<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Linux EAP-TLS Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5330765#M598203</link>
    <description>&lt;P&gt;I'm not aware of any tool or documentation with specific examples on how you would accomplish this. If it's possible, it would likely involve Ansible, but I'm not sure if there are Ansible modules for all operations such as enrolling the certificates and configuring the Ubuntu supplicant.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Sep 2025 23:01:29 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2025-09-16T23:01:29Z</dc:date>
    <item>
      <title>Linux EAP-TLS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/4117806#M561674</link>
      <description>&lt;P&gt;All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to get EAP-TLS working on an Ubuntu Linux machine.&amp;nbsp; The system is controlled by Centrify and Centrify has pushed out a certificate, private key and chain file to the machine.&amp;nbsp; I am attempting to use the wpa_supplicant with the following configuration:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.JPG.png" style="width: 648px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/78871i2372DF6E2A9BBF0B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.JPG.png" alt="Capture.JPG.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When we run the following command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sudo -i wpa_supplicant -c /etc/wpa_supplicant.conf -D wired -i eno1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We see the following sequence of messages repeated.&amp;nbsp; I am trying to validate that the private key doesn't have a password.&amp;nbsp; I am also going to try with key_mgmt set to WPA-EAP.&amp;nbsp; I can see the request come into ISE but ISE is recording the client is rejecting the authentication protocol which maybe the WPA-EAP will fix.&amp;nbsp; Has anyone gotten wpa_supplicant to work correctly?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Successfully initialized wpa_supplicant&lt;BR /&gt;eno1: Associated with 01:80:c2:00:00:03&lt;BR /&gt;WMM AC: Missing IEs&lt;BR /&gt;eno1: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0&lt;BR /&gt;eno1: CTRL-EVENT-EAP-STARTED EAP authentication started&lt;BR /&gt;eno1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13&lt;BR /&gt;OpenSSL: tls_connection_ca_cert - Failed to load root certificates error:0B084088:x509 certificate routines:X509_load_cert_crl_file:no certificate or crl found&lt;BR /&gt;OpenSSL: tls_load_ca_der - Failed load CA in DER format error:0D0680A8:asn1 encoding routines:asn1_check_tlen:wrong tag&lt;BR /&gt;OpenSSL: pending error: error:0D07803A:asn1 encoding routines:asn1_item_embed_d2i:nested asn1 error&lt;BR /&gt;OpenSSL: pending error: error:0B06F00D:x509 certificate routines:X509_load_cert_file:ASN1 lib&lt;BR /&gt;TLS: Failed to set TLS connection parameters&lt;BR /&gt;EAP-TLS: Failed to initialize SSL.&lt;BR /&gt;eno1: EAP: Failed to initialize EAP method: vendor 0 method 13 (TLS)&lt;BR /&gt;eno1: CTRL-EVENT-EAP-FAILURE EAP authentication failed&lt;BR /&gt;eno1: CTRL-EVENT-EAP-STARTED EAP authentication started&lt;BR /&gt;eno1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13&lt;BR /&gt;OpenSSL: tls_connection_ca_cert - Failed to load root certificates error:0B084088:x509 certificate routines:X509_load_cert_crl_file:no certificate or crl found&lt;BR /&gt;OpenSSL: tls_load_ca_der - Failed load CA in DER format error:0D0680A8:asn1 encoding routines:asn1_check_tlen:wrong tag&lt;BR /&gt;OpenSSL: pending error: error:0D07803A:asn1 encoding routines:asn1_item_embed_d2i:nested asn1 error&lt;BR /&gt;OpenSSL: pending error: error:0B06F00D:x509 certificate routines:X509_load_cert_file:ASN1 lib&lt;BR /&gt;TLS: Failed to set TLS connection parameters&lt;BR /&gt;EAP-TLS: Failed to initialize SSL.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2020 16:49:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/4117806#M561674</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2020-07-13T16:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: Linux EAP-TLS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/4118059#M561682</link>
      <description>&lt;P&gt;I have successfully setup an Ubuntu machine to use EAP-TLS, but only from the x-windows UI. The UI requires you to specify the password used for the private key, so I suspect this is not optional. The procedure I used to set this up:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Used openssl to generate the private key and CSR; specified the optional password&lt;/LI&gt;
&lt;LI&gt;Signed the CSR using my Windows ADCS and saved both the DER-formatted identity and Root CA certs to my ubuntu machine&lt;/LI&gt;
&lt;LI&gt;Opened the Network tool (I believe provided by the NetworkManager package) and configured the required settings&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-07-14 at 10.21.43 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/78919i8037CEA8FC847858/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-07-14 at 10.21.43 am.png" alt="Screen Shot 2020-07-14 at 10.21.43 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2020 00:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/4118059#M561682</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-07-14T00:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: Linux EAP-TLS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5053000#M588503</link>
      <description>&lt;P&gt;Hi Greg.&lt;/P&gt;
&lt;P&gt;Could you share the process to generate the user certificate and private key on linux?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fernandoaguiar_0-1711736111961.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214274i769E6D7B68FEA7AD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="fernandoaguiar_0-1711736111961.png" alt="fernandoaguiar_0-1711736111961.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Here is my configuration, but I think I did something wrong during the process to generate the user certificate and key.&lt;/P&gt;
&lt;P&gt;Could you please clarify the steps?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 18:16:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5053000#M588503</guid>
      <dc:creator>fernando.aguiar</dc:creator>
      <dc:date>2024-03-29T18:16:16Z</dc:date>
    </item>
    <item>
      <title>Re: Linux EAP-TLS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5054602#M588527</link>
      <description>&lt;P&gt;I used openssl to create an RSA key and CSR using a similar process as the following document. You need to ensure that you define a passphrase for private key.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.ssl.com/how-to/manually-generate-a-certificate-signing-request-csr-using-openssl/" target="_blank"&gt;https://www.ssl.com/how-to/manually-generate-a-certificate-signing-request-csr-using-openssl/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2024 23:33:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5054602#M588527</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-04-01T23:33:24Z</dc:date>
    </item>
    <item>
      <title>Re: Linux EAP-TLS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5330544#M598199</link>
      <description>&lt;P data-start="153" data-end="161"&gt;Hi Greg,&lt;/P&gt;
&lt;P data-start="163" data-end="378"&gt;We have around 2,000 Ubuntu machines, and we're working on enrolling user certificates across all of them. However, despite our efforts over the past few weeks, the certificates are still not enrolling successfully.&lt;/P&gt;
&lt;P data-start="380" data-end="502"&gt;Do you have any documentation or recommendations for configuring this at scale? Any guidance would be greatly appreciated.&lt;/P&gt;
&lt;P data-start="504" data-end="514"&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2025 11:52:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5330544#M598199</guid>
      <dc:creator>amoon</dc:creator>
      <dc:date>2025-09-16T11:52:25Z</dc:date>
    </item>
    <item>
      <title>Re: Linux EAP-TLS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5330765#M598203</link>
      <description>&lt;P&gt;I'm not aware of any tool or documentation with specific examples on how you would accomplish this. If it's possible, it would likely involve Ansible, but I'm not sure if there are Ansible modules for all operations such as enrolling the certificates and configuring the Ubuntu supplicant.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2025 23:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5330765#M598203</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-09-16T23:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: Linux EAP-TLS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5333999#M598345</link>
      <description>&lt;P&gt;Hi greg i tried your method with document you have provided but when i signed CSR from my enterprise CA and try to connect its giving logs of administrator and not the current logged-in user&lt;/P&gt;</description>
      <pubDate>Sat, 27 Sep 2025 09:59:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5333999#M598345</guid>
      <dc:creator>amoon</dc:creator>
      <dc:date>2025-09-27T09:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: Linux EAP-TLS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5335215#M598372</link>
      <description>&lt;P&gt;That sounds like an issue on the CA where the certificate template is using the admin account used to sign the certificate as the identity instead of using the values you're defining in the CSR. You would need to look at the certificate template settings and potentially create a new template for this usage.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2025 22:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/linux-eap-tls-authentication/m-p/5335215#M598372</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-10-01T22:56:26Z</dc:date>
    </item>
  </channel>
</rss>

