<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE - Windows 802.1x Certificate Based Authentication Issues in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864752#M582625</link>
    <description>&lt;P&gt;Could you please try to change the "Use Identity Form" to "Certificate Attribute" and select the attribute you see on the certificate? most likely it will be SAN - DNS. Also, could you try to change "Match Client Certificate" to "Only to resolve identity ambiguity" and test again?&lt;/P&gt;</description>
    <pubDate>Thu, 29 Jun 2023 15:26:39 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2023-06-29T15:26:39Z</dc:date>
    <item>
      <title>Cisco ISE - Windows 802.1x Certificate Based Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864348#M582606</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I'm having struggles with Windows 10 machines authentication process which is based on client certificates.&lt;/P&gt;
&lt;P&gt;Before I will elaborate on the errors I observe, I'll share the configuration of components along the way.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Windows 10 configuration:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Holds the Root CA certificates and a personal computer (client) certificate signed by the CA (we are using a custom template)&lt;/LI&gt;
&lt;LI&gt;WiredAutoConfig service is auto-running&lt;/LI&gt;
&lt;LI&gt;NIC is configured to authenticate using 802.1x, smart card or other certificate as network authentication method, use a certificate on this computer&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Switch configuration:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;aaa new-model&lt;/P&gt;
&lt;P&gt;aaa group server radius GRP-XXX-ISE&lt;BR /&gt;server name ISE01&lt;BR /&gt;server name ISE02&lt;/P&gt;
&lt;P&gt;aaa authentication dot1x default group GRP-XXX-ISE&lt;BR /&gt;aaa authorization network default group GRP-XXX-ISE&lt;BR /&gt;aaa accounting dot1x default group GRP-XXX-ISE&lt;/P&gt;
&lt;P&gt;aaa server radius dynmaic-author&lt;BR /&gt;client X.X.X.X server-key 7 XXX&lt;BR /&gt;client Y.Y.Y.Y server-key 7 YYY&lt;/P&gt;
&lt;P&gt;dot1x system-auth-control&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;authentication control-direction in&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 7&lt;BR /&gt;dot1x max-reauth-req 3&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;device-tracking attach-policy IPDT_POLICY&lt;BR /&gt;authentication control-direction in&lt;BR /&gt;authentication event server dead action authorize XXX&lt;BR /&gt;authentication event server dead action authorize voice&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication timer inactivity server dynamic&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 7&lt;BR /&gt;dot1x max-reauth-req 3&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server attribute 31 mac format ietf upper-case&lt;BR /&gt;radius-server attribute 31 send nas-port-detail mac-only&lt;BR /&gt;radius-server dead-criteria time 10 tries 3&lt;BR /&gt;radius-server deadtime 15&lt;BR /&gt;radius-server directed-request&lt;/P&gt;
&lt;P&gt;radius server ISE01&lt;BR /&gt;address ipv4 X.X.X.X auth-port 9812 acct-port 9813&lt;BR /&gt;key 7 XXX&lt;/P&gt;
&lt;P&gt;radius server ISE02&lt;BR /&gt;address ipv4 Y.Y.Y.Y auth-port 9812 acct-port 9813&lt;BR /&gt;key 7 YYY&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Cisco ISE configuration:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Root/Sub CA certificates&lt;/LI&gt;
&lt;LI&gt;ISE signed certificates (for EAP)&lt;/LI&gt;
&lt;LI&gt;NAD (user switch)&lt;/LI&gt;
&lt;LI&gt;CAP (certificate authentication profile) pointing to subject common name and AD as identity store&lt;/LI&gt;
&lt;LI&gt;EAP-TLS authentication policy set&lt;/LI&gt;
&lt;LI&gt;Certificate parameters and AD membership authorization policy&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I get the following errors on each device type:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Windows 10&lt;/STRONG&gt; - Authentication failed&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Switch:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;%DOT1X-5-FAIL Authentication failed for cliient with reason (No Response from Client) on Interface Gi1/0/1&lt;BR /&gt;%SESSION_MGR-5-FAIL: Authorization failed or unapplied for client on Interface Gi1/0/1. Failure reason: Authc fail. Authc failure reason: Cred Fail.&lt;BR /&gt;%DOT1X-5-FAIL Authentication failed for cliient with reason (Cred Fail) on Interface Gi1/0/2&lt;BR /&gt;%SESSION_MGR-5-FAIL: Authorization failed or unapplied for client on Interface Gi1/0/2. Failure reason: Authc fail. Authc failure reason: Cred Fail.&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Cisco ISE:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;22017 Selected Identity Source is DenyAccess&lt;BR /&gt;12831 Unable to download CRL22056 Subject&lt;BR /&gt;22044 Identity policy result is configured for certificate based authentication methods but received password based&lt;/P&gt;
&lt;P&gt;22056 Subject not found in the applicable identity store(s)&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 04:13:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864348#M582606</guid>
      <dc:creator>Guy Greenshtein</dc:creator>
      <dc:date>2023-06-29T04:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Windows 802.1x Certificate Based Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864351#M582607</link>
      <description>&lt;P&gt;clarify one more thing, is the CA used for issuing client certificate and ISE system certificate for EAP usage same ? &lt;/P&gt;
&lt;P&gt;Also can I assume you have created a separate Identity source sequence calling certificate profile and AD under auth search list and using this Identity source sequence in your authentication policy ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 04:39:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864351#M582607</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2023-06-29T04:39:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Windows 802.1x Certificate Based Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864377#M582609</link>
      <description>&lt;P&gt;The CA we are using in the system is global and used for client certificate issuing, as well as for all ISE related certificates, including EAP authentication.&lt;/P&gt;
&lt;P&gt;I have an ISS in place that points to the created CAP for Certificate Based Authentication, as well as All_AD_Join_Points for Authentication Search List.&lt;/P&gt;
&lt;P&gt;In the Advanced Search List Settings I configured the option for If a selected identity store cannot be accessed for authentication "Treat as if the user was not found and proceed to the next store in sequence".&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 06:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864377#M582609</guid>
      <dc:creator>Guy Greenshtein</dc:creator>
      <dc:date>2023-06-29T06:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Windows 802.1x Certificate Based Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864399#M582610</link>
      <description>&lt;P&gt;Could you please share the CAP configs and the authentication rule for review? it does seem that the EAP traffic coming from the client is not matching the right authentication rule.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 07:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864399#M582610</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-06-29T07:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Windows 802.1x Certificate Based Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864402#M582611</link>
      <description>&lt;P&gt;CAP configuration&lt;/P&gt;
&lt;P&gt;Name - CAP Test&lt;/P&gt;
&lt;P&gt;Identity Store - AD-Servers&lt;/P&gt;
&lt;P&gt;Use Identity From - Any subject or alternative name attributes in the certificate (for Active Directory only)&lt;/P&gt;
&lt;P&gt;Match client certificate against certificate in identity store - always perform binary comparison&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;General policy set rule:&lt;/P&gt;
&lt;P&gt;Name - Rule 1&lt;/P&gt;
&lt;P&gt;Conditions - RADIUS-NAS-Port-Type EQUALS Ethernet&lt;/P&gt;
&lt;P&gt;Allow Protocols/Server Sequence - APS&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(APS config - Allow PEAP, Allow EAP-TLS, Allow EAP-FAST, allow EAP-TTLS, Allow TEAP)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Authentication Policy:&lt;/P&gt;
&lt;P&gt;Rule 1 - Conditions Wired_802.1X (Cisco ISE default), Use ISS sequence (stated in the post above)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see actual hits on this rule.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 07:27:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864402#M582611</guid>
      <dc:creator>Guy Greenshtein</dc:creator>
      <dc:date>2023-06-29T07:27:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Windows 802.1x Certificate Based Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864752#M582625</link>
      <description>&lt;P&gt;Could you please try to change the "Use Identity Form" to "Certificate Attribute" and select the attribute you see on the certificate? most likely it will be SAN - DNS. Also, could you try to change "Match Client Certificate" to "Only to resolve identity ambiguity" and test again?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 15:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864752#M582625</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-06-29T15:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Windows 802.1x Certificate Based Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864824#M582632</link>
      <description>&lt;P&gt;why don't you start with a simpler authorization profile and see if it works for e.g certificate issuer contains &amp;lt;your CA name&amp;gt; and see if client authenticates, then add more conditions.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 18:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4864824#M582632</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2023-06-29T18:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Windows 802.1x Certificate Based Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4865814#M582651</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/459646"&gt;@Guy Greenshtein&lt;/a&gt; : I like ammahend's idea -- good to start with simple.&lt;/P&gt;
&lt;P&gt;&amp;gt; ... 22044 Identity policy result is configured for certificate based authentication methods but received password based&lt;/P&gt;
&lt;P&gt;So, it does not seem ISE getting the client certificate.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2023 07:14:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4865814#M582651</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2023-07-02T07:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Windows 802.1x Certificate Based Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4865820#M582653</link>
      <description>&lt;P&gt;I agree that it's better to start with a very basic and simple condition and that is what I did - check the certificate issuer. After getting the error message, I understand that it is probably something that is related to the supplicant side, although it is weird since the NIC is properly configured to use Smart card or other certificate. I will check if it might be something related to GPO hardening or driver issue.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2023 07:57:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-windows-802-1x-certificate-based-authentication-issues/m-p/4865820#M582653</guid>
      <dc:creator>Guy Greenshtein</dc:creator>
      <dc:date>2023-07-02T07:57:19Z</dc:date>
    </item>
  </channel>
</rss>

