 and later native supplicant with ISE.&lt;/P&gt;
&lt;P&gt;See these policy examples:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: disc; margin-left: 30px; margin-bottom: 1px;"&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-authentication-and-authorization-policy-reference/ta-p/3850472#toc-hId-1955288580" rel="nofollow noopener noreferrer" target="_blank"&gt;EAP-Chaining: User and Machine Authentication using EAP-FAST)&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="list-style-type: disc; margin-left: 30px; margin-bottom: 1px;"&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-authentication-and-authorization-policy-reference/ta-p/3850472#toc-hId-147834117" rel="nofollow noopener noreferrer" target="_blank"&gt;TEAP-Chaining with Tunneled EAP (TEAP)&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please ask any followup questions in a new thread.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 05:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-7-machine-user-authentication/m-p/4389837#M566808</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-04-20T05:20:05Z</dc:date>
    </item>
  </channel>
</rss>

