11-25-2019 06:23 AM
Hello Experts,
The requirement is to provide different level of access to employees/contractors based on the department/BU they belong to. The employees/contractors would fall into different groups, e.g. employee1, employee2, contractor1, contractor2, and so on.
Customer doesn't have an AD. They have Okta, but ISE-Okta integration doesn't provide user group details to ISE so we can't have authorization policies based on user group membership.
In this case, we are thinking to use certificates to not only authenticate, but also to authorize employees/contractors. Customer agreed to deploy an internal Certificate Authority. However, before we proceed I wanna check the possibilities. We wanna use certificate attributes to provide different level of access to different user groups. How flexible and scalable is the solution? Any suggestions or recommendations?
Thanks,
Rakesh Kumar
Solved! Go to Solution.
11-25-2019 09:57 AM
As @AndreaTornaghi mentioned for Authz you have the ability to utilize several unique identifiers based on cert attributes. From a pki perspective you could potentially manage different cert templates for each group. For Authc you could use a CAP with the identity store set to 'not applicable'. Essentially Authc would only occur based on trusted certs. Then rely on Authz conditions to push policy based on unique identifiers.
11-25-2019 09:11 AM
Hi,
basically you could think to apply different AuthZ policies based on CN.
If you use different CN for each department you can think to use this attribute for assigning different AuthZ result.
CN could be based on the hostname of the client.
Kind Regards
11-25-2019 09:57 AM
As @AndreaTornaghi mentioned for Authz you have the ability to utilize several unique identifiers based on cert attributes. From a pki perspective you could potentially manage different cert templates for each group. For Authc you could use a CAP with the identity store set to 'not applicable'. Essentially Authc would only occur based on trusted certs. Then rely on Authz conditions to push policy based on unique identifiers.
11-25-2019 07:39 PM - edited 11-26-2019 04:13 AM
Thanks Mike and Andrea.
So on authentication part, if we integrate ISE with internal CA, would ISE be able to validate user's certificates?
Second, I can find the requirements for CA to interoperate with ISE in compatibility guide. However, how about this case? Is this enough if I say that X.509 certificates issues by internal CA should be in Privacy-Enhanced Mail (PEM) or Distinguished Encoding Rule (DER) format?
11-26-2019 06:30 AM
11-27-2019 02:18 AM
11-27-2019 05:25 AM
11-27-2019 08:35 AM
@Mike.Cifelli wrote:
The info in the link is relevant. Few things to note are: I would not rely on ISE as an enterprise CA solution. Pretty sure Cisco docs state that too. In my experiences Microsoft Active Directory Certificate Services is typically the third party ideal/preferred solution. However, this will vary upon customer requirements. I have managed several internal MS-AD CS pki, and have found it to be straightforward & easy to manage. Easy from the viewpoint of being able to manage certain components such as auto-enrollment via GPOs. HTH!
that's correct, its only meant to produce certificates for clients authenticating to ISE (pxgrid clients, endpoints doing BYOD, and those endpoints that can't do BYOD (linux, iot, etc) but can onboard manually using the certificate provisioning portal). Its not meant for items like your web servers,etc
11-27-2019 08:33 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide