<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enable certificate authentication for NPS on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173325#M1075158</link>
    <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;In ASDM, i can see that there are six (6) options for authentication.&amp;nbsp; Which one should I choose so that the ASA will send&amp;nbsp;&lt;SPAN&gt;EAP-TLS requests to Microsoft NPS?&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN&gt;AAA&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;AAA and Certificate&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Certificate Only&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;SAML&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Multiple Certificate and AAA&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Multiple Certificate&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hunt&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 25 Oct 2020 22:33:22 GMT</pubDate>
    <dc:creator>HuntLee304798</dc:creator>
    <dc:date>2020-10-25T22:33:22Z</dc:date>
    <item>
      <title>Enable certificate authentication for NPS on ASA</title>
      <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4171364#M1075024</link>
      <description>&lt;P&gt;Hi Cisco gurus,&lt;/P&gt;&lt;P&gt;For our AnyConnect VPN, I would like to enable certificate authentication for Microsoft Network Policy Server (NPS) with Cisco ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tested and can get username/password auth with NPS, however I want to use certificate auth with NPS.&amp;nbsp; Is this supported by Cisco ASA? If so, anyone can point me to some sample config on ASA + NPS of what I need to setup?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Hunt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 00:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4171364#M1075024</guid>
      <dc:creator>HuntLee304798</dc:creator>
      <dc:date>2020-10-22T00:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: Enable certificate authentication for NPS on ASA</title>
      <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4171536#M1075029</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If you are referring to anyconnect client authentication using certificate&lt;BR /&gt;instead of username/password, yes this is supported. The authentication&lt;BR /&gt;will be verified by the CA server (not the NPS). NPS can be used for&lt;BR /&gt;authorization and download attributes after successful authentication.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-blogs/anyconnect-certificate-based-authentication/ba-p/3105546" target="_blank"&gt;https://community.cisco.com/t5/security-blogs/anyconnect-certificate-based-authentication/ba-p/3105546&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Oct 2020 07:23:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4171536#M1075029</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-10-22T07:23:54Z</dc:date>
    </item>
    <item>
      <title>Re: Enable certificate authentication for NPS on ASA</title>
      <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4171663#M1075040</link>
      <description>&lt;P&gt;NPS in itself is a RADIUS server, it can't provide certificate authentication services, however, I think you can configure the NPS to accept EAP-TLS requests, but you still need a CA server to act as the PKI authority. From the ASA perspective, in addition to the AnyConnect configuration, you need to create the trust point that will be used for authentication.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 10:31:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4171663#M1075040</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-22T10:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: Enable certificate authentication for NPS on ASA</title>
      <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4172066#M1075064</link>
      <description>&lt;P&gt;So NPS cannot be used for certificate authentication? Only for authorization?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 19:34:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4172066#M1075064</guid>
      <dc:creator>HuntLee304798</dc:creator>
      <dc:date>2020-10-22T19:34:58Z</dc:date>
    </item>
    <item>
      <title>Re: Enable certificate authentication for NPS on ASA</title>
      <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4172368#M1075078</link>
      <description>&lt;P&gt;It can, but the certificates management in itself can't be done by the NPS services themselves, for that you need to rely on a CA. NPS can accept EAP-TLS requests, and check the validity of the certificates presented by the clients, if it is valid, will carry on checking the authentication and authorization policies, but I don't believe it can do more in terms of certificate authentication.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2020 07:30:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4172368#M1075078</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-23T07:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: Enable certificate authentication for NPS on ASA</title>
      <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173325#M1075158</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;In ASDM, i can see that there are six (6) options for authentication.&amp;nbsp; Which one should I choose so that the ASA will send&amp;nbsp;&lt;SPAN&gt;EAP-TLS requests to Microsoft NPS?&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN&gt;AAA&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;AAA and Certificate&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Certificate Only&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;SAML&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Multiple Certificate and AAA&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Multiple Certificate&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hunt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Oct 2020 22:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173325#M1075158</guid>
      <dc:creator>HuntLee304798</dc:creator>
      <dc:date>2020-10-25T22:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Enable certificate authentication for NPS on ASA</title>
      <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173334#M1075160</link>
      <description>&lt;P&gt;Reading again this thread, I think if you use certificate authentication that would be terminated on the ASA and possibly checked against the certificate revocation check through the CA, so your RADIUS server would never be aware about it. What you can try to do is to enable AAA and Certificate, that would allow the users to authenticate by typing their username and password connected to the AD through the RADIUS server, and also through certificate that will be terminated on the ASA.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Oct 2020 23:55:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173334#M1075160</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-25T23:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: Enable certificate authentication for NPS on ASA</title>
      <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173337#M1075161</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Aref,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I do not want to use username/password auth as these are for my remote mobile users.&amp;nbsp; Hence why I want to use certificate to authenticate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hunt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 00:33:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173337#M1075161</guid>
      <dc:creator>HuntLee304798</dc:creator>
      <dc:date>2020-10-26T00:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: Enable certificate authentication for NPS on ASA</title>
      <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173339#M1075162</link>
      <description>&lt;P&gt;Then you can just select certificate only as the authentication method.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 00:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173339#M1075162</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-26T00:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: Enable certificate authentication for NPS on ASA</title>
      <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173373#M1075168</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried that option before.&amp;nbsp; The ASA will authenticate the user based on their certificate, which is great!&amp;nbsp; Unfortunately, it does not pass the auth request to NPS.&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Hunt&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 02:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173373#M1075168</guid>
      <dc:creator>HuntLee304798</dc:creator>
      <dc:date>2020-10-26T02:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: Enable certificate authentication for NPS on ASA</title>
      <link>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173379#M1075169</link>
      <description>&lt;P&gt;I don't believe there is a way to allow the ASA to pass the certificate authentication request to the RADIUS server. Even when using ISE, that will still be the case. I think the reason behind this is because in this case the ASA terminates the certificate authentication on itself, so it does not relay it anywhere. Also, as long as you configure the certificate revocation check via the CA, you don't really need to relay the certificate authentication. The ASA will accept the authentication requests only from the clients that have a certificate issued by the trusted CA configured on the ASA for authentication, then, the ASA would check against the CA to ensure the presented certificate is valid. Only if both these checks pass, the authentication is successful.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 03:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-certificate-authentication-for-nps-on-asa/m-p/4173379#M1075169</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-26T03:23:43Z</dc:date>
    </item>
  </channel>
</rss>

