06-30-2024 10:28 AM
Hi All,
We have set up Cisco ISE Dot1x Authentication with Azure AD using REST (ROPC). At the endpoint, we are using native Windows supplicant with EAP TTLS and PAP as the Inner Authentication Method.
The issue that we are observing is when the user password expires at the Azure AD level user cannot connect to the network. User has to call the endpoint help desk team to get a new password.
My question is, without Dot1x, does Windows allow you to set up a new password in case the current one expires? Why is there no provision for user to set new password in case password expires in Dot1x environment?
Is this limitation from ISE side or Windows native supplicant limitation
Solved! Go to Solution.
07-07-2024 03:07 PM
@jitendrac .. No. As stated in the MS documentation for CBA, it "enables customers to allow or require users to authenticate directly with X.509 certificates against their Microsoft Entra ID for applications and browser sign-in". Neither of those scenarios are related to the Windows 802.1x supplicant.
Using EAP-TLS for 802.1x authentication (purely against ISE, in this case) still requires the User and/or Device certificate enrolment. This would typically be done by Intune which would need integration with a PKI of some sort. That could be AD CS (as discussed in my blog), the MS Cloud PKI, or another solution like SCEPman.
06-30-2024 12:54 PM
Hi,
This is a limitation with ROPC and Azure AD/Entra ID, any interruption to a ROPC flow, such as change password, or MFA, is not supported.
You can see more about this here:
https://learn.microsoft.com/en-us/azure/active-directory-b2c/add-ropc-policy?tabs=app-reg-ga&pivots=b2c-user-flow
"ROPC doesn’t work when there's any interruption to the authentication flow that needs user interaction. For example, when a password expires or needs to be changed, multifactor authentication is required, or when more information needs to be collected during sign-in (for example, user consent)."
On a related note, generally I prefer using certificates for 802.1x authentication.
06-30-2024 06:12 PM
Thanks Jonatan,
Is my understanding regrading ISE with Azure AD is correct?
We have only 2 options to authenticate users with Azure AD
1. using EAP-TLS however Require PKI Infrastructure at Azure AD side which can issue certificate for users and computers.
2. using EAP-TTLS with PAP as inner method with limitation of ROPC
06-30-2024 08:05 PM
To be clear...
More details on the current use cases and options in relation to ISE, Entra ID, and Intune can be found in this blog.
Cisco ISE with Microsoft Active Directory, Entra ID, and Intune
07-06-2024 09:44 AM
Hi Greg
Can you verify if my understanding is correct regarding EAP-TLS ?
I believe for EAP-TLS to work with Azure AD we should enable and configure Microsoft Entra certificate-based authentication (CBA) first.
For Microsoft Entra CBA Public Key Infrastructure (PKI) is required for creating client certificates. Customers need to configure their own Public Key Infrastructure (PKI) and provision certificates to their users and devices.
07-07-2024 03:07 PM
@jitendrac .. No. As stated in the MS documentation for CBA, it "enables customers to allow or require users to authenticate directly with X.509 certificates against their Microsoft Entra ID for applications and browser sign-in". Neither of those scenarios are related to the Windows 802.1x supplicant.
Using EAP-TLS for 802.1x authentication (purely against ISE, in this case) still requires the User and/or Device certificate enrolment. This would typically be done by Intune which would need integration with a PKI of some sort. That could be AD CS (as discussed in my blog), the MS Cloud PKI, or another solution like SCEPman.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide