<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TEAP and ISE machine and user certificate authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4416437#M567789</link>
    <description>&lt;P&gt;At the same time I have to distinguish between the statuses:&lt;BR /&gt;1) MACHINE PASS, when user didn't attempt to authenticate, and grand access,&lt;/P&gt;&lt;P&gt;2) and Machine Pass but a User fails, so the access should not be granted.&lt;BR /&gt;For both cases the &lt;U&gt;eap&amp;nbsp;chaining&lt;/U&gt;&amp;nbsp;status will be &lt;U&gt;User failed and machine succeeded&lt;/U&gt;.&lt;/P&gt;</description>
    <pubDate>Thu, 10 Jun 2021 21:42:13 GMT</pubDate>
    <dc:creator>fedor.solovev</dc:creator>
    <dc:date>2021-06-10T21:42:13Z</dc:date>
    <item>
      <title>TEAP and ISE machine and user certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4415685#M567760</link>
      <description>&lt;P&gt;Hello guys.&lt;BR /&gt;&lt;BR /&gt;Have anyone already configured TEAP with ISE ?&lt;BR /&gt;There is an issue with authorization matching because of the anonymous Radius Name.&lt;/P&gt;&lt;P&gt;Can we match Username from Overview or Authentication Details of the request ?&lt;/P&gt;&lt;P&gt;Or maybe there is a Registry key on Windows to make Windows to send /host as Radius User Name ?&lt;/P&gt;&lt;P&gt;Any other suggestions are appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a description.&lt;/P&gt;&lt;P&gt;This is ISE 3.0 and a&amp;nbsp;switch 3750 and Windows 10 with TEAP configured.&lt;BR /&gt;&lt;BR /&gt;1) TEAP sends &lt;STRONG&gt;&lt;U&gt;anonymous&lt;/U&gt; &lt;/STRONG&gt;as Other Attributes -&amp;gt; Radius Username for both machine and user authentication all the time,&lt;/P&gt;&lt;P&gt;but Windows "Enable identity privacy" it is not configured.&lt;BR /&gt;2) For the "Machine only" authoriZation&amp;nbsp;the well known filter &lt;EM&gt;&lt;U&gt;Radius User-Name == starting as /host&lt;/U&gt;&lt;/EM&gt; doesn't work because the host doesn't send it in the request.&lt;BR /&gt;3) If configure the AuthZ rule to match &lt;U&gt;&lt;EM&gt;User-Name == starting as "anonymous"&lt;/EM&gt;&lt;/U&gt;, it matches for user authentication/authorization as well.&lt;BR /&gt;&lt;BR /&gt;These is a piece of the logs for the machine authentication:&lt;BR /&gt;&lt;BR /&gt;Overview&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Event&lt;/TD&gt;&lt;TD&gt;5200 Authentication succeeded&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Username&lt;/TD&gt;&lt;TD&gt;anonymous,host/HOST.DOMAIN.com&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;H3&gt;Authentication Details&lt;/H3&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Source Timestamp&lt;/TD&gt;&lt;TD&gt;2021-06-09 12:49:28.762&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Received Timestamp&lt;/TD&gt;&lt;TD&gt;2021-06-09 12:49:28.762&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Policy Server&lt;/TD&gt;&lt;TD&gt;ise&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Event&lt;/TD&gt;&lt;TD&gt;5200 Authentication succeeded&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Username&lt;/TD&gt;&lt;TD&gt;anonymous,host/HOST.DOMAIN.com&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Other Attributes&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;RADIUS Username&lt;/TD&gt;&lt;TD&gt;anonymous&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;BR /&gt;Windows 10 configuration:&lt;/P&gt;&lt;P&gt;.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-06-09 13-34-56 3.45.20.14 - Remote Desktop Connection.png" style="width: 377px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/122389i04F275D15C63D6F6/image-size/large?v=v2&amp;amp;px=999" role="button" title="2021-06-09 13-34-56 3.45.20.14 - Remote Desktop Connection.png" alt="2021-06-09 13-34-56 3.45.20.14 - Remote Desktop Connection.png" /&gt;&lt;/span&gt;&lt;BR /&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jun 2021 18:51:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4415685#M567760</guid>
      <dc:creator>fedor.solovev</dc:creator>
      <dc:date>2021-06-09T18:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP and ISE machine and user certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4415918#M567766</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- FYI :&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html#:~:text=Navigate%20to%20ISE%20%3E%20Policy%20%3E%20Policy,to%20the%20Identity%20Source%20Sequence" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html#:~:text=Navigate%20to%20ISE%20%3E%20Policy%20%3E%20Policy,to%20the%20Identity%20Source%20Sequence&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 06:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4415918#M567766</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2021-06-10T06:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP and ISE machine and user certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4416117#M567772</link>
      <description>&lt;P&gt;I have not run into this issue when testing TEAP.&amp;nbsp; That anonymous identity you see in live logs means that there was only machine auth.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See if this helps/sheds light:&amp;nbsp;&lt;A href="https://www.ise-support.com/2020/05/29/using-teap-for-eap-chaining/" target="_blank"&gt;Using TEAP for EAP Chaining – Cisco ISE Tips, Tricks, and Lessons Learned (ise-support.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 13:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4416117#M567772</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2021-06-10T13:15:41Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP and ISE machine and user certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4416359#M567777</link>
      <description>&lt;P&gt;Hello Marce.&lt;BR /&gt;Thank you for the link. It is not like I posted this thread after googling for 5 minutes only &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regarding the guide:&lt;BR /&gt;AuthN&lt;BR /&gt;1)There are no explicit requirements for the certificate authentication.&lt;/P&gt;&lt;P&gt;They don't show us what is included in the "cert_profile" as well.&lt;BR /&gt;I am going to check CN for a machine certificate and SAN for user certificate by creating 2 separated rules. It is not working correctly.&lt;BR /&gt;On the windows machine I am not checking "Enable identity privacy" checkbox but it still uses &lt;U&gt;Radius User-Name&lt;/U&gt; = ANONYMOUS for both machine and user requests.&lt;BR /&gt;AuthZ&lt;BR /&gt;2) For these policies - I would prefer these rules to be more specific then it is configured in the guide.&lt;BR /&gt;For that reason I am trying explicitly distinguish Machine vs User authentication by checking /host portion of the name.&lt;BR /&gt;This is the way it works for NAM, for example.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 19:21:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4416359#M567777</guid>
      <dc:creator>fedor.solovev</dc:creator>
      <dc:date>2021-06-10T19:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP and ISE machine and user certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4416377#M567780</link>
      <description>&lt;P&gt;Hello Mike !&lt;BR /&gt;Thank you for your reply. I red this guide as well.&lt;BR /&gt;&lt;BR /&gt;The point is I am not configuring anonymous on TEAP, so I am expecting Radius User Name to contain /host portion of it the way it works for EAP-FAST.&lt;BR /&gt;I am very positive that for User Authentication this fiend remains the same.&lt;BR /&gt;Other field in the logs are changing, though.&lt;/P&gt;&lt;P&gt;Such as:&amp;nbsp;&lt;STRONG&gt;Username&amp;nbsp;&lt;/STRONG&gt;USERNAME,host/HOSTNAME.DOMAIN.com&lt;/P&gt;&lt;P&gt;The request has user portion /host domain portion in the request.&lt;BR /&gt;Again we don't see what is it in SecDemo_AD_CAP certificate profile for AuthN.&lt;BR /&gt;The policy in the guide doesn't check a certificate portion like CN or SAN.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 19:57:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4416377#M567780</guid>
      <dc:creator>fedor.solovev</dc:creator>
      <dc:date>2021-06-10T19:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP and ISE machine and user certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4416437#M567789</link>
      <description>&lt;P&gt;At the same time I have to distinguish between the statuses:&lt;BR /&gt;1) MACHINE PASS, when user didn't attempt to authenticate, and grand access,&lt;/P&gt;&lt;P&gt;2) and Machine Pass but a User fails, so the access should not be granted.&lt;BR /&gt;For both cases the &lt;U&gt;eap&amp;nbsp;chaining&lt;/U&gt;&amp;nbsp;status will be &lt;U&gt;User failed and machine succeeded&lt;/U&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 21:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-and-ise-machine-and-user-certificate-authentication/m-p/4416437#M567789</guid>
      <dc:creator>fedor.solovev</dc:creator>
      <dc:date>2021-06-10T21:42:13Z</dc:date>
    </item>
  </channel>
</rss>

