<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TEAP (EAP-TLS) – Machine-Only Auth Result in Access Without User C in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5300493#M596821</link>
    <description>&lt;P&gt;Can I ask some q&lt;/P&gt;
&lt;P&gt;Did you enable EAP chain in allowed protocol &amp;gt; allow TEAP&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Wed, 18 Jun 2025 16:57:51 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2025-06-18T16:57:51Z</dc:date>
    <item>
      <title>TEAP (EAP-TLS) – Machine-Only Auth Result in Access Without User Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5299297#M596770</link>
      <description>&lt;P&gt;We’re using TEAP with EAP-TLS and EAP-Chaining in our ISE deployment for &lt;STRONG&gt;wired&lt;/STRONG&gt; network access. The configuration follows this Cisco document:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html" target="_self"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Our authorization policy is similar to the pic below.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MSN_1_0-1749931056104.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/246486i0EF00FFCA6AC36FE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MSN_1_0-1749931056104.png" alt="MSN_1_0-1749931056104.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The problem was that some users got network access without a valid user certificate. After checking, I found that machine certificate was present, but the valid user certificate was missing. Yet, the user still gained network access. Since TEAP failed user authentication but succeeded in machine authentication, ISE allowed access through the machine-only rule.&lt;/P&gt;
&lt;P&gt;Before, we were using TEAP with MSCHAPv2, and with that setup, this issue never happen because of how the authentication process works.&lt;/P&gt;
&lt;P&gt;I can tweak the machine-only authorization profile to limit access, but I’d like to know if anyone else has faced this and any suggestions on how to handle it?&lt;/P&gt;</description>
      <pubDate>Sat, 14 Jun 2025 20:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5299297#M596770</guid>
      <dc:creator>MS07</dc:creator>
      <dc:date>2025-06-14T20:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP (EAP-TLS) – Machine-Only Auth Result in Access Without User C</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5299456#M596775</link>
      <description>&lt;P&gt;In your screenshot, you return Permit Access in both cases - that's why a failed user auth has the same result as a successful user auth. What Authorization result do you plan to return in the case where the user auth is (not yet) successful?&lt;/P&gt;</description>
      <pubDate>Sun, 15 Jun 2025 21:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5299456#M596775</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-06-15T21:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP (EAP-TLS) – Machine-Only Auth Result in Access Without User C</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5300489#M596820</link>
      <description>&lt;P&gt;We keep the 'User Failed + Machine Passed' EAP chaining rule at the end of the authorization policy&amp;nbsp;to allow services like RDP, policy updates, and patching before user login.&lt;/P&gt;
&lt;P&gt;What i meant is:&lt;/P&gt;
&lt;P&gt;Using MSCHAPv2 --- If user logs in with wrong password, login fails → No access to PC, no chained auth → only machine-only auth remains. This is safe.&lt;BR /&gt;Using EAP-TLS --- If user logs in with correct username+password, but bad user certificate, Windows still allows the user to log in. But ISE fails the user auth (bad cert), and falls back to machine-only authorization, because machine cert is valid. So the user gets access to the PC and some network access via machine-only rule.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P data-pm-slice="1 1 []"&gt;I can tweak the machine-only authorization profile to limit access, But I would like to know any other suggestions or is this the way I need to handle this?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 17:53:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5300489#M596820</guid>
      <dc:creator>MS07</dc:creator>
      <dc:date>2025-06-18T17:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP (EAP-TLS) – Machine-Only Auth Result in Access Without User C</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5300493#M596821</link>
      <description>&lt;P&gt;Can I ask some q&lt;/P&gt;
&lt;P&gt;Did you enable EAP chain in allowed protocol &amp;gt; allow TEAP&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 16:57:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5300493#M596821</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-06-18T16:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP (EAP-TLS) – Machine-Only Auth Result in Access Without User C</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5300494#M596822</link>
      <description>&lt;P&gt;Did you check&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 17:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5300494#M596822</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-06-18T17:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP (EAP-TLS) – Machine-Only Auth Result in Access Without User C</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5300497#M596823</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Did you check this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Notice&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One authc policy and two authz policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 17:01:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5300497#M596823</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-06-18T17:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP (EAP-TLS) – Machine-Only Auth Result in Access Without User C</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5300704#M596838</link>
      <description>&lt;P&gt;I think what you are seeing is expected and I think we need to split this in two parts. Part one is when a user uses wrong crednetials. In this case the user doesn't get access to the PC because of the failed authentication against Windows itself or against the AD via ISE.&lt;/P&gt;
&lt;P&gt;Part two instead is when certificates authentication is used. The difference in this case is that when a user types in their crednetials correctly they will pass the authentication against Windows, and because the users crednetials would be cached on Windows the login to the PC itself is successful. Now the second bit of this is the certificate authentication against AD via ISE. When it fails ISE will apply the action you have configured on the second authorization rule which is permit access. However, if you have configured Windows with certificate authentication with smartcard for example, a user with a bad certificate won't have access to the PC.&lt;/P&gt;
&lt;P&gt;As mentioned by&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;you should have a different authorization applied to the "Machine authentication" authorization rule restricting accesses to only what is needed for the machine to get an IP, DNS, Windows updates etc as well as to the support team to access the PC remotely.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jun 2025 09:40:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-eap-tls-machine-only-auth-result-in-access-without-user/m-p/5300704#M596838</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-06-19T09:40:43Z</dc:date>
    </item>
  </channel>
</rss>

