<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You need to use the in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-machine-user-authentication-multiple/m-p/2619042#M74722</link>
    <description>&lt;P&gt;You need to use the AnyConnect NAM supplicant on your windows machines, and use the feature called eap-chaining for that, windows own supplicant won't work.&lt;/P&gt;&lt;P&gt;an example (uses user/pass though, but same concept)&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_80_eapchaining_deployment.pdf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Feb 2015 23:59:03 GMT</pubDate>
    <dc:creator>jan.nielsen</dc:creator>
    <dc:date>2015-02-05T23:59:03Z</dc:date>
    <item>
      <title>Cisco ISE - EAP-TLS - Machine / User Authentication - Multiple Certificate Authentication Profiles (CAP)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-machine-user-authentication-multiple/m-p/2619041#M74721</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm trying to do machine and user authentication using EAP-TLS and digital certificates. &amp;nbsp;Machines have certificates where the Principal Username is SAN:DNS, user certificates (smartcards) use SAN:Other Name as the Principal Username.&lt;/P&gt;&lt;P&gt;In ISE, I can define multiple Certificate Authentication Profiles (CAP). &amp;nbsp;For example CAP1 (Machine) - SAN:DNS, CAP2 (User) - SAN:Other Name&lt;/P&gt;&lt;P&gt;Problem is how do you specify ISE to check both in the Authentication Policy? &amp;nbsp;The Identity Store Sequence only accepts one CAP, so if I created an authentication policy for Dot1x to check CAP1 -&amp;gt; AD -&amp;gt; Internal, it will match the machine cert, but fail on user cert. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any way to resolve this?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:25:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-machine-user-authentication-multiple/m-p/2619041#M74721</guid>
      <dc:creator>Steve Sewa</dc:creator>
      <dc:date>2019-03-11T05:25:06Z</dc:date>
    </item>
    <item>
      <title>You need to use the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-machine-user-authentication-multiple/m-p/2619042#M74722</link>
      <description>&lt;P&gt;You need to use the AnyConnect NAM supplicant on your windows machines, and use the feature called eap-chaining for that, windows own supplicant won't work.&lt;/P&gt;&lt;P&gt;an example (uses user/pass though, but same concept)&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_80_eapchaining_deployment.pdf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Feb 2015 23:59:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-machine-user-authentication-multiple/m-p/2619042#M74722</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-02-05T23:59:03Z</dc:date>
    </item>
    <item>
      <title>Hello Steve,</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-machine-user-authentication-multiple/m-p/2619043#M74723</link>
      <description>&lt;P&gt;Hello Steve,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;did you find a solution for the issue. Ithink the solution wasn´t eap-cahining. As i understand you problem is that you cannot seperate the authentication rules so the request for XX goes to CAP1 and requests for YY goes to CAP2 correct?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The problem is that there is now chance to differentiate the certificates in the auth rules.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Greetings&lt;/P&gt;
&lt;P&gt;Philip&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2016 09:49:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-machine-user-authentication-multiple/m-p/2619043#M74723</guid>
      <dc:creator>Philip91</dc:creator>
      <dc:date>2016-03-17T09:49:27Z</dc:date>
    </item>
  </channel>
</rss>

