<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius Authentication | Check on certificate and users in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493944#M299618</link>
    <description>&lt;P&gt;Your NPS policy will need to match "Domain Computers", and whatever group the users are in.&lt;/P&gt;&lt;P&gt;You'll need to configure group policy to do Computer and User authentication.&lt;/P&gt;&lt;P&gt;You'll need to configure group policy to issue certificates both to the computers and the users.&lt;/P&gt;</description>
    <pubDate>Mon, 21 Oct 2024 10:36:24 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2024-10-21T10:36:24Z</dc:date>
    <item>
      <title>Radius Authentication | Check on certificate and users</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493943#M299617</link>
      <description>&lt;P&gt;Hi everyone.&lt;/P&gt;&lt;P&gt;Recently, I’ve been running some tests on my NPS server for RADIUS authentication with my Meraki access points.&lt;/P&gt;&lt;P&gt;My goal is to authenticate via RADIUS only computers with a certificate issued by my CA and users who belong to a specific domain group.&lt;/P&gt;&lt;P&gt;Right now, the certificate authentication is working but i can't find a way to add a check on the domain groups.&lt;/P&gt;&lt;P&gt;Do you have any tips?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 09:34:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493943#M299617</guid>
      <dc:creator>FrancescodeRosa</dc:creator>
      <dc:date>2024-10-21T09:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication | Check on certificate and users</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493944#M299618</link>
      <description>&lt;P&gt;Your NPS policy will need to match "Domain Computers", and whatever group the users are in.&lt;/P&gt;&lt;P&gt;You'll need to configure group policy to do Computer and User authentication.&lt;/P&gt;&lt;P&gt;You'll need to configure group policy to issue certificates both to the computers and the users.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 10:36:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493944#M299618</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-10-21T10:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication | Check on certificate and users</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493945#M299619</link>
      <description>&lt;P&gt;I could be wrong but I think when you authenticate using PEAP/EAP-TLS with machine certificates, you can't perform user/group based checks as that information isn't passed onto the RADIUS server.&lt;/P&gt;&lt;P&gt;You can probably do it with user certificates though.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 00:55:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493945#M299619</guid>
      <dc:creator>Brash</dc:creator>
      <dc:date>2024-10-22T00:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication | Check on certificate and users</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493946#M299620</link>
      <description>&lt;P&gt;Windows machines that join AD have a machine account.  When you use machine based certificate authentication, they present that certificate in the same way that a user does.&lt;/P&gt;&lt;P&gt;NPS then extracts the username name from that certificate (weather it be user or machine), and checks that it is allowed access.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 01:15:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493946#M299620</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-10-22T01:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication | Check on certificate and users</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493947#M299621</link>
      <description>&lt;P&gt;So, the suggestion is to create a template for a certificate for the user as well and perform the verification on both certificates? Correct?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 07:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493947#M299621</guid>
      <dc:creator>FrancescodeRosa</dc:creator>
      <dc:date>2024-10-22T07:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication | Check on certificate and users</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493948#M299622</link>
      <description>&lt;P&gt;Correct.  You should have both a computer and a user certificate template.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 08:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493948#M299622</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-10-22T08:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication | Check on certificate and users</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493949#M299623</link>
      <description>&lt;P&gt;Ok, but I have a doubt.&lt;BR /&gt;Where do I specify that my NPS server must verify both certificates and not just one? Within the configuration, I don’t see a way to select more than one certificate."&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 09:38:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493949#M299623</guid>
      <dc:creator>FrancescodeRosa</dc:creator>
      <dc:date>2024-10-22T09:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication | Check on certificate and users</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493950#M299624</link>
      <description>&lt;P&gt;NPS doesn't have a capability to say that a computer certifcate must be authenticated first and then a user certificate.  You need a product like Cisco ISE to do that.&lt;/P&gt;&lt;P&gt;But group policy lets you configure the WiFi settings on your devices, and in group policy you can say that devices must authenticate as a computer first (prior to user login), and then as a user when they log in.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 09:41:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-check-on-certificate-and-users/m-p/5493950#M299624</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-10-22T09:41:52Z</dc:date>
    </item>
  </channel>
</rss>

