<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple user login using Eap tls inner method &amp;amp;&amp;amp; eap fast outer in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/multiple-user-login-using-eap-tls-inner-method-amp-amp-eap-fast/m-p/4318274#M566585</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I’m not sure I got your requirement correctly. You want a user to login on a machine, get its certificate and then be authenticated right away&lt;/P&gt;
&lt;P&gt;How the user is going to get its certificate? Are we talking about machines managed by a MDM or Windows AD?&lt;/P&gt;
&lt;P&gt;If so, you can assign a permit with a dACL to allow access to few services (DHCP, DNS, and MDM/Windows AD) with a small timeout until the user can get all prerequisites (certificate and supplicant configuration). Then, at next reauthentication timer, users will be authenticated using TLS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I missed something or did not understood something, please let me know and I will try to find a solution.&lt;/P&gt;</description>
    <pubDate>Sun, 04 Apr 2021 02:55:30 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2021-04-04T02:55:30Z</dc:date>
    <item>
      <title>Multiple user login using Eap tls inner method &amp;&amp; eap fast outer</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-user-login-using-eap-tls-inner-method-amp-amp-eap-fast/m-p/4318204#M566584</link>
      <description>&lt;P&gt;Recently we had deployed ISE server for authentication and Authorization purpose and there was many requirement by the client which was fulfilled, now the last requirement by them is to do multiple user login on same machine, due to these requirement&amp;nbsp; sign-off got stuck from client side, is there any way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also we are using Eap tls inner method&lt;/P&gt;&lt;P&gt;Eap fast as outer method&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know multiple user login can breach ise working but we need to perform these.&lt;/P&gt;&lt;P&gt;Client certificate is required before login into machine, is there any way if new user logged in into machine the endpoint itself fect user certificate automatically from CA server and allow user to access the network&lt;/P&gt;</description>
      <pubDate>Sat, 03 Apr 2021 16:18:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-user-login-using-eap-tls-inner-method-amp-amp-eap-fast/m-p/4318204#M566584</guid>
      <dc:creator>RohitSingh91693</dc:creator>
      <dc:date>2021-04-03T16:18:57Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple user login using Eap tls inner method &amp;&amp; eap fast outer</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-user-login-using-eap-tls-inner-method-amp-amp-eap-fast/m-p/4318274#M566585</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I’m not sure I got your requirement correctly. You want a user to login on a machine, get its certificate and then be authenticated right away&lt;/P&gt;
&lt;P&gt;How the user is going to get its certificate? Are we talking about machines managed by a MDM or Windows AD?&lt;/P&gt;
&lt;P&gt;If so, you can assign a permit with a dACL to allow access to few services (DHCP, DNS, and MDM/Windows AD) with a small timeout until the user can get all prerequisites (certificate and supplicant configuration). Then, at next reauthentication timer, users will be authenticated using TLS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I missed something or did not understood something, please let me know and I will try to find a solution.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Apr 2021 02:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-user-login-using-eap-tls-inner-method-amp-amp-eap-fast/m-p/4318274#M566585</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2021-04-04T02:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple user login using Eap tls inner method &amp;&amp; eap fast outer</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-user-login-using-eap-tls-inner-method-amp-amp-eap-fast/m-p/4318483#M566588</link>
      <description>&lt;P&gt;Hello franc,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes for the machine connectivity after user logged out we have configured a Dacl, so that after logout machine still have connection with the AD&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My client requirement is that without having a user certificate if new user login to any system during login is it possible the endpoint will fetch the user certificate from AD and stores it in user certificate store , i.e client wants multiple user login in same machine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In eap tls what we do first we enroll certificate manually in user certificate store and after that eap process happens, and user gets authenticated.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Apr 2021 03:30:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-user-login-using-eap-tls-inner-method-amp-amp-eap-fast/m-p/4318483#M566588</guid>
      <dc:creator>RohitSingh91693</dc:creator>
      <dc:date>2021-04-05T03:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple user login using Eap tls inner method &amp;&amp; eap fast outer</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-user-login-using-eap-tls-inner-method-amp-amp-eap-fast/m-p/4318663#M566592</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Client certificate is required before login into machine, is there any way if new user logged in into machine the endpoint itself fect user certificate automatically from CA server and allow user to access the network&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-I would look into testing/utilizing the authz condition of eapchainingresult equals user failed and machine succeeded.&amp;nbsp; Then in this state authorize the non-cert user + known good client into a restricted area that has limited access to the necessary resources needed for user to enroll for a cert.&amp;nbsp; I think the tricky part here will be having them reauth (after successful enrollment for cert) to gain full access to respective network via eapchaining result equals user and computer succeeded.&amp;nbsp; You could as already mentioned use a reauth timer.&amp;nbsp; However, I feel that there may be lost time here.&amp;nbsp; You could have the user initiate reauth (depending on the supplicant used).&amp;nbsp; If using NAM this is straight forward, but may require some user education.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;One last thing to note, by default NAM enforces single user.&amp;nbsp; To change this see below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{B12744B8-5BB7-463a-B85E-BB7627E73002}&lt;/P&gt;
&lt;P&gt;To configure single or multiple user logon, add a DWORD named EnforceSingleLogon (this should already be there), and give it a value of 1 or 0.&lt;/P&gt;
&lt;P&gt;1 restricts logon to a single user.&lt;/P&gt;
&lt;P&gt;0 allows multiple users to be logged on.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH!&lt;/P&gt;</description>
      <pubDate>Mon, 05 Apr 2021 12:59:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-user-login-using-eap-tls-inner-method-amp-amp-eap-fast/m-p/4318663#M566592</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2021-04-05T12:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple user login using Eap tls inner method &amp;&amp; eap fast outer</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-user-login-using-eap-tls-inner-method-amp-amp-eap-fast/m-p/4318965#M566614</link>
      <description>&lt;P&gt;This is a very common issue due to the order of operations Windows uses for starting the dot1x process before the user GPO kicks in (which is how new user certs are enrolled). Many customers avoid using user certificates for this reason. See &lt;A href="https://community.cisco.com/t5/network-access-control/ise-deployment-eap-tls-machine-or-user-certificates-native/td-p/4094444" target="_blank" rel="noopener"&gt;this community post&lt;/A&gt; for more detail.&lt;/P&gt;
&lt;P&gt;You might look into using either AnyConnect NAM or TEAP (released in Windows 10 Build 2004) to leverage EAP-TLS for computer auth and PEAP-MSCHAPv2 for user auth.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Apr 2021 23:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-user-login-using-eap-tls-inner-method-amp-amp-eap-fast/m-p/4318965#M566614</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-04-05T23:08:25Z</dc:date>
    </item>
  </channel>
</rss>

