<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic No support of EAP-MSCHAPv2 with EAP-TTLS using Azure AD in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/no-support-of-eap-mschapv2-with-eap-ttls-using-azure-ad/m-p/5138027#M590330</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;Per Cisco Identity Services Engine Administrator Guide, Release 3.3 under&amp;nbsp;&lt;SPAN class="table--title-label tabletitle"&gt;Table 13.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="tabletitle"&gt;Authentication Protocols and Supported External Identity Sources. It is mentioned that&amp;nbsp;&lt;/SPAN&gt;EAP-MSCHAPv2 (as an inner method of EAP-TTLS) is not supported with REST&amp;nbsp;External Identity Sources like Azure AD.&lt;/P&gt;
&lt;P&gt;If Windows Native Supplicant allows you to configure EAP-MSCHAPv2 (as an inner method of EAP-TTLS), then why is ISE not supporting it?&lt;/P&gt;
&lt;P&gt;Is this restriction from the ISE side OR the Azure AD Side?&lt;/P&gt;</description>
    <pubDate>Sun, 30 Jun 2024 05:47:11 GMT</pubDate>
    <dc:creator>jitendrac</dc:creator>
    <dc:date>2024-06-30T05:47:11Z</dc:date>
    <item>
      <title>No support of EAP-MSCHAPv2 with EAP-TTLS using Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/no-support-of-eap-mschapv2-with-eap-ttls-using-azure-ad/m-p/5138027#M590330</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;Per Cisco Identity Services Engine Administrator Guide, Release 3.3 under&amp;nbsp;&lt;SPAN class="table--title-label tabletitle"&gt;Table 13.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="tabletitle"&gt;Authentication Protocols and Supported External Identity Sources. It is mentioned that&amp;nbsp;&lt;/SPAN&gt;EAP-MSCHAPv2 (as an inner method of EAP-TTLS) is not supported with REST&amp;nbsp;External Identity Sources like Azure AD.&lt;/P&gt;
&lt;P&gt;If Windows Native Supplicant allows you to configure EAP-MSCHAPv2 (as an inner method of EAP-TTLS), then why is ISE not supporting it?&lt;/P&gt;
&lt;P&gt;Is this restriction from the ISE side OR the Azure AD Side?&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jun 2024 05:47:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/no-support-of-eap-mschapv2-with-eap-ttls-using-azure-ad/m-p/5138027#M590330</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2024-06-30T05:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: No support of EAP-MSCHAPv2 with EAP-TTLS using Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/no-support-of-eap-mschapv2-with-eap-ttls-using-azure-ad/m-p/5138178#M590337</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1196021"&gt;@jitendrac&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only supported inner authentication method I know of that is supported by &lt;A href="https://community.cisco.com/t5/network-access-control/cisco-ise-ropc-with-azure-eap-tls/td-p/4968804" target="_self"&gt;AzureAD and ISE, is PAP (Plain Auth Protocol)&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;The reason why, is for the same reason that we cannot do MSCHAPv2 to an LDAP repository - e.g. if ISE talks to an active directory domain controller using LDAP, then you cannot perform MSCHAPv2, because the "challenge" handshake process involved in the password checking, is a special process that happens. MSCHAPv2 works only when ISE is integrated (joined) to the domain controller and used Kerberos (and all that other stuff I don't understand ...).&amp;nbsp; Thus, the only solution with ISE talking to LDAP, is PAP. ISE presents the username and password to the LDAP server, and the LDAP server compares the credentials in its databased - if it matches then the response is positive, else, the auth fails.&amp;nbsp; MSCHAP is much more complicated and there are various versions that Microsoft developed over the years. My suspicion is that on the Azure side, there is no support for any method other than PAP. ROPC builds the secure tunnel between ISE and Azure. What you do in that tunnel is secured - hence no need for the complicated CHAP song and dance routine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Username/password credentials checking is likely to become extinct one day because Microsoft is slowly replacing those ageing methods with more complicated forms, sometimes based on biometrics (i.e. Windows Hello). Windows Credential Guard feature is another thing that throws a spanner in the works - you can disable it, but it's not advised.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jun 2024 21:13:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/no-support-of-eap-mschapv2-with-eap-ttls-using-azure-ad/m-p/5138178#M590337</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-06-30T21:13:33Z</dc:date>
    </item>
    <item>
      <title>Re: No support of EAP-MSCHAPv2 with EAP-TTLS using Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/no-support-of-eap-mschapv2-with-eap-ttls-using-azure-ad/m-p/5138526#M590357</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 14:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/no-support-of-eap-mschapv2-with-eap-ttls-using-azure-ad/m-p/5138526#M590357</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-07-01T14:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: No support of EAP-MSCHAPv2 with EAP-TTLS using Azure AD</title>
      <link>https://community.cisco.com/t5/network-access-control/no-support-of-eap-mschapv2-with-eap-ttls-using-azure-ad/m-p/5141587#M590467</link>
      <description>&lt;P&gt;See ▷&amp;nbsp;&lt;A title="https://youtu.be/92ncCo3_M84" href="https://youtu.be/92ncCo3_M84" data-from-md="" target="_blank"&gt;What's New in ISE 3.0&lt;/A&gt;&amp;nbsp; &amp;gt; &lt;A title="https://youtu.be/92ncCo3_M84&amp;amp;t=508s" href="https://youtu.be/92ncCo3_M84&amp;amp;t=508s" data-from-md="" aria-expanded="true" target="_blank"&gt;08:28&lt;/A&gt;&amp;nbsp;802.1X with Azure AD using ROPC &lt;BR /&gt;for the explanation of Why this will not work. &lt;/P&gt;
&lt;P&gt;Azure AD != Active Directory&lt;/P&gt;
&lt;P&gt;Thankfully, Microsoft finally renamed "Azure AD" to Entra ID to prevent this common misunderstanding.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2024 17:51:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/no-support-of-eap-mschapv2-with-eap-ttls-using-azure-ad/m-p/5141587#M590467</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-07-08T17:51:45Z</dc:date>
    </item>
  </channel>
</rss>

