<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Machine + user Auth/Authorize based only on AD in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5119453#M589691</link>
    <description>The client should hire their preferred partner of choice to help them implement a PKI instead.&lt;BR /&gt;&lt;BR /&gt;VLAN use-case makes sense if this for upstream firewall rules and should work fine for devices with a supplicant. I would also consider looking at SGTs instead of VLAN changes and using an SGT aware firewall to enforce instead. Just be wary about changing VLANs where clients are not aware a VLAN change has occurred and must request a new DHCP address post VLAN change.&lt;BR /&gt;</description>
    <pubDate>Wed, 29 May 2024 12:31:28 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2024-05-29T12:31:28Z</dc:date>
    <item>
      <title>Machine + user Auth/Authorize based only on AD</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5119350#M589684</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I'm searching a method of NAC implementation in a scenario using only AD (client doesn't have CA for generating certs yet) for Wired.&lt;/P&gt;
&lt;P&gt;1st do -&amp;gt; Machine (Windows10) autentication with AD (Domain Computer).&lt;/P&gt;
&lt;P&gt;2nd do -&amp;gt; User Auth + Authorize with dynamic Vlan x.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm not pretty sure how to configure this on ISE. There will 2 rules under Authorization? How can I tie this order together?&lt;/P&gt;
&lt;P&gt;Also I want the user to enter the credential only one time, when he log on the station, i guess enable single sing on should be checked.&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 10:58:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5119350#M589684</guid>
      <dc:creator>SorinPopa</dc:creator>
      <dc:date>2024-05-29T10:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: Machine + user Auth/Authorize based only on AD</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5119388#M589686</link>
      <description>&lt;P&gt;Why doesn't the client deploy a PKI/CA?&amp;nbsp; What is the use-case for changing VLANs?&amp;nbsp; PEAP is broken from an encryption standpoint and should no longer be used.&amp;nbsp; Credential Guard in newer versions of Windows disables PEAP.&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 11:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5119388#M589686</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-05-29T11:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: Machine + user Auth/Authorize based only on AD</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5119409#M589690</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The client does not have the technical capability to implement right now a PKI/CA. The use case for changing vlans is for network segmentation for the departments like Sales, Marketing, IT, etc. Each OU group from AD with a different vlans so that we can deploy firewall rules on top.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 12:15:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5119409#M589690</guid>
      <dc:creator>SorinPopa</dc:creator>
      <dc:date>2024-05-29T12:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: Machine + user Auth/Authorize based only on AD</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5119453#M589691</link>
      <description>The client should hire their preferred partner of choice to help them implement a PKI instead.&lt;BR /&gt;&lt;BR /&gt;VLAN use-case makes sense if this for upstream firewall rules and should work fine for devices with a supplicant. I would also consider looking at SGTs instead of VLAN changes and using an SGT aware firewall to enforce instead. Just be wary about changing VLANs where clients are not aware a VLAN change has occurred and must request a new DHCP address post VLAN change.&lt;BR /&gt;</description>
      <pubDate>Wed, 29 May 2024 12:31:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5119453#M589691</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-05-29T12:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: Machine + user Auth/Authorize based only on AD</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5120122#M589710</link>
      <description>&lt;P&gt;Use &lt;A href="https://cs.co/ise-berg#TEAP" target="_self"&gt;TEAP&lt;/A&gt; as the authentication protocol to provide both machine + user credentials at the same time.&lt;/P&gt;
&lt;P&gt;See &lt;LI-MESSAGE title="ISE Authentication and Authorization Policy Reference" uid="3850472" url="https://community.cisco.com/t5/security-knowledge-base/ise-authentication-and-authorization-policy-reference/m-p/3850472#U3850472" discussion_style_icon_css="lia-mention-container-editor-message lia-img-icon-tkb-thread lia-fa-icon lia-fa-tkb lia-fa-thread lia-fa"&gt;&lt;/LI-MESSAGE&gt;&amp;nbsp;&amp;gt; &lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-authentication-and-authorization-policy-reference/ta-p/3850472#toc-hId-956975206" rel="nofollow noopener noreferrer" target="_blank"&gt;TEAP-Chaining with Tunneled EAP (TEAP)&lt;/A&gt; for a policy example.&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 23:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5120122#M589710</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-05-29T23:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Machine + user Auth/Authorize based only on AD</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5120131#M589711</link>
      <description>&lt;P&gt;Just be aware that, while using TEAP with an inner method of MSCHAPv2 is possible, you will need to ensure that Credential Guard is disabled in order for MSCHAPv2 to work as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;pointed out earlier.&lt;BR /&gt;&lt;A href="https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/considerations-known-issues" target="_blank"&gt;https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/considerations-known-issues&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Credential Guard was implemented to mitigate specific vulnerabilities (such as pass-the-hash), so a better option would be to move to certificate-based authentication methods like EAP-TLS (as recommended by MS). Microsoft is actively moving to disable support for weak protocols, so I would not be surprised if they remove the ability to disable Credential Guard in the future.&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 00:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5120131#M589711</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-05-30T00:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: Machine + user Auth/Authorize based only on AD</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5120212#M589715</link>
      <description>&lt;P&gt;Ok, thank you very much guys for all the usefull information. I will try it and speak with the customer to migrate to PKI/CA asap.&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 06:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-user-auth-authorize-based-only-on-ad/m-p/5120212#M589715</guid>
      <dc:creator>SorinPopa</dc:creator>
      <dc:date>2024-05-30T06:13:54Z</dc:date>
    </item>
  </channel>
</rss>

