<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dot1x without external identity store in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051367#M588414</link>
    <description>&lt;P&gt;All good points. Thanks.&lt;/P&gt;&lt;P&gt;Is it also possible to use profiling probe results for authentication and authorization?&lt;/P&gt;</description>
    <pubDate>Wed, 27 Mar 2024 12:10:35 GMT</pubDate>
    <dc:creator>DamianRCL</dc:creator>
    <dc:date>2024-03-27T12:10:35Z</dc:date>
    <item>
      <title>Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051345#M588411</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Is it possible to implement Dot1x without AD or LDAP integration? If so, what are some ways it can be done?&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 11:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051345#M588411</guid>
      <dc:creator>DamianRCL</dc:creator>
      <dc:date>2024-03-27T11:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051349#M588412</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1699627"&gt;@DamianRCL&lt;/a&gt; you can perform 802.1X using EAP-TLS certificates without an External Identity Source. &lt;/P&gt;
&lt;P&gt;Though, typically if using certificates issued from an Internal CA you would authenticate the certificates and then optionally perform a lookup against AD for associated attributes, if required.&lt;/P&gt;
&lt;P&gt;You could use a local account on ISE, I would not recommend it as it's not scalable solution.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 11:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051349#M588412</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-27T11:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051351#M588413</link>
      <description>&lt;P&gt;If you have radius server then sure you can use it local DB for auth the endpoint&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 11:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051351#M588413</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-27T11:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051367#M588414</link>
      <description>&lt;P&gt;All good points. Thanks.&lt;/P&gt;&lt;P&gt;Is it also possible to use profiling probe results for authentication and authorization?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 12:10:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051367#M588414</guid>
      <dc:creator>DamianRCL</dc:creator>
      <dc:date>2024-03-27T12:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051371#M588415</link>
      <description>&lt;P&gt;ISE can use MAB or chap' and you can use profile.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 12:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051371#M588415</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-27T12:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051372#M588416</link>
      <description>&lt;P&gt;Yes, you can. But perhaps you better describe what your goal is that you want to achieve?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 12:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051372#M588416</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2024-03-27T12:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051376#M588418</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1699627"&gt;@DamianRCL&lt;/a&gt; use MAB or DOT1X for authentication and then you can use the Profiling attributes as conditions in authorisation rules, assuming you have the licensing (requires the Advantage license) for it.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 12:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051376#M588418</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-27T12:27:07Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051378#M588419</link>
      <description>&lt;P&gt;The network I'm working on uses LDAP. I would use that as an external ID store, but there would be too many hurdles&amp;nbsp; (people hurdles not technical). Currently port security is performed manually, which is an administrative chore. My goal is to implement 802.1x in a secure way without integrating with LDAP. Let me know if you need more details. Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 12:29:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051378#M588419</guid>
      <dc:creator>DamianRCL</dc:creator>
      <dc:date>2024-03-27T12:29:09Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051386#M588422</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1699627"&gt;@DamianRCL&lt;/a&gt; IMO, it doesn't seem practical to not integrate with LDAP if you have it. You will also need to consider the configuration of the endpoint supplicants configuration and how they will be configured, in an AD environment this can be deployed centrally.&lt;/P&gt;
&lt;P&gt;If you still decide not to use an External Identity Source then EAP-TLS is the most secure method, you could use the ISE CA and onboard the devices, where the users will enrol and receive a certificate. &lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 12:41:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051386#M588422</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-27T12:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051392#M588423</link>
      <description>&lt;P&gt;Duly noted, Rob. My intent was to roll this out while limiting the involvement of other silos, but it appears that won't be possible. I'll shoot for LDAP integration when the time comes.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 12:51:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051392#M588423</guid>
      <dc:creator>DamianRCL</dc:creator>
      <dc:date>2024-03-27T12:51:08Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051477#M588436</link>
      <description>&lt;P&gt;Yes, I demonstrated this in&lt;/P&gt;
&lt;H3 id="user-endpoint-custom-attributes-2022-09-06" class="maps-to-line" style="margin-top: 0.6em; margin-bottom: 0.65em; unicode-bidi: plaintext; line-height: 1.5em; font-size: 1.1em; font-weight: bold; color: #32373f; font-family: Avenir, Arial, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-source-line="1781"&gt;▷&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/nCD7LiX-XZU" href="https://youtu.be/nCD7LiX-XZU" data-from-md="" target="_blank"&gt;User &amp;amp; Endpoint Custom Attributes&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;2022-09-06&lt;/H3&gt;
&lt;P class="maps-to-line" style="margin-top: 0.6em; margin-bottom: 1.35em; unicode-bidi: plaintext; color: #32373f; font-family: Avenir, Arial, sans-serif; font-size: 15px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-source-line="1783"&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/nCD7LiX-XZU&amp;amp;t=301s" href="https://youtu.be/nCD7LiX-XZU&amp;amp;t=301s" data-from-md="" target="_blank"&gt;05:01&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Defining User Custom Attributes for ISE Internal&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;MARK style="background: #f7d26e; color: black;" data-markjs="true"&gt;Users&lt;/MARK&gt;&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/nCD7LiX-XZU&amp;amp;t=370s" href="https://youtu.be/nCD7LiX-XZU&amp;amp;t=370s" data-from-md="" target="_blank"&gt;06:10&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Defining Endpoint Custom Attributes and their Common Uses&lt;BR /&gt;&lt;A style="background-color: transparent; color: #155bda;" title="https://youtu.be/nCD7LiX-XZU&amp;amp;t=456s" href="https://youtu.be/nCD7LiX-XZU&amp;amp;t=456s" data-from-md="" target="_blank"&gt;07:36&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Demo: Creating User Custom Attributes&lt;BR /&gt;&lt;STRONG&gt;&lt;A class="" style="background-color: transparent; color: #155bda;" title="https://youtu.be/nCD7LiX-XZU&amp;amp;t=641s" href="https://youtu.be/nCD7LiX-XZU&amp;amp;t=641s" data-from-md="" target="_blank"&gt;10:41&lt;/A&gt;&amp;nbsp;Demo: ISE 802.1X Policy Review, and Authentication&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 14:54:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051477#M588436</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-03-27T14:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051994#M588467</link>
      <description>&lt;P&gt;Thanks, Thomas. I'll be sure to take a look!&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 11:16:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051994#M588467</guid>
      <dc:creator>DamianRCL</dc:creator>
      <dc:date>2024-03-28T11:16:44Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051995#M588468</link>
      <description>&lt;P&gt;Implementing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;802.1X (Dot1x)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;without integrating with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Active Directory (AD)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;LDAP&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is possible in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Cisco Identity Services Engine (ISE)&lt;/STRONG&gt;. Here are some ways to achieve this:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Local Identity Store&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Local identity store&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;within ISE allows you to create and manage user accounts directly within ISE.&lt;/LI&gt;&lt;LI&gt;You can define users and their credentials (username/password) directly in ISE.&lt;/LI&gt;&lt;LI&gt;While this approach is feasible, it’s not recommended for large-scale deployments due to scalability and management challenges.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Certificate-Based Authentication&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Instead of relying on AD or LDAP for user authentication, consider using&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;certificate-based authentication&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Configure ISE to accept client certificates (such as EAP-TLS) for authentication.&lt;/LI&gt;&lt;LI&gt;Clients present their certificates during the 802.1X process, and ISE validates them against its local certificate store or a trusted Certificate Authority (CA).&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Guest Services&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If you’re implementing Dot1x for guest access, ISE can handle guest authentication without AD or LDAP integration.&lt;/LI&gt;&lt;LI&gt;Set up a guest portal in ISE, create guest accounts, and allow access based on credentials provided during the guest registration process.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Machine Authentication (MAB)&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;While not true Dot1x,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Machine Authentication Bypass (MAB)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;allows devices to authenticate based on their MAC addresses.&lt;/LI&gt;&lt;LI&gt;Configure MAB policies in ISE to allow certain devices (e.g., printers, IP phones) without relying on AD or LDAP.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Custom Identity Sources&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ISE allows you to define custom identity sources beyond AD and LDAP.&lt;/LI&gt;&lt;LI&gt;You can create custom identity sources using&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;RADIUS&lt;/STRONG&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;RSA SecurID&lt;/STRONG&gt;, or other methods.&lt;/LI&gt;&lt;LI&gt;While not common, it provides flexibility for specific use cases.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Local Web Authentication&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;For scenarios where you need to authenticate users via a captive portal (web page), ISE can perform local web authentication.&lt;/LI&gt;&lt;LI&gt;Users provide credentials directly to ISE via the web portal.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Remember that while these methods allow Dot1x without AD or LDAP, they have limitations. Consider your specific requirements, scalability, and security needs when choosing the appropriate approach for your deployment.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;If you find this useful, please mark it helpful and accept the solution.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 11:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051995#M588468</guid>
      <dc:creator>Pulkit Mittal</dc:creator>
      <dc:date>2024-03-28T11:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051999#M588469</link>
      <description>&lt;P&gt;Thanks for this, Pulkit. This places things into perspective very nicely.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 11:46:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5051999#M588469</guid>
      <dc:creator>DamianRCL</dc:creator>
      <dc:date>2024-03-28T11:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5052001#M588470</link>
      <description>&lt;P&gt;But always keep in mind that ChaptGPT often gives inaccurate answers.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 11:52:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5052001#M588470</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2024-03-28T11:52:58Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x without external identity store</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5052042#M588473</link>
      <description>&lt;P&gt;So, I might be interested in using the local ID store, since I have no more than 150 wired users at an given time. The upfront work of putting in those users would still be better than manually configuring ports.&lt;/P&gt;&lt;P&gt;I see "External Identity Sources" under "Administration," but where is the local identity store. Also, if going this route, how does it work? Would a user have to put in credentials twice, once for ISE, then again for LDAP?&lt;/P&gt;&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;I've done some digging and learned where the local users are stored. It would appear I can have the internal users leverage LDAP for passwords. This is helpful. A question that remains is, how does the "Internal Users" option in Policy Sets tie back to the users I've added to network access users?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 16:57:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-without-external-identity-store/m-p/5052042#M588473</guid>
      <dc:creator>DamianRCL</dc:creator>
      <dc:date>2024-03-28T16:57:16Z</dc:date>
    </item>
  </channel>
</rss>

