<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco IOS MFA -SSH Certificate Authentication/Radius Authorization in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/5166075#M1115385</link>
    <description>&lt;P&gt;any one success to do this ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the BlastRadius will kill us those week&lt;/P&gt;</description>
    <pubDate>Mon, 26 Aug 2024 18:12:41 GMT</pubDate>
    <dc:creator>Nenday</dc:creator>
    <dc:date>2024-08-26T18:12:41Z</dc:date>
    <item>
      <title>Cisco IOS MFA -SSH Certificate Authentication/Radius Authorization</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/4283746#M1077954</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very new to Cisco IOS devices and AAA configurations. We currently have a PKI infrastructure, and are using NPS for radius authentication/authorization.&lt;/P&gt;&lt;P&gt;I've been tasked to change our baseline IOS configuration so that it can validate user pki certificate for authentication and then validate the user with the NPS server for authorization.&lt;/P&gt;&lt;P&gt;Currently we have some basic configuration like this:&lt;/P&gt;&lt;PRE&gt;aaa authentication login default group radius-server1
aaa authentication login console group radius-server1
aaa authorization console
aaa authorization exec default group radius-server1&lt;/PRE&gt;&lt;P&gt;I've successfully gotten the certificate authentication to work with the following:&lt;/P&gt;&lt;PRE&gt;crypto pki trustpoint domain.local
 enrollment terminal
 revocation-check crl none
 revocation-check ocsp none
 authorization list CERT
 authorization username subjectname commonname

ip ssh server certificate profile
   user
      trustpoint verify domain.local

ip ssh server algorithm hostkey x509v3-ssh-rsa
ip ssh server algorithm authentication publickey
ip ssh server algorithm publickey x509v3-ssh-rsa

aaa authorization network CERT none&lt;/PRE&gt;&lt;P&gt;For the life of me I cannot find a good example for SSH cert authentication/radius authorization. I've read numerous forum posts from people saying you can do cert authentication and then be prompted for username and password for radius authorization, but not concrete examples.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help with an example would be appreciated. Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 01 Feb 2021 17:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/4283746#M1077954</guid>
      <dc:creator>pakmon1722</dc:creator>
      <dc:date>2021-02-01T17:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS MFA -SSH Certificate Authentication/Radius Authorization</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/4283761#M1077955</link>
      <description>&lt;P&gt;Very good question and thinking - i have not deployed and tested. but looking at the document durable.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Authorisation example with ISE-&amp;nbsp; you can replace with NPS configuration here - ( appologies if i misguiding you here)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/secure-shell-ssh/212178-Configuring-SSH-with-x509-authentication.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/secure-shell-ssh/212178-Configuring-SSH-with-x509-authentication.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Feb 2021 17:29:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/4283761#M1077955</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-02-01T17:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS MFA -SSH Certificate Authentication/Radius Authorization</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/4290089#M1078398</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for providing the article, it was helpful but only if I'm using TACACS+ and ISE. Unfortunately I'm trying to use radius.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read here:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://content.cisco.com/chapter.sjs?uri=/searchable/chapter/content/en/us/td/docs/ios-xml/ios/sec_conn_pki/configuration/xe-16-11/sec-pki-xe-16-11-book/sec-cfg-auth-rev-cert.html.xml" target="_blank"&gt;Cisco Content Hub - Configuring Authorization and Revocation of Certificates in a PKI&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under the section&amp;nbsp;RADIUS or TACACS+ Choosing a AAA Server Protocol that if you create radius users with the default password cisco it might be possible.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will test and update this post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 13:42:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/4290089#M1078398</guid>
      <dc:creator>pakmon1722</dc:creator>
      <dc:date>2021-02-11T13:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS MFA -SSH Certificate Authentication/Radius Authorization</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/4290157#M1078405</link>
      <description>&lt;P&gt;Thank you for the input, that give more information all members of community, feedback the results will help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 14:40:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/4290157#M1078405</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-02-11T14:40:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS MFA -SSH Certificate Authentication/Radius Authorization</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/4550765#M1087329</link>
      <description>&lt;P&gt;I am trying to accomplish this exact same procedure. Were you able to successfully authorize through your AAA server?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Feb 2022 17:58:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/4550765#M1087329</guid>
      <dc:creator>hboesenberg</dc:creator>
      <dc:date>2022-02-11T17:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS MFA -SSH Certificate Authentication/Radius Authorization</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/5166075#M1115385</link>
      <description>&lt;P&gt;any one success to do this ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the BlastRadius will kill us those week&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 18:12:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-mfa-ssh-certificate-authentication-radius/m-p/5166075#M1115385</guid>
      <dc:creator>Nenday</dc:creator>
      <dc:date>2024-08-26T18:12:41Z</dc:date>
    </item>
  </channel>
</rss>

