<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dot1x Windows 11 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5376399#M600045</link>
    <description>&lt;P&gt;What dot1x method can be used for seamless login?&lt;BR /&gt;Currently i'm on PoC with Cisco partner to implement dot1x and when testing the user is prompted to signin and must enter credential when plugged to the wired.&lt;/P&gt;
&lt;P&gt;We want if the user login using company device which already joined to the Azure Active Directory then when the LAN plugged to the switch then the user can directly access to the network without prompting to login.&lt;/P&gt;
&lt;DIV id="tinyMceEditorhs08_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="tinyMceEditorhs08_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-13 151159.png" style="width: 666px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/260994i835A7B1E014C2190/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2026-03-13 151159.png" alt="Screenshot 2026-03-13 151159.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 13 Mar 2026 08:13:47 GMT</pubDate>
    <dc:creator>hs08</dc:creator>
    <dc:date>2026-03-13T08:13:47Z</dc:date>
    <item>
      <title>Dot1x Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5376399#M600045</link>
      <description>&lt;P&gt;What dot1x method can be used for seamless login?&lt;BR /&gt;Currently i'm on PoC with Cisco partner to implement dot1x and when testing the user is prompted to signin and must enter credential when plugged to the wired.&lt;/P&gt;
&lt;P&gt;We want if the user login using company device which already joined to the Azure Active Directory then when the LAN plugged to the switch then the user can directly access to the network without prompting to login.&lt;/P&gt;
&lt;DIV id="tinyMceEditorhs08_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="tinyMceEditorhs08_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-13 151159.png" style="width: 666px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/260994i835A7B1E014C2190/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2026-03-13 151159.png" alt="Screenshot 2026-03-13 151159.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2026 08:13:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5376399#M600045</guid>
      <dc:creator>hs08</dc:creator>
      <dc:date>2026-03-13T08:13:47Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5376411#M600047</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1437984"&gt;@hs08&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Are you using certificate? With certificate, no login should be provided.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2026 09:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5376411#M600047</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2026-03-13T09:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5376511#M600051</link>
      <description>&lt;P&gt;You should only use EAP-TLS or TEAP (with certificates) only in 2026.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2026 17:25:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5376511#M600051</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2026-03-13T17:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5376664#M600054</link>
      <description>&lt;P class=""&gt;&lt;SPAN&gt;For a seamless login experience with 802.1X on wired networks, &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;EAP-TLS&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; is typically the recommended method. It allows the endpoint to authenticate using a certificate instead of prompting the user to manually enter credentials.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;SPAN&gt;With password-based methods such as &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;PEAP-MSCHAPv2&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, the endpoint usually prompts the user to provide credentials during authentication. This is why users are asked to sign in when they plug their device into the wired network.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;In contrast, &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;EAP-TLS&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; uses certificate-based authentication. The endpoint presents a valid certificate during the TLS handshake, allowing the authentication process to occur automatically without user interaction. If the device already has a trusted certificate installed, the authentication can happen transparently in the background.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;How This Enables Seamless Login&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;When the company device is domain-joined (for example joined to Azure AD) and has a valid certificate installed:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN&gt;The endpoint connects to the switch port configured for 802.1X.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN&gt;The switch forwards the authentication request to the NAC server.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN&gt;The endpoint presents its certificate using &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;EAP-TLS&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;SPAN&gt;The authentication server validates the certificate and grants network access.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P class=""&gt;&lt;SPAN&gt;Since the authentication is based on the certificate rather than user credentials, the user does not need to manually enter a username or password.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;Certificate Deployment Options&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;For EAP-TLS to work seamlessly, certificates must be deployed to endpoints. This can be done in several ways:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• Manual certificate installation&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Automatic enrollment using SCEP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Endpoint onboarding using a BYOD portal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Integration with device management solutions that distribute certificates automatically&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Once the certificate is installed and trusted, the authentication process becomes transparent to the user.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;Summary&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Using &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;EAP-TLS&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; with properly deployed endpoint certificates allows devices to authenticate automatically when connected to the wired network. This eliminates the need for users to manually enter credentials and provides a seamless login experience while also improving security through certificate-based authentication.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Mar 2026 09:44:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5376664#M600054</guid>
      <dc:creator>Ahmed Bayoumi</dc:creator>
      <dc:date>2026-03-15T09:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5377307#M600068</link>
      <description>&lt;P&gt;Yes EAP-TLS is the answer. Now how if the user have Entra ID but the device not joined to the Azure AD? Can we use PEAP-MSCHAP so the user will be prompt for username password and not use certificate?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 01:19:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5377307#M600068</guid>
      <dc:creator>hs08</dc:creator>
      <dc:date>2026-03-18T01:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5377326#M600069</link>
      <description>No. You can use EAP-TTLS with ROPC. But that’s not secure either.&lt;BR /&gt;&lt;BR /&gt;Why isn’t the computer properly managed and receiving a certificate? What scenario?&lt;BR /&gt;</description>
      <pubDate>Wed, 18 Mar 2026 02:07:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5377326#M600069</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2026-03-18T02:07:28Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5377333#M600070</link>
      <description>&lt;P&gt;Beacause beside we have company devices joined to the Azure then we have Vendor where they use their laptop and we only give them the Entra ID and the device not joined to the Azure.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 02:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5377333#M600070</guid>
      <dc:creator>hs08</dc:creator>
      <dc:date>2026-03-18T02:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: Dot1x Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5377334#M600071</link>
      <description>Why are you allowing untrusted/unknown/unmanaged endpoints to join your internal protected network? Shouldn’t the vendors be using a guest network?&lt;BR /&gt;</description>
      <pubDate>Wed, 18 Mar 2026 02:51:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-windows-11/m-p/5377334#M600071</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2026-03-18T02:51:28Z</dc:date>
    </item>
  </channel>
</rss>

