<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 802.1x EAP-TLS machine and smart card authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-eap-tls-machine-and-smart-card-authentication/m-p/3731960#M87577</link>
    <description>&lt;P&gt;I am facing this same dilemma.&amp;nbsp; The labminutes video is good, but doesn't cover this case.&amp;nbsp; In the video, both the user and machine certs are on the machine.&amp;nbsp; The OP was asking about PIV card login for user and machine certs (on the machine) for the computer.&amp;nbsp; Does anyone have a solve for this that uses the Windows Native Supplicant?&lt;/P&gt;</description>
    <pubDate>Wed, 24 Oct 2018 18:34:57 GMT</pubDate>
    <dc:creator>aamilbur</dc:creator>
    <dc:date>2018-10-24T18:34:57Z</dc:date>
    <item>
      <title>ISE 802.1x EAP-TLS machine and smart card authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-eap-tls-machine-and-smart-card-authentication/m-p/2446626#M87574</link>
      <description>&lt;P&gt;I suspect I know the answer to this, but thought that I would throw it out there anway...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With Cisco ISE 1.2 is it possible to enable 802.1x machine AND user smart card&amp;nbsp; authentication simultaneously for wired/wireless clients (specifically&amp;nbsp; Windows 7/8, but Linux or OSX would also be good).&amp;nbsp; I can find plenty of&amp;nbsp; information regarding 802.1x machine authentication (EAP-TLS) and user&amp;nbsp; password authentication (PEAP), but none about dual EAP-TLS&amp;nbsp; authentication using certificates for machines and users at the same time.&amp;nbsp; I think I can figure out how to configure such a policy in ISE, but options seem to be lacking on the client end.&amp;nbsp; For example, the Windows 7 supplicant seems only able to present either a machine or user smart card certificate, not one then the other.&amp;nbsp; Plus, I am not sure how the client would know which certificate to present, or if the type can be specified from the authenticator.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:28:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-eap-tls-machine-and-smart-card-authentication/m-p/2446626#M87574</guid>
      <dc:creator>ryanhitch</dc:creator>
      <dc:date>2019-03-11T04:28:59Z</dc:date>
    </item>
    <item>
      <title>ISE 802.1x EAP-TLS machine and smart card authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-eap-tls-machine-and-smart-card-authentication/m-p/2446627#M87576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hope this video link will help you&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.labminutes.com/sec0045_ise_1_1_wired_dot1x_machine_auth_eap-tls"&gt;http://www.labminutes.com/sec0045_ise_1_1_wired_dot1x_machine_auth_eap-tls&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Mar 2014 18:00:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-eap-tls-machine-and-smart-card-authentication/m-p/2446627#M87576</guid>
      <dc:creator>Ravi Singh</dc:creator>
      <dc:date>2014-03-03T18:00:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 802.1x EAP-TLS machine and smart card authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-eap-tls-machine-and-smart-card-authentication/m-p/3731960#M87577</link>
      <description>&lt;P&gt;I am facing this same dilemma.&amp;nbsp; The labminutes video is good, but doesn't cover this case.&amp;nbsp; In the video, both the user and machine certs are on the machine.&amp;nbsp; The OP was asking about PIV card login for user and machine certs (on the machine) for the computer.&amp;nbsp; Does anyone have a solve for this that uses the Windows Native Supplicant?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 18:34:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-eap-tls-machine-and-smart-card-authentication/m-p/3731960#M87577</guid>
      <dc:creator>aamilbur</dc:creator>
      <dc:date>2018-10-24T18:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 802.1x EAP-TLS machine and smart card authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-eap-tls-machine-and-smart-card-authentication/m-p/3733209#M87578</link>
      <description>&lt;P&gt;AFAIK it should work as long as the smart card driver/software/firmware installed properly and the profile configured properly. Perhaps, these would help you:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.microsoft.com/en-us/help/281245/guidelines-for-enabling-smart-card-logon-with-third-party-certificatio" target="_blank"&gt;Guidelines for enabling smart card logon with third-party certification authorities&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.microsoft.com/en-us/windows/desktop/nativewifi/smart-card-certificate-profile-sample" target="_blank"&gt;Smart Card Certificate Profile Sample | Microsoft Docs&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 25 Oct 2018 22:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-eap-tls-machine-and-smart-card-authentication/m-p/3733209#M87578</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-25T22:37:41Z</dc:date>
    </item>
  </channel>
</rss>

