<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Non domain computer using EAP-TLS via Machine Certificate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4661425#M576450</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/160495"&gt;@daniel.tanch&lt;/a&gt; AD is recommended, because as indicated typically computers are AD domain joined....but you can authenticate non-domain joined computers as long as you can enroll the device with a certificate. You can do this using either the initial recommendation, or use an MDM to distribute certficates or use the ISE BYOD portal. &lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867#toc-hId-640661554" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867#toc-hId-640661554&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 01 Aug 2022 14:08:21 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-08-01T14:08:21Z</dc:date>
    <item>
      <title>Non domain computer using EAP-TLS via Machine Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4659334#M576396</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;1) I will like to check and verify is it possible to do EAP-TLS via machine certificate for a non domain join computer? If so how do I go about doing it? The non domain computer will be manually signed by the CA server. As of now, I had a workaround using MAB and it working successfully.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;2) Possible to verify that the non domain join computer OS is "Windows" when doing the authentication/authorization? And what are the steps to do it?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2022 10:00:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4659334#M576396</guid>
      <dc:creator>daniel.tanch</dc:creator>
      <dc:date>2022-07-28T10:00:31Z</dc:date>
    </item>
    <item>
      <title>Re: Non domain computer using EAP-TLS via Machine Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4659417#M576398</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- FYI :&amp;nbsp;&lt;A href="https://www.cwnp.com/forums/posts?postNum=300324" target="_blank"&gt;https://www.cwnp.com/forums/posts?postNum=300324&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2022 12:11:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4659417#M576398</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-07-28T12:11:45Z</dc:date>
    </item>
    <item>
      <title>Re: Non domain computer using EAP-TLS via Machine Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4659429#M576400</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/160495"&gt;@daniel.tanch&lt;/a&gt; yes you can do EAP-TLS on non-domain joined computers. You would manually need to create the Certificate Signing Request (CSR), send this to get signed and import the certificate to the local user certificate store and import the trust root certificates. Or alternatively you could possibly use openssl to generate the CSR, get the certificate signed and create a PKCS12 file and import this to the user certificate store.&lt;/P&gt;
&lt;P&gt;You would need ISE profiling to determine the Operating System, what profiling probes do you have enabled - you can learn OS information using DHCP and NMAP probes.&lt;/P&gt;
&lt;P&gt;What ISE license level do you have? If using ISE 3.x you'd need the Advantage license to use profiling features.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2022 12:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4659429#M576400</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-07-28T12:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: Non domain computer using EAP-TLS via Machine Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4659798#M576409</link>
      <description>&lt;P&gt;Is there any steps/guides on how to do it on the Cisco ISE? I tried and it failed, thus I tried with a join domain computer using machine certificate, everything was working successfully. Is there anyway to verify if it due to the signed cert on the non domain computer that is causing this problem?&lt;/P&gt;
&lt;P&gt;Noted on the 2nd point, currently I am using a trial version (3.x) before purchasing the license.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 02:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4659798#M576409</guid>
      <dc:creator>daniel.tanch</dc:creator>
      <dc:date>2022-07-29T02:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: Non domain computer using EAP-TLS via Machine Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4661304#M576439</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;
&lt;P&gt;I saw from "&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975-configure-eap-tls-authentication-with-is.html&amp;quot;," target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975-configure-eap-tls-authentication-with-is.html",&lt;/A&gt;&amp;nbsp; it stated "&lt;SPAN&gt;Active Directory is typically used to support Machine Authentication against the computer account and/or User Authentication against the end-user account in Active Directory." But the computers are not domain joined can it still work using machine authentication (EAP-TLS)?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditor_df167336970096danieltanch_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Use External Identity Source.png" style="width: 730px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/158682iD02F2CC8920A3250/image-size/large?v=v2&amp;amp;px=999" role="button" title="Use External Identity Source.png" alt="Use External Identity Source.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2022 10:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4661304#M576439</guid>
      <dc:creator>daniel.tanch</dc:creator>
      <dc:date>2022-08-01T10:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: Non domain computer using EAP-TLS via Machine Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4661425#M576450</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/160495"&gt;@daniel.tanch&lt;/a&gt; AD is recommended, because as indicated typically computers are AD domain joined....but you can authenticate non-domain joined computers as long as you can enroll the device with a certificate. You can do this using either the initial recommendation, or use an MDM to distribute certficates or use the ISE BYOD portal. &lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867#toc-hId-640661554" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867#toc-hId-640661554&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2022 14:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/non-domain-computer-using-eap-tls-via-machine-certificate/m-p/4661425#M576450</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-01T14:08:21Z</dc:date>
    </item>
  </channel>
</rss>

