<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic apple macosx machine authentication with ISE using EAP-TLS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/2528529#M72922</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On a ongoing setup we are using eap-tls authentication with account validation against AD. We have our own CA (microsoft based). ISE version 1.2.1 patch 1.&lt;/P&gt;&lt;P&gt;With windows machines all is working well. We are using computer authentication only.&lt;/P&gt;&lt;P&gt;Now the problem is that we wish to do the same with MAC OSX machines.&lt;/P&gt;&lt;P&gt;We are using casper software suite and are able to push certificates into macosx, and are doing machine authentication.&lt;/P&gt;&lt;P&gt;in ISE the certificate authentication profile is being set to look at the subject alternative name - DNS name of the machines. Whenever we set it to the UPN (hostname$) windows accounts are not found in ad.&lt;/P&gt;&lt;P&gt;When MAC OSX authenticate as machines (they have a computer account in AD) they present themselves with RADIUS-Username = hostname$ instead of host/hostname.&lt;/P&gt;&lt;P&gt;The consequence is that by lacking the host/, ISE considers that this is a user authentication, instead of a computer one, and when it sets off to find the account, it searches in User class instead of Computer - which obviously returns no results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is anybody aware of any way to force MAC OSX to present a host/hostname RADIUS-Username when authenticating?&lt;/P&gt;&lt;P&gt;Any similar experiences of authenticating MAC OSX with ISE and machine/computer authentication are welcome.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gustavo Novais&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 05:03:15 GMT</pubDate>
    <dc:creator>Gustavo Novais</dc:creator>
    <dc:date>2019-03-11T05:03:15Z</dc:date>
    <item>
      <title>apple macosx machine authentication with ISE using EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/2528529#M72922</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On a ongoing setup we are using eap-tls authentication with account validation against AD. We have our own CA (microsoft based). ISE version 1.2.1 patch 1.&lt;/P&gt;&lt;P&gt;With windows machines all is working well. We are using computer authentication only.&lt;/P&gt;&lt;P&gt;Now the problem is that we wish to do the same with MAC OSX machines.&lt;/P&gt;&lt;P&gt;We are using casper software suite and are able to push certificates into macosx, and are doing machine authentication.&lt;/P&gt;&lt;P&gt;in ISE the certificate authentication profile is being set to look at the subject alternative name - DNS name of the machines. Whenever we set it to the UPN (hostname$) windows accounts are not found in ad.&lt;/P&gt;&lt;P&gt;When MAC OSX authenticate as machines (they have a computer account in AD) they present themselves with RADIUS-Username = hostname$ instead of host/hostname.&lt;/P&gt;&lt;P&gt;The consequence is that by lacking the host/, ISE considers that this is a user authentication, instead of a computer one, and when it sets off to find the account, it searches in User class instead of Computer - which obviously returns no results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is anybody aware of any way to force MAC OSX to present a host/hostname RADIUS-Username when authenticating?&lt;/P&gt;&lt;P&gt;Any similar experiences of authenticating MAC OSX with ISE and machine/computer authentication are welcome.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gustavo Novais&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:03:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/2528529#M72922</guid>
      <dc:creator>Gustavo Novais</dc:creator>
      <dc:date>2019-03-11T05:03:15Z</dc:date>
    </item>
    <item>
      <title>Did anyone ever find the</title>
      <link>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/2528530#M72924</link>
      <description>&lt;P&gt;Did anyone ever find&amp;nbsp;the solution to this problem.&amp;nbsp;Please email me asalazar@usac.org&lt;/P&gt;</description>
      <pubDate>Fri, 16 Dec 2016 17:28:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/2528530#M72924</guid>
      <dc:creator>usac</dc:creator>
      <dc:date>2016-12-16T17:28:09Z</dc:date>
    </item>
    <item>
      <title>Just for future reference, we</title>
      <link>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/2528531#M72926</link>
      <description>&lt;P&gt;Just for future reference, we've managed to solve this by adding on the JAMF Casper interface&amp;nbsp; the host/$COMPUTERNAME variable.&lt;/P&gt;
&lt;P&gt;I do not know if another provisioning solution would allow for this manipulation...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/networksettings_b.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Dec 2016 18:01:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/2528531#M72926</guid>
      <dc:creator>Gustavo Novais</dc:creator>
      <dc:date>2016-12-16T18:01:51Z</dc:date>
    </item>
    <item>
      <title>You can also do this directly</title>
      <link>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/2528532#M72927</link>
      <description>&lt;P&gt;You can also do this directly on ISE now (as long as you are running the latest version). There is a feature called "Identity Rewrite" that is located under: Administration &amp;gt; External Identity Sources &amp;gt; AD &amp;gt; Advanced Settings &amp;gt; Scroll all of the way to the bottom.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Dec 2016 03:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/2528532#M72927</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-12-17T03:09:55Z</dc:date>
    </item>
    <item>
      <title>Good job on resolving your</title>
      <link>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/2528533#M72929</link>
      <description>&lt;P&gt;Good job on resolving your own issue! Also, thank you for taking the time to come back and update the thread! (+5 from me).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can also do this directly on ISE now (as long as you are running the latest version). There is a feature called "Identity Rewrite" that is located under: &lt;STRONG&gt;Administration &amp;gt; External Identity Sources &amp;gt; AD &amp;gt; Advanced Settings &amp;gt; Scroll all of the way to the bottom&lt;/STRONG&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now, if your issue is resolved, you should mark the thread as "answered" &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Dec 2016 03:11:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/2528533#M72929</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-12-17T03:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: Just for future reference, we</title>
      <link>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/4586785#M573899</link>
      <description>&lt;P&gt;if you where using this payload as a custom payload in intune ( since AD certs are not yet supported only SCEP )&amp;nbsp;&lt;/P&gt;&lt;P&gt;I create the payload in profilemanager and then upload it to intune as custom,&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is field would be host/{{devicename}}&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 21:03:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/apple-macosx-machine-authentication-with-ise-using-eap-tls/m-p/4586785#M573899</guid>
      <dc:creator>Hafthor Hilmarsson O'Connor</dc:creator>
      <dc:date>2022-04-05T21:03:30Z</dc:date>
    </item>
  </channel>
</rss>

