cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2867
Views
5
Helpful
7
Replies

Cisco ISE authentications for external domains users

Hi all,

 

I'd like to ask you about an scenario that I have on my network...

 

In my company we work with computers in my company domain "domainA", we authenticate users and computers in this domain by dot1x and we have other devices authenticated by mab (printers, IoT devices, not domainA computers, etc...)... our switches configuration is this:

 

authentication event fail action next-method
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto

 

What the problem? sometimes I have users with external computers in "domainB", "domainC" or others... and these computers are configured with dot1x authentication and they're not "administrators" of this computers for disable the supplicant. These users work usually in the office of CompanyB... C, D.... (our customer with "domainB", "...C", "...D" ...) but sometimes have to work on my offices with my internal "domainA"... for the connection works correctly without problems I have to disable authentication on switchport or change the authentication priority/order on swithchport for authenticating mab first, and users dont's user always the same socket... or other internal user use this socket

 

For me this is a big problem, because I have more that 90.000 switchports with mobility and I don't want to configure statically the switchports for special users, maybe 800 users at the moment, I want to create an ISE policies with external domain computers/users rules to allow the connection... but I can't integrer my ISE with external Active Directory.

 

When I connect an external computer to my switches I see how the computer try to authenticate with and user ID, I can't compare the credentials with DomainB Active Directory, but... can I allow the connection if I know that user tries authentication with "domainB\user1" for example? If I can do it, I can create a policy condition similar to "identity contains = domainB\user1" ...¿?¿?

 

If you can help me with some example, it's very helpfull for me.

 

Thanks in advance!!

 

Best Regards!!

Marcos

 

1 Accepted Solution

Accepted Solutions

Sorry I misunderstood the scenario - You are describing a Contractor or Guest scenario.

If some users' 802.1X supplicants cannot be customized for your network, then I recommend allocating a username&password that they can use with WebAuth after 802.1X fails on your network with their credentials. This could done via your AD or via Sponsored Guest.

 

But the real issue below is that your end users do not trust your ISE certificate. Either it is self-signed or not part of a public CA chain so that the user's supplicant would trust it. That is why you get the failure in your screenshot. Since you cannot control the certificates on this user's computer, I recommend using using the Default Authorization (after they fail 802.1X) to redirect their web browser to do a WebAuth.

 

View solution in original post

7 Replies 7

thomas
Cisco Employee
Cisco Employee

This is not a switch configuration issue.

 

Users disabling or tweaking their supplicant configuration is a separate issue that you can handle by redirecting them to a WebAuth page by default if 802.1X does not work for any reason.

 

What you are trying to do is authenticate users via 802.1X on multiple AD domains.

 

As long as you have joined ISE to each of the Active Directory domains @ Administration > Identity Management > External Identity Stores then you can easily do this on ISE using Administration > Identity Management > Identity Store Sequences. You may use the default All_User_ID_Stores and select all of your AD domains. Be sure to order them from most frequently used to least frequent to improve performance.

 

Then, in your Policy Set > Authentication Policy, verify that you have the following options chosen:
image.png

 

image.png

 

Using these settings tells ISE to run through all of the Identity Stores (domains) that you listed and If User Not Found to continue to the next Identity Store. I recommend using Continue on all of these so if there are any problems, the user can hit the Default Authroization Policy and ideally give the person an option to do WebAuth if their supplicant is unconfigured or misconfigured or they are a Guest.

 

 

Hi Thomas,

 

Thanks for your reply, I understand your reply but, as I tried to explaned in my first post, domainB is an external company domain, so I can't join my ISE to that domainB, but I want to allow authentications of users with "domainb\username" without check if password is correctly configured.

 

My last incident about this:

 

- My company is partner of Cisco for some projects

- Cisco configure a laptop with Cisco software and Cisco domain computer platform (windows + antivirus + anyconnect vpn + 802.1x supplicant, ... and others sw/config) and my company user uses this laptop with this configuration in Cisco office 3 days per week, but my user isn't local administrator in this laptop.

- My user comes to my office with this laptop the other 2 days per week and connects the computer in my company switches... my ISE isn't joined to Cisco AD, so I can't authenticate user/pass to Cisco AD... but I want to allow authentication if "identity" is equals to "cisco\username"... because in authentication log I can see the username...

 

An example of my log:

 

ISE_Test.PNG

 

 

Many thanks!!

B.R

Marcos

 

 

The very first thing I would do is install the CA's certificates that signed the ISE cert into the Laptop Trusted Certificate list so the error that you are listing is gone (untrusted cert). The collect again the log and post it so we can check how to "tweak" the AUTHZ policy and make it work

 

If the Laptop MAC is in the ISE Endpoint Group DB (any endpoint group) then your MAB authentication should work so you can hit a customized AUTHZ policy that matches your requirements. If you DO NOT want the MAC in your ISE endpoint DB, you can enable CONTINUE on the MAB AUTHC Policy when it fails and then configure the AUTHZ policy accordingly. But be careful that allowing to continue does not break your security rules.

Sorry I misunderstood the scenario - You are describing a Contractor or Guest scenario.

If some users' 802.1X supplicants cannot be customized for your network, then I recommend allocating a username&password that they can use with WebAuth after 802.1X fails on your network with their credentials. This could done via your AD or via Sponsored Guest.

 

But the real issue below is that your end users do not trust your ISE certificate. Either it is self-signed or not part of a public CA chain so that the user's supplicant would trust it. That is why you get the failure in your screenshot. Since you cannot control the certificates on this user's computer, I recommend using using the Default Authorization (after they fail 802.1X) to redirect their web browser to do a WebAuth.

 

Based on my understanding when EAP authentication fails the process finishes there. You cannot reach the authorization part to make a redirect. I discussed this topic with Cisco guys because I wanted to use an AD attribute in the AUTHZ Policies for an AD Account with expired password so I could trigger a redirect (CoA) to a customized page for password update.

 

Unfortunately, the CONTINUE option when EAP Authentication fails does is not possible by RFC standards and indicated on ISE.

kthiruve
Cisco Employee
Cisco Employee

Marcos,

 

Create a policy set with Network access or Radius dictionary and user-name attribute to filter out requests from from domainB/user. Then, use MAB to process your authentication policy.

 

IBNS 2.0 allows you to process dot1x and MAB concurrently and also you can determine what to do if authentication fails etc. You can also determine the action to do when dot1x fails. 

Here is the doc for that

https://community.cisco.com/t5/security-documents/how-to-universal-3850-wired-class-based-policy-language-c3pl/ta-p/3630998?attachment-id=145771

 

If MAB does not work for you you can do a Central web authentication with guest portal.

https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/113362-config-web-auth-ise-00.html

 

Thanks

Krishnan

 

Hi all!!

 

Thanks for your comments, now my test users're out of office, I'll do some test and I'll confirm you.

 

Thank!!

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: