<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic EAP-TLS with machine certificate in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283751#M10609</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you all!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 06 Oct 2013 04:59:38 GMT</pubDate>
    <dc:creator>Derrick Robba</dc:creator>
    <dc:date>2013-10-06T04:59:38Z</dc:date>
    <item>
      <title>EAP-TLS with machine certificate</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283745#M10603</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I'm looking for a solution to authenticate both machine and wireless users. I've been finding out solutions like EAP-TLS using the machine certificate to stablished the tunnel and authenticating user credentials (LDAP store) over this tunnel. Now i want to know if is possible to use this configuration using an ACS Radius servers and what SOs are supported to do this without external supplicants (Windows XP, Windows 7, Windows 8, iOs, Android...).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks a lot.&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 07:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283745#M10603</guid>
      <dc:creator>ALFONSO MONEO VILORIA</dc:creator>
      <dc:date>2021-07-04T07:41:56Z</dc:date>
    </item>
    <item>
      <title>EAP-TLS with machine certificate</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283746#M10604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;Hi Alfonso,&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;&lt;STRONG&gt;Certificate Retrieval for EAP-TLS Authentication &lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;ACS 5.4 supports certificate retrieval for user or machine authentication that uses EAP-TLS protocol. The user or machine record on AD includes a certificate attribute of binary data type. This can contain one or more certificates. ACS refers to this attribute as userCertificate and does not allow you to configure any other name for this attribute.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;ACS retrieves this certificate for verifying the identity of the user or machine. The certificate authentication profile determines the field (SAN, CN, SSN, SAN-Email, SAN-DNS, or SAN-other name) to be used for retrieving the certificates.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;After ACS retrieves the certificate, it performs a binary comparison of this certificate with the client certificate. When multiple certificates are received, ACS compares the certificates to check if one of them match. When a match is found, ACS grants the user or machine access to the network.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;&lt;STRONG&gt;Configuring CA Certificates &lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;When a client uses the EAP-TLS protocol to authenticate itself against the ACS server, it sends a client certificate that identifies itself to the server. To verify the identity and correctness of the client certificate, the server must have a preinstalled certificate from the Certificate Authority (CA) that has digitally signed the client certificate.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;If ACS does not trust the client's CA certificate, then you must install in ACS the entire chain of successively signed CA certificates, all the way to the top-level CA certificate that ACS trusts. CA certificates are also known as trust certificates.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;You use the CA options to install digital certificates to support EAP-TLS authentication. ACS uses the X.509 v3 digital certificate standard. ACS also supports manual certificate acquisition and provides the means for managing a certificate trust list (CTL) and certificate revocation lists (CRLs).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;Digital certificates do not require the sharing of secrets or stored database credentials. They can be scaled and trusted over large deployments. If managed properly, they can serve as a method of authentication that is stronger and more secure than shared secret systems.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;Mutual trust requires that ACS have an installed certificate that can be verified by end-user clients. This server certificate may be issued from a CA or, if you choose, may be a self-signed certificate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;Also check the below link,&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px; line-height: normal;"&gt;&lt;A href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.4/user/guide/users_id_stores.html#wp1170404"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.4/user/guide/users_id_stores.html#wp1170404&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Sep 2013 16:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283746#M10604</guid>
      <dc:creator>Anas Naqvi</dc:creator>
      <dc:date>2013-09-03T16:09:58Z</dc:date>
    </item>
    <item>
      <title>EAP-TLS with machine certificate</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283747#M10605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Anas,&lt;/P&gt;&lt;P&gt;thanks a lot for your response. I've finally discarded the idea of implement 2 authentications because I think that EAP-CHAINING (with ISE) is the only way to do really this.&lt;/P&gt;&lt;P&gt;Now, I'm going to implement only one authentication process based on machine certificate for Windows, Android and iOS using EAP-TLS.&lt;/P&gt;&lt;P&gt;Your help will be very useful to do this!.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Best regards,&lt;/P&gt;&lt;P&gt;Alfonso Moneo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 11:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283747#M10605</guid>
      <dc:creator>ALFONSO MONEO VILORIA</dc:creator>
      <dc:date>2013-09-30T11:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS with machine certificate</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283748#M10606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will a machine cert work in 5.3?&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Oct 2013 18:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283748#M10606</guid>
      <dc:creator>Derrick Robba</dc:creator>
      <dc:date>2013-10-05T18:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS with machine certificate</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283749#M10607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are talking about ACS 5.3, yes it supports EAP-TLS which does requires a machine certificate. It's supported in most of the v4.x and v5.c of ACS.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Oct 2013 03:24:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283749#M10607</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2013-10-06T03:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS with machine certificate</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283750#M10608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes With EAP-TLS we should have machine cert installed on the end-client and ACS 5.3 does support.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/user/guide/users_id_stores.html#wp1170404"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/user/guide/users_id_stores.html#wp1170404&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Oct 2013 03:34:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283750#M10608</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-10-06T03:34:37Z</dc:date>
    </item>
    <item>
      <title>EAP-TLS with machine certificate</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283751#M10609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you all!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Oct 2013 04:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-with-machine-certificate/m-p/2283751#M10609</guid>
      <dc:creator>Derrick Robba</dc:creator>
      <dc:date>2013-10-06T04:59:38Z</dc:date>
    </item>
  </channel>
</rss>

