<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure Client/AnyConnect posture, local certificate option? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814027#M1099489</link>
    <description>&lt;P&gt;Understood, but they already use username and password for primary authentication as well as Duo MFA for secondary. Can posture be used to check and ensure the machine certificate was used by the domain before it allows the connection?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Apr 2023 19:47:14 GMT</pubDate>
    <dc:creator>Jack G</dc:creator>
    <dc:date>2023-04-13T19:47:14Z</dc:date>
    <item>
      <title>Secure Client/AnyConnect posture, local certificate option?</title>
      <link>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814016#M1099487</link>
      <description>&lt;P&gt;Per the documentation, what can be local certificate be used for? Can it be used to ensure the machine connecting to the VPN is a member of the domain or is there a better way to go about that? Don't have an ISE deployment. I can't seem to find additional configuration details about the certificate options.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/Cisco-Secure-Client-5/admin/guide/b-cisco-secure-client-admin-guide-5-0/configure-posture.html" target="_blank" rel="noopener"&gt;Cisco Secure Client (including AnyConnect) Administrator Guide, Release 5 - Configure Posture [Cisco Secure Client (including AnyConnect)] - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In contrast,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Secure Firewall Posture&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;performs server-side evaluation where the Secure Firewall ASA asks only for a list of endpoint attributes (such as operating system, IP address, registry entries, local certificates, and filenames), and they are returned by&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;Secure Firewall Posture&lt;/SPAN&gt;&lt;SPAN&gt;. Based on the result of the policy’s evaluation, you can control which hosts are allowed to create a remote access connection to the security appliance.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 19:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814016#M1099487</guid>
      <dc:creator>Jack G</dc:creator>
      <dc:date>2023-04-13T19:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Client/AnyConnect posture, local certificate option?</title>
      <link>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814023#M1099488</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/175212"&gt;@Jack G&lt;/a&gt;&amp;nbsp;yes you can use certificate authentication to ensure the device connecting to the VPN is a corporate asset, assuming the device's certificate was issued from your AD via GPO, this joined to your AD domain.&lt;/P&gt;
&lt;P&gt;You don't need ISE for authentication or posture checking, you can use posturing checking directly on the ASA using hostscan. The hostscan can check registry settings which can also determine AD domain membership.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 19:47:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814023#M1099488</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-04-13T19:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Client/AnyConnect posture, local certificate option?</title>
      <link>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814027#M1099489</link>
      <description>&lt;P&gt;Understood, but they already use username and password for primary authentication as well as Duo MFA for secondary. Can posture be used to check and ensure the machine certificate was used by the domain before it allows the connection?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 19:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814027#M1099489</guid>
      <dc:creator>Jack G</dc:creator>
      <dc:date>2023-04-13T19:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Client/AnyConnect posture, local certificate option?</title>
      <link>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814047#M1099491</link>
      <description>&lt;P&gt;I am not sure you can use posture to check the certificate. As mentioned before, you could do a registry check to determine if joined to the AD domain.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 20:27:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814047#M1099491</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-04-13T20:27:13Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Client/AnyConnect posture, local certificate option?</title>
      <link>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814072#M1099493</link>
      <description>&lt;P&gt;Long time ago we had pre-login policies as part of Cisco Secure Desktop (CSD) where we could check for a machine certificate pre-authentication and then authenticate with a user certificate but CSD was deprecated due to security concerns including cache cleaner, secure vault and pre-login policies.&amp;nbsp;&lt;BR /&gt;However, we added Multiple Certificate Authentication support&amp;nbsp;which gives the ability to have the ASA validate the machine or device certificate, to ensure the device is a corporate-issued device, in addition to authenticating the user’s identity certificate to allow VPN access.&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client-v4x/212483-configure-asa-as-the-ssl-gateway-for-any.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client-v4x/212483-configure-asa-as-the-ssl-gateway-for-any.html&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you used Multiple Certificate Authentication then those certificates would could be sent to DAP for further authorization, this was only supported with MCA but after 9.18 we also added the ability to send the certificate to DAP even if using single certificate.&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv50265" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv50265&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 21:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814072#M1099493</guid>
      <dc:creator>Gustavo Medina</dc:creator>
      <dc:date>2023-04-13T21:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Client/AnyConnect posture, local certificate option?</title>
      <link>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814544#M1099495</link>
      <description>&lt;P&gt;I could never understand this enhancement request, because certificate information is passed to DAP in case of single cert auth in older versions too. It's shown in "debug dap trace". For Windows client one can use, for example:&lt;/P&gt;&lt;P&gt;assert(function()&lt;BR /&gt;for k,v in pairs(endpoint.certificate.user) do&lt;BR /&gt;if (v.subject_store == "capi_machine" and v_issuer_cn == "...") then&lt;BR /&gt;return true&lt;BR /&gt;end&lt;BR /&gt;end&lt;BR /&gt;return false&lt;BR /&gt;end)()&lt;/P&gt;&lt;P&gt;The problem however is that hostscan looks through all certificates in both machine and user store (up to a certain limit, in my tests it was 13 certs or so) and not a single certificate which was used during SSL client authentication phase. This makes the feature useless in many scenarios.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 14:47:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4814544#M1099495</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-04-14T14:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Client/AnyConnect posture, local certificate option?</title>
      <link>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4816405#M1099593</link>
      <description>&lt;P&gt;The ENH was to add support to DAP directly without LUA.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2023 02:49:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/4816405#M1099593</guid>
      <dc:creator>Gustavo Medina</dc:creator>
      <dc:date>2023-04-18T02:49:58Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Client/AnyConnect posture, local certificate option?</title>
      <link>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/5126573#M1113383</link>
      <description>&lt;P&gt;How can you do this through ASDM?&lt;BR /&gt;&lt;BR /&gt;There doesn't seem to be much if any documentation for doing it this way.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 13:53:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-client-anyconnect-posture-local-certificate-option/m-p/5126573#M1113383</guid>
      <dc:creator>dvizzle</dc:creator>
      <dc:date>2024-06-06T13:53:08Z</dc:date>
    </item>
  </channel>
</rss>

