<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Certificate based authentication fails to match tunnel group in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/certificate-based-authentication-fails-to-match-tunnel-group/m-p/4658567#M1092194</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We're trying to use certificate based authentication for AnyConnect.&lt;/P&gt;&lt;P&gt;I was actually hoping that group-url&amp;nbsp;&lt;A href="https://vpn.xxx.com/poc" target="_blank"&gt;https://vpn.xxx.com/poc&lt;/A&gt; enable would put the user in the correct Tunnel Group.&lt;BR /&gt;But as seen in the logs attached. That only happens when I configure a Certificate Map. Whenever no Certificate Map is configured we just get the log&amp;nbsp; "CRYPTO_PKI: No Tunnel Group Match for peer certificate." and "CERT_API: Unable to find tunnel group for cert using rules (SSL)&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;XXX-VPN01# sh run tunnel-group TG_XXX
tunnel-group TG_XXX type remote-access
tunnel-group TG_XXX general-attributes
 default-group-policy default
 dhcp-server x.x.x.x
 dhcp-server x.x.x.x
 username-from-certificate CN
tunnel-group TG_XXX webvpn-attributes
 authentication certificate
 group-url https://vpn.xxx.com/poc enable&lt;/LI-CODE&gt;&lt;P&gt;The issue now is whenever I put webvpn -&amp;gt; certificate-group-map CertificateMap TunnelGroup for the PoC Tunnel Group, all users get matched, even those using another link.&lt;/P&gt;&lt;P&gt;So the question is. How can I make sure that only users using the&amp;nbsp;&lt;A href="https://vpn.xxx.com/poc" target="_blank"&gt;https://vpn.xxx.com/poc&lt;/A&gt;&amp;nbsp;link are getting authenticated with the certificate? Preferably without Certificate Map.&lt;/P&gt;</description>
    <pubDate>Wed, 27 Jul 2022 13:16:27 GMT</pubDate>
    <dc:creator>quadrabe</dc:creator>
    <dc:date>2022-07-27T13:16:27Z</dc:date>
    <item>
      <title>Certificate based authentication fails to match tunnel group</title>
      <link>https://community.cisco.com/t5/network-security/certificate-based-authentication-fails-to-match-tunnel-group/m-p/4658567#M1092194</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We're trying to use certificate based authentication for AnyConnect.&lt;/P&gt;&lt;P&gt;I was actually hoping that group-url&amp;nbsp;&lt;A href="https://vpn.xxx.com/poc" target="_blank"&gt;https://vpn.xxx.com/poc&lt;/A&gt; enable would put the user in the correct Tunnel Group.&lt;BR /&gt;But as seen in the logs attached. That only happens when I configure a Certificate Map. Whenever no Certificate Map is configured we just get the log&amp;nbsp; "CRYPTO_PKI: No Tunnel Group Match for peer certificate." and "CERT_API: Unable to find tunnel group for cert using rules (SSL)&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;XXX-VPN01# sh run tunnel-group TG_XXX
tunnel-group TG_XXX type remote-access
tunnel-group TG_XXX general-attributes
 default-group-policy default
 dhcp-server x.x.x.x
 dhcp-server x.x.x.x
 username-from-certificate CN
tunnel-group TG_XXX webvpn-attributes
 authentication certificate
 group-url https://vpn.xxx.com/poc enable&lt;/LI-CODE&gt;&lt;P&gt;The issue now is whenever I put webvpn -&amp;gt; certificate-group-map CertificateMap TunnelGroup for the PoC Tunnel Group, all users get matched, even those using another link.&lt;/P&gt;&lt;P&gt;So the question is. How can I make sure that only users using the&amp;nbsp;&lt;A href="https://vpn.xxx.com/poc" target="_blank"&gt;https://vpn.xxx.com/poc&lt;/A&gt;&amp;nbsp;link are getting authenticated with the certificate? Preferably without Certificate Map.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 13:16:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/certificate-based-authentication-fails-to-match-tunnel-group/m-p/4658567#M1092194</guid>
      <dc:creator>quadrabe</dc:creator>
      <dc:date>2022-07-27T13:16:27Z</dc:date>
    </item>
  </channel>
</rss>

