<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BYOD and how Windows chooses certificate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/byod-and-how-windows-chooses-certificate/m-p/4089706#M560566</link>
    <description>&lt;P&gt;When you have more than one user certificate in the client's store that both have the required attributes for 802.1x authentication, I believe Windows favours the oldest certificate to present for 802.1x when 'simple certificate selection' is enabled. Windows 10 added the ability to use certificate matching conditions to define which certificate will be presented for 802.1x, but the ISE Native Supplicant Provisioning does not have the ability to control this.&lt;/P&gt;
&lt;P&gt;You would either need to educate your BYOD users on how to configure the certificate matching, or have Windows prompt them for the certificate to use for 802.1x.&lt;/P&gt;
&lt;P&gt;For the latter, you could try disabling the 'Do not prompt user to authorize new servers..' option in your NSP profile in ISE to see if the user is then prompted for the certificate to use.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Screen Shot 2020-05-21 at 11.19.43 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/75064i8A98A8279EDFBDA6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-05-21 at 11.19.43 am.png" alt="Screen Shot 2020-05-21 at 11.19.43 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 21 May 2020 01:23:10 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2020-05-21T01:23:10Z</dc:date>
    <item>
      <title>BYOD and how Windows chooses certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-and-how-windows-chooses-certificate/m-p/4088496#M560499</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying dual SSID BYOD for eduroam and I have run in to some issues. We have one usecase that our internal laptops should be able to use this SSID. However the computers already have a user certificate on them (for Exchange) that has the same CN (firstname.lastname@email.com) as the certificate that ISE provides.&lt;/P&gt;&lt;P&gt;I have noticed that Windows choosed the wrong certificate for the EAP-TLS authentication.&lt;/P&gt;&lt;P&gt;Is there a way to choose in the settings that the ISE push to the client what certificate should be used?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or can we modify the CN in the cert that ISE pushes to the client?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Philip&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2020 08:37:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-and-how-windows-chooses-certificate/m-p/4088496#M560499</guid>
      <dc:creator>Philip Vilhelmsson</dc:creator>
      <dc:date>2020-05-19T08:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD and how Windows chooses certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-and-how-windows-chooses-certificate/m-p/4088546#M560502</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;What you can do is to use NAM editor (if you use anyconnect NAM) and in the&lt;BR /&gt;profile you can define the certificate to be used.&lt;BR /&gt;&lt;BR /&gt;Otherwise, you need to configure BYOD portal in order to register the&lt;BR /&gt;devices. Part of the Registration is to provide the devices with a&lt;BR /&gt;certificate from ISE (if you use ISE internal CA). In the same BYOD portal&lt;BR /&gt;you can configure the supplication profile to use this certificate. This&lt;BR /&gt;certificate will be used for next authentication with ISE.&lt;BR /&gt;&lt;BR /&gt;See this&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867#toc-hId--1166792909" target="_blank"&gt;https://community.cisco.com/t5/security-documents/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867#toc-hId--1166792909&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Tue, 19 May 2020 10:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-and-how-windows-chooses-certificate/m-p/4088546#M560502</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-05-19T10:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD and how Windows chooses certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-and-how-windows-chooses-certificate/m-p/4089299#M560546</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured BYOD portal according to the guide and the client gets certificate from the internal ISE CA. But after the onboarding process the client can't connect to the SSID.&lt;/P&gt;&lt;P&gt;The ISE log say "12514 EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain".&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the client certificate store I see two certificates. Both with the same CN, both are for "Client authentication". One is issued from ISE, the other from Skype. If I remove the certificate from Skype then the 802.1x authentication works. But the Skype cert is automatcaly installed on the client everytime we start Skype, and as soon as it is back the authentication will stops working (next time the client tries to connect to the SSID.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked the settings in the profile that gets downloaded to the client, but I can not see anywhere that I can force what certificate to be used.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 13:12:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-and-how-windows-chooses-certificate/m-p/4089299#M560546</guid>
      <dc:creator>Philip Vilhelmsson</dc:creator>
      <dc:date>2020-05-20T13:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD and how Windows chooses certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-and-how-windows-chooses-certificate/m-p/4089706#M560566</link>
      <description>&lt;P&gt;When you have more than one user certificate in the client's store that both have the required attributes for 802.1x authentication, I believe Windows favours the oldest certificate to present for 802.1x when 'simple certificate selection' is enabled. Windows 10 added the ability to use certificate matching conditions to define which certificate will be presented for 802.1x, but the ISE Native Supplicant Provisioning does not have the ability to control this.&lt;/P&gt;
&lt;P&gt;You would either need to educate your BYOD users on how to configure the certificate matching, or have Windows prompt them for the certificate to use for 802.1x.&lt;/P&gt;
&lt;P&gt;For the latter, you could try disabling the 'Do not prompt user to authorize new servers..' option in your NSP profile in ISE to see if the user is then prompted for the certificate to use.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Screen Shot 2020-05-21 at 11.19.43 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/75064i8A98A8279EDFBDA6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-05-21 at 11.19.43 am.png" alt="Screen Shot 2020-05-21 at 11.19.43 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2020 01:23:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-and-how-windows-chooses-certificate/m-p/4089706#M560566</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-05-21T01:23:10Z</dc:date>
    </item>
  </channel>
</rss>

