<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Mixing internal users and certificate authentication on ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mixing-internal-users-and-certificate-authentication-on-ise/m-p/5105280#M589444</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We actually use an ISE (version 3.1) to authenticate endpoints in wifi&amp;nbsp; using a certificate.&lt;/P&gt;&lt;P&gt;The configuration is pretty simple but now we want to allow authentication for internal users (created and stored in the ISE)&amp;nbsp;&lt;/P&gt;&lt;P&gt;Problem is, the users don't use a certificate.&lt;/P&gt;&lt;P&gt;In our policy set, the PKI server is explicitly used in the Authentication Policy&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AK59_0-1715805076550.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218433iA683BA92E32AFF44/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AK59_0-1715805076550.png" alt="AK59_0-1715805076550.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We can change that option and select a specific Identity Source Sequence including Internal Users, but the criteria "Certificate based Authentication" is also ticked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AK59_1-1715805235330.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218434i2932CE0B3AA1CDA4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AK59_1-1715805235330.png" alt="AK59_1-1715805235330.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our question is :&lt;/P&gt;&lt;P&gt;If we replace the PKI server on the Authentication Policy by the sequence shown above (using Internal Users/Certificated based), will it authenticat an internal user without certificate ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS : We have this "Advanced Search List Settings" option that seems to answer our question but we're still skeptical regarding the certificate based option.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AK59_2-1715805268224.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218435i535821F764977CA7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AK59_2-1715805268224.png" alt="AK59_2-1715805268224.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 15 May 2024 20:41:25 GMT</pubDate>
    <dc:creator>AK59</dc:creator>
    <dc:date>2024-05-15T20:41:25Z</dc:date>
    <item>
      <title>Mixing internal users and certificate authentication on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/mixing-internal-users-and-certificate-authentication-on-ise/m-p/5105280#M589444</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We actually use an ISE (version 3.1) to authenticate endpoints in wifi&amp;nbsp; using a certificate.&lt;/P&gt;&lt;P&gt;The configuration is pretty simple but now we want to allow authentication for internal users (created and stored in the ISE)&amp;nbsp;&lt;/P&gt;&lt;P&gt;Problem is, the users don't use a certificate.&lt;/P&gt;&lt;P&gt;In our policy set, the PKI server is explicitly used in the Authentication Policy&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AK59_0-1715805076550.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218433iA683BA92E32AFF44/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AK59_0-1715805076550.png" alt="AK59_0-1715805076550.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We can change that option and select a specific Identity Source Sequence including Internal Users, but the criteria "Certificate based Authentication" is also ticked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AK59_1-1715805235330.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218434i2932CE0B3AA1CDA4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AK59_1-1715805235330.png" alt="AK59_1-1715805235330.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our question is :&lt;/P&gt;&lt;P&gt;If we replace the PKI server on the Authentication Policy by the sequence shown above (using Internal Users/Certificated based), will it authenticat an internal user without certificate ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS : We have this "Advanced Search List Settings" option that seems to answer our question but we're still skeptical regarding the certificate based option.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AK59_2-1715805268224.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218435i535821F764977CA7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AK59_2-1715805268224.png" alt="AK59_2-1715805268224.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 20:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mixing-internal-users-and-certificate-authentication-on-ise/m-p/5105280#M589444</guid>
      <dc:creator>AK59</dc:creator>
      <dc:date>2024-05-15T20:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: Mixing internal users and certificate authentication on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/mixing-internal-users-and-certificate-authentication-on-ise/m-p/5105362#M589455</link>
      <description>&lt;P&gt;You don't change anything in the Identity Source Sequence, nor in the Certificate Profile. The difference between cert auth (EAP-TLS) and username/password auth (EAP-PEAP) is handled during Authentication.&lt;/P&gt;
&lt;P&gt;The way it's done is to check what EAP Method is being used in the ISE Authentication in the Policy Set.&lt;/P&gt;
&lt;P&gt;If Network Access-EapTunnel EQUALS PEAP&amp;nbsp; &amp;nbsp; then use Internal Users&lt;/P&gt;
&lt;P&gt;If Network Access-EAPAuthentication EQUALS EAP-TLS&amp;nbsp; &amp;nbsp; then use Cert_Profile&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the Authorization part of the Policy Set, you can again differentiate between cert and credential auth, if you must treat them differently. E.g. If you know that PEAP authentications are users whose accounts live in ISE, then you can make that as part of an AND condition&lt;/P&gt;
&lt;P&gt;If Network Access-EapTunnel EQUALS PEAP AND InternalUser Identity Group EQUALS Employee&amp;nbsp; &amp;nbsp;then .....&lt;/P&gt;
&lt;P&gt;Remember that Authorization happens AFTER successful authentication - which means you don't have to test logic conditions that passed in the Authentication stage - you only do it if there is ambiguity.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 22:57:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mixing-internal-users-and-certificate-authentication-on-ise/m-p/5105362#M589455</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-05-15T22:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: Mixing internal users and certificate authentication on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/mixing-internal-users-and-certificate-authentication-on-ise/m-p/5105734#M589458</link>
      <description>&lt;P&gt;Thanks Arne for the reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I forgot to mention the fact that before using the Authentication Policy there is a first rule with "Wireless 802.1x" as a condition and as allowed protocol "EAP-TLS".&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AK59_0-1715842573227.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218449iA30774C4CDED4625/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AK59_0-1715842573227.png" alt="AK59_0-1715842573227.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Do I have to create a whole new policy before that one and specify Wireless 802.1x as condition and PEAP as Allowed Protocols ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 09:35:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mixing-internal-users-and-certificate-authentication-on-ise/m-p/5105734#M589458</guid>
      <dc:creator>AK59</dc:creator>
      <dc:date>2024-05-16T09:35:13Z</dc:date>
    </item>
    <item>
      <title>Re: Mixing internal users and certificate authentication on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/mixing-internal-users-and-certificate-authentication-on-ise/m-p/5106655#M589477</link>
      <description>&lt;P&gt;I tend to make one RADIUS Policy Set per SSID (in organizations that have more than one 802.1X SSID)&lt;/P&gt;
&lt;P&gt;Help ISE to select the appropriate authentication method (column "Use") by testing the EAP Method used.&lt;/P&gt;
&lt;P&gt;In my example, the top Condition uses the default "Allowed Protocols" - in practice I would make a custom one, and include only EAP-TLS and EAP-PEAP (and untick all the other boxes)&lt;/P&gt;
&lt;P&gt;Example below:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1715900959709.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218533iCFE4C265AAECF79D/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_0-1715900959709.png" alt="ArneBier_0-1715900959709.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 23:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mixing-internal-users-and-certificate-authentication-on-ise/m-p/5106655#M589477</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-05-16T23:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: Mixing internal users and certificate authentication on ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/mixing-internal-users-and-certificate-authentication-on-ise/m-p/5107776#M589486</link>
      <description>&lt;P&gt;Thank you it's very clear now !&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 13:46:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mixing-internal-users-and-certificate-authentication-on-ise/m-p/5107776#M589486</guid>
      <dc:creator>AK59</dc:creator>
      <dc:date>2024-05-17T13:46:59Z</dc:date>
    </item>
  </channel>
</rss>

