<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Certificate Authentication Profile in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/certificate-authentication-profile/m-p/5202932#M592151</link>
    <description>&lt;P&gt;Hi all;&lt;/P&gt;&lt;P&gt;When using a &lt;STRONG&gt;Certificate Authentication Profile (CAP)&lt;/STRONG&gt; without Active Directory or other supported external identity stores, does the CAP search ISE internal identity store for identity matches based on defined certificate fields?&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 03 Oct 2024 12:02:01 GMT</pubDate>
    <dc:creator>rezaalikhani</dc:creator>
    <dc:date>2024-10-03T12:02:01Z</dc:date>
    <item>
      <title>Certificate Authentication Profile</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-authentication-profile/m-p/5202932#M592151</link>
      <description>&lt;P&gt;Hi all;&lt;/P&gt;&lt;P&gt;When using a &lt;STRONG&gt;Certificate Authentication Profile (CAP)&lt;/STRONG&gt; without Active Directory or other supported external identity stores, does the CAP search ISE internal identity store for identity matches based on defined certificate fields?&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 12:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-authentication-profile/m-p/5202932#M592151</guid>
      <dc:creator>rezaalikhani</dc:creator>
      <dc:date>2024-10-03T12:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate Authentication Profile</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-authentication-profile/m-p/5203176#M592165</link>
      <description>&lt;P&gt;My understanding of the purpose of the CAP is to simply extract an identity from the certificate, whichever field you tell it to (e.g. Subject Common Name).&amp;nbsp; Since there is no password involved in a certificate, the "authentication" of that identity has to be done elsewhere. One option is to see if that identity exists in AD and assert the authentication that way. Else, by not looking up the identity in AD, we can still assert that the identity has been authenticated by virtue of the trust relationship that ISE has with the Issuer of that certificate. You could argue that we don't even need to lookup the identity in AD (if if even exists there) because the authenticity of the cert is good enough.&lt;/P&gt;
&lt;P&gt;As you know, later on during Authorization, we can use that extracted identity to perform AuthZ against internal ISE database (Group membership), or AD, LDAP, etc.&lt;/P&gt;
&lt;P&gt;That's how I see it anyway.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 23:43:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-authentication-profile/m-p/5203176#M592165</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-03T23:43:43Z</dc:date>
    </item>
  </channel>
</rss>

