<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: An EAP-TLS Wi-Fi is Aksing for Username and Password in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5125373#M589851</link>
    <description>&lt;P&gt;The Authentication Mode = Computer will only trigger an 802.1x authentication when in the Computer state (before the user logs in or after the user logs out). The supplicant does not have a profile for automatic user authentication using EAP-TLS, which is why you're being prompted for credentials (for PEAP[MSCHAPv2]).&lt;/P&gt;
&lt;P&gt;If you want the supplicant to automatically authenticate when in the User state, you would need to change the Authentication mode to either 'User or Computer Authentication' or 'User Authentication'. The latter will mean there will be no network access in the Computer state.&lt;/P&gt;</description>
    <pubDate>Tue, 04 Jun 2024 23:25:59 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2024-06-04T23:25:59Z</dc:date>
    <item>
      <title>An EAP-TLS Wi-Fi is Aksing for Username and Password</title>
      <link>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5125093#M589843</link>
      <description>&lt;P&gt;I had an 802.1x EAP-TLS Wi-Fi network working in Windows NPS to auth PC's based on a machine certificate on the company laptops.&lt;/P&gt;&lt;P&gt;I'm trying to get this working on ISE. But, for some reason I'm being prompted for a Username and Password.&lt;/P&gt;&lt;P&gt;I pushed the Wi-Fi network settings to a test laptop using GPO. It's configured for Smart Card or other certificate Authentication, and the Mode = Computer. Under Properties I checked off our internal CA server as the Trusted CA.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MatthewMartin_2-1717523309545.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/220027i71D300EDF6EAB6F2/image-size/large?v=v2&amp;amp;px=999" role="button" title="MatthewMartin_2-1717523309545.png" alt="MatthewMartin_2-1717523309545.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Then, on ISE I followed &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975-configure-eap-tls-authentication-with-is.html" target="_self"&gt;this guide&lt;/A&gt; to setup the Cert authentication, Policy Sets, Certificate Authentication Profile, etc...&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MatthewMartin_3-1717523594548.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/220029iDE0A786C4B5C1785/image-size/large?v=v2&amp;amp;px=999" role="button" title="MatthewMartin_3-1717523594548.png" alt="MatthewMartin_3-1717523594548.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When the test client laptop tries to connect, I am getting prompted for a Username and Password... No idea why this is prompting me.&lt;/P&gt;&lt;P&gt;I have almost the exact same Policy Set for Wired, minus the Called-Station-ID condition, and Wired does not prompt for username and password. So I'm not sure why Wireless is.&lt;/P&gt;&lt;P&gt;Any ideas why this would be prompting for a username and password? Any thoughts would be greatly appreciated!&lt;/P&gt;&lt;P&gt;-Matt&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 19:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5125093#M589843</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2024-06-04T19:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: An EAP-TLS Wi-Fi is Aksing for Username and Password</title>
      <link>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5125149#M589844</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325526"&gt;@Matthew Martin&lt;/a&gt; has the GPO with these settings been applied to the computer? as opposed to the user.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 19:32:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5125149#M589844</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-04T19:32:34Z</dc:date>
    </item>
    <item>
      <title>Re: An EAP-TLS Wi-Fi is Aksing for Username and Password</title>
      <link>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5125300#M589847</link>
      <description>&lt;P&gt;Correct, GPO is applied to Computer according to "gpresult /r /scope computer".&lt;/P&gt;&lt;P&gt;Would that be something on the ISE side that is causing the Login Prompt? I tried removing the condition in Policy Sets that says the device needs to be in "Domain Computers" group and I still prompted. So I added that condition back...&lt;/P&gt;&lt;P&gt;-Matt&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 21:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5125300#M589847</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2024-06-04T21:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: An EAP-TLS Wi-Fi is Aksing for Username and Password</title>
      <link>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5125373#M589851</link>
      <description>&lt;P&gt;The Authentication Mode = Computer will only trigger an 802.1x authentication when in the Computer state (before the user logs in or after the user logs out). The supplicant does not have a profile for automatic user authentication using EAP-TLS, which is why you're being prompted for credentials (for PEAP[MSCHAPv2]).&lt;/P&gt;
&lt;P&gt;If you want the supplicant to automatically authenticate when in the User state, you would need to change the Authentication mode to either 'User or Computer Authentication' or 'User Authentication'. The latter will mean there will be no network access in the Computer state.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 23:25:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5125373#M589851</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-06-04T23:25:59Z</dc:date>
    </item>
    <item>
      <title>Re: An EAP-TLS Wi-Fi is Aksing for Username and Password</title>
      <link>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5125550#M589856</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325526"&gt;@Matthew Martin&lt;/a&gt; If it's prompting for authentication I believe this is a supplicant issue. If the supplicant was configured correctly, I'd expect the authentication request to be sent to ISE and the ISE logs to reflect a failed authentication (if the ISE rules where incorrect/not matched), not prompt for credentials on the computer side.&lt;/P&gt;
&lt;P&gt;If the device is configured for "Computer authentication" 802.1X can trigger in the user state, it sends the computer credentials to ISE.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 07:25:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5125550#M589856</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-05T07:25:40Z</dc:date>
    </item>
    <item>
      <title>Re: An EAP-TLS Wi-Fi is Aksing for Username and Password</title>
      <link>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5128207#M589955</link>
      <description>&lt;P&gt;Hey All,&lt;/P&gt;&lt;P&gt;Sorry for the delayed response. Had to step away from this for a few days and work on another project that we have going on. Came back to this today, and I think I figured out the problem.&lt;/P&gt;&lt;P&gt;I don't know why it was done this way. It was done before I had any involvement on the Windows Admin side. Where each Domain joined PC is getting 2 certificates from our internal CA. One template appears to be created from the standard "Computer" template certificate found in the Windows CA, and the other one, if I remember correctly was setup by a consultant we hired to help us setup ISE many many years ago &lt;EM&gt;(*ISE 1.x)&lt;/EM&gt;.. Both certs are still being pushed out via GPO, and are being auto-renewed as well.&lt;/P&gt;&lt;P&gt;The default "Computer" certificate uses all the standard options you'd expect and is configured for Client and Server Auth. The other template that was created by the consultant is a Machine template configured for Client Auth only. It appears that this Cert was configured to not have a Subject Common-Name, which I noticed in the ISE logs and then went to check the Cert on the test laptop and it indeed did NOT have a Subject CN configured. What was configured was Subject Alternative Name &lt;EM&gt;"DNS Name=myComputer@mydomain.com"&lt;/EM&gt;. This appears to be the only field in this template that shows the PC Name configured in AD.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Found this in the Auth Details for the Test Laptop:&lt;/STRONG&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MatthewMartin_0-1718050494049.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/220545i8DE9422BC5CBF543/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MatthewMartin_0-1718050494049.png" alt="MatthewMartin_0-1718050494049.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;So I went into the Certificate Authentication Profile and changed the option to: &lt;EM&gt;Any Subject or Alternative Name Attributes in the Certificate.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Since both of those client certs I mentioned are signed by our Internal CA, and that is the CA server ticked in the Windows Wireless Profile config &lt;EM&gt;(*And Simple Certificate Selection is being used)&lt;/EM&gt;. I'm not sure how it decides which cert to present during Network Authentication. But, it appears that one was being selected.&lt;/P&gt;&lt;P&gt;After changing the Certificate Authentication Profile to any alternative name. Authentication started working correctly on this Wi-Fi network.&lt;/P&gt;&lt;P&gt;-Matt&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 20:19:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/an-eap-tls-wi-fi-is-aksing-for-username-and-password/m-p/5128207#M589955</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2024-06-10T20:19:24Z</dc:date>
    </item>
  </channel>
</rss>

