<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE EAP-TLS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018349#M587335</link>
    <description>&lt;P&gt;Can you more elaborate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Wed, 14 Feb 2024 16:55:14 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-02-14T16:55:14Z</dc:date>
    <item>
      <title>Cisco ISE EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018339#M587334</link>
      <description>&lt;P&gt;If i need to use EAP-TLS as user authentication method for my TEAP authentication.&lt;/P&gt;
&lt;P&gt;I was wondering how the user authenticate with his unique certificate ? , the user type his credentials , but how his certificate goes to different devices ?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 16:41:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018339#M587334</guid>
      <dc:creator>AFAWZY</dc:creator>
      <dc:date>2024-02-14T16:41:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018349#M587335</link>
      <description>&lt;P&gt;Can you more elaborate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 16:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018349#M587335</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-14T16:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018352#M587336</link>
      <description>&lt;P&gt;When we use EAP-TLS we don't type in any credentials as EAP-TLS will be using the machine or user certificate to authenticate. You mention TEAP authentication. TEAP authentication will allow EAP-Chaining natively on Windows without having to install any additional piece of software such as AnyConnect NAM.&lt;/P&gt;
&lt;P&gt;When TEAP is in use, both the machine and the user authentications will be included in the same transaction. The configuration of each could vary, for instance, you can decide to do EAP-TLS for the machine authentication and EAP-PEAP (username and password) for the user. Or, you can use EAP-TLS for both of them. You configure those authentication methods in the endpoint NIC settings under the dot1x tab.&lt;/P&gt;
&lt;P&gt;The certificate that will be presented by the endpoint during the authentication would be the one in the personal folder in the certificates containers in Windows, that would be the case for both the machine and the user, each will present its identity certificate that is hosted in the personal folder.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 16:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018352#M587336</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-14T16:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018379#M587337</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1547608"&gt;@AFAWZY&lt;/a&gt; its the Windows Group Policy Objects (GPO) that configures the device to use TEAP (with the machine and user certificates) for 802.1X authentication, a GPO would also configure certificate enrollment for the machine and users to automatically enrol for the certificates. When the user logs into a different device, they will not have a user certificate if they have never logged into that device before, its the user GPO settings that would send down the user certificate, which can then be used for 802.1X authentication.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 17:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018379#M587337</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-14T17:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018403#M587341</link>
      <description>&lt;P&gt;Thank you &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt; for your explanation.&lt;/P&gt;
&lt;P&gt;I tried only PEAP (MS-CHAPv2) and i'm facing issue with wireless network access, and after searching i found that new windows has a feature called ( credential guard ) which has conflict with MS-CHAP, so users can't connect to SSID. I'm not sure yet that this is the problem for my wireless but alot of people face it. That's why i need to go away from PEAP and use TLS.&lt;/P&gt;
&lt;P&gt;So, about your words " the one in the personal folder in the certificates containers in Windows " . how different users can get the certificate used for the authentication in the personal folder of the same machine ?. i need to understand this flow if user called Aref and another one called fawzy trying to authenticate through the same machine ( the user authentication phase ) , how the supplicant will use different certificate to authenticate and how the pc can get these different certificates.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; this can be my question with more explanation&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 18:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018403#M587341</guid>
      <dc:creator>AFAWZY</dc:creator>
      <dc:date>2024-02-14T18:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018419#M587343</link>
      <description>&lt;P&gt;Thank you &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; .&lt;/P&gt;
&lt;P&gt;i need more explanation about the certificate automatic enrollment. and&amp;nbsp; what is the suitable GPO configuration for the TLS user authentication. &lt;/P&gt;
&lt;P&gt;and how pc get the certificate of the different logged in users for the same pc ?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 18:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018419#M587343</guid>
      <dc:creator>AFAWZY</dc:creator>
      <dc:date>2024-02-14T18:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018424#M587344</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1547608"&gt;@AFAWZY&lt;/a&gt; the GPO settings configures the computer to auto-enroll for a machine certificate, this is stored in the computer certificate store. For each user that logs into a computer they have their own unique user certificate store, when the GPO is configured they receive a user certificate which is stored in their own unique user certificate store. The user certificates are unique per user, so if another user logs into the computer (if configured) they will receive a different user certificate, which is stored in their unique user certificate store.&lt;/P&gt;
&lt;P&gt;Examples:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.packetswitch.co.uk/dot1x-certs/" target="_blank"&gt;https://www.packetswitch.co.uk/dot1x-certs/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2019/07/13/configuring-windows-gpo-for-802-1x-authentication/" target="_blank"&gt;https://integratingit.wordpress.com/2019/07/13/configuring-windows-gpo-for-802-1x-authentication/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 18:52:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018424#M587344</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-14T18:52:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018480#M587349</link>
      <description>&lt;P&gt;This is a tricky use case due to the order of operations that Windows has for initiating the 802.1x process before the User GPO kicks in. See this discussion for more info on that process.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/ise-deployment-eap-tls-machine-or-user-certificates-native/td-p/4094444" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/ise-deployment-eap-tls-machine-or-user-certificates-native/td-p/4094444&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;One option to help with this catch-22 situation using TEAP is discussed here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/eap-teap-first-time-user-login-chicken-amp-egg-scenario/td-p/4475351" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/eap-teap-first-time-user-login-chicken-amp-egg-scenario/td-p/4475351&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 21:38:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls/m-p/5018480#M587349</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-02-14T21:38:00Z</dc:date>
    </item>
  </channel>
</rss>

