cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
894
Views
0
Helpful
7
Replies

authorization policy based on Machine cert,(SAN Value) and Also User Authentication with Any connect NAM Module

azhar_eaggle1
Level 1
Level 1

authorization policy based on Machine cert,(SAN Value) and Also User Authentication with Any connect NAM Module ?

As Machine Authentications with always happen first, and then User Authentication, can we authorize policies based on machine Cert ? and also wants to do user Authentication ? 

we will have two Type of machine Cert Differentiated with SAN Valve and single AD Group,  and we want to authorize based on Machine cert(SAN Valve) and also user authentication, is this Possible ? if yes , how it will work ? 

2 Accepted Solutions

Accepted Solutions

hslai
Cisco Employee
Cisco Employee

Please start with this guide -- How To: Deploy EAP Chaining with AnyConnect NAM and ISE

And, try it out in your lab. I have no existing setup for EAP Chaining so it would take me some time to do it.

View solution in original post

I am not in the community support duty this week so I am not monitoring the forum.

Assuming you meant the Windows computers have a DNS entry in the certificate SAN field, such as

corp1.prod.demo.local or guest2.test.demo.local

And, the users authenticate via password.

Below is a sample policy set and results.

Screen Shot 2019-01-10 at 4.38.43 PM.png

Screen Shot 2019-01-10 at 4.34.40 PM.png

View solution in original post

7 Replies 7

hslai
Cisco Employee
Cisco Employee

Please start with this guide -- How To: Deploy EAP Chaining with AnyConnect NAM and ISE

And, try it out in your lab. I have no existing setup for EAP Chaining so it would take me some time to do it.

i dont have home lab set up for This, can you Please check from your Cisco Colleges ? 

So, we didn't do this exact thing, but we did try EAP Chaining to verify the system was domian joined, and the user was authenticated.We ran into issues with the NAM module and ended up scrapping it due to the issues.

hslai
Cisco Employee
Cisco Employee

Please give a good example how you would like ISE authorization rule to match on the SAN value of a machine certificate to differentiate two different types of certificates.

we have 2 different type of Cert based on SAN Valve. 

1- Prod.xyz.com

2-Test.XYZ.com

 

and one AD domain group. so we want that if end user has 'Prod.xyz.com' cert and valid ad cerdential, it should have Access to Prod envirement only.

and if end user has 'Test.xyz.com' cert and valid ad cerdential, it should have Access to Test envirement only.

From what i can see the only way to do that would be EAP chaining, other wise perhaps rely on supplicant to do machine cert plus sending to portal for CWA chaining? @hslai any other ideas?

I am not in the community support duty this week so I am not monitoring the forum.

Assuming you meant the Windows computers have a DNS entry in the certificate SAN field, such as

corp1.prod.demo.local or guest2.test.demo.local

And, the users authenticate via password.

Below is a sample policy set and results.

Screen Shot 2019-01-10 at 4.38.43 PM.png

Screen Shot 2019-01-10 at 4.34.40 PM.png