03-27-2024 04:29 AM
Hello,
Is it possible to implement Dot1x without AD or LDAP integration? If so, what are some ways it can be done?
Thank you.
03-27-2024 04:41 AM
@DamianRCL you can perform 802.1X using EAP-TLS certificates without an External Identity Source.
Though, typically if using certificates issued from an Internal CA you would authenticate the certificates and then optionally perform a lookup against AD for associated attributes, if required.
You could use a local account on ISE, I would not recommend it as it's not scalable solution.
03-27-2024 04:43 AM
If you have radius server then sure you can use it local DB for auth the endpoint
MHM
03-27-2024 05:10 AM
All good points. Thanks.
Is it also possible to use profiling probe results for authentication and authorization?
03-27-2024 05:16 AM
ISE can use MAB or chap' and you can use profile.
MHM
03-27-2024 05:17 AM
Yes, you can. But perhaps you better describe what your goal is that you want to achieve?
03-27-2024 05:23 AM - edited 03-27-2024 05:27 AM
@DamianRCL use MAB or DOT1X for authentication and then you can use the Profiling attributes as conditions in authorisation rules, assuming you have the licensing (requires the Advantage license) for it.
03-27-2024 05:29 AM
The network I'm working on uses LDAP. I would use that as an external ID store, but there would be too many hurdles (people hurdles not technical). Currently port security is performed manually, which is an administrative chore. My goal is to implement 802.1x in a secure way without integrating with LDAP. Let me know if you need more details. Thanks.
03-27-2024 05:41 AM
@DamianRCL IMO, it doesn't seem practical to not integrate with LDAP if you have it. You will also need to consider the configuration of the endpoint supplicants configuration and how they will be configured, in an AD environment this can be deployed centrally.
If you still decide not to use an External Identity Source then EAP-TLS is the most secure method, you could use the ISE CA and onboard the devices, where the users will enrol and receive a certificate. https://community.cisco.com/t5/security-knowledge-base/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867
03-27-2024 05:51 AM
Duly noted, Rob. My intent was to roll this out while limiting the involvement of other silos, but it appears that won't be possible. I'll shoot for LDAP integration when the time comes.
Thanks!
03-27-2024 07:54 AM
Yes, I demonstrated this in
05:01 Defining User Custom Attributes for ISE Internal Users
06:10 Defining Endpoint Custom Attributes and their Common Uses
07:36 Demo: Creating User Custom Attributes
10:41 Demo: ISE 802.1X Policy Review, and Authentication
03-28-2024 04:16 AM
Thanks, Thomas. I'll be sure to take a look!
03-28-2024 04:26 AM
Implementing 802.1X (Dot1x) without integrating with Active Directory (AD) or LDAP is possible in Cisco Identity Services Engine (ISE). Here are some ways to achieve this:
Local Identity Store:
Certificate-Based Authentication:
Guest Services:
Machine Authentication (MAB):
Custom Identity Sources:
Local Web Authentication:
Remember that while these methods allow Dot1x without AD or LDAP, they have limitations. Consider your specific requirements, scalability, and security needs when choosing the appropriate approach for your deployment.
If you find this useful, please mark it helpful and accept the solution.
03-28-2024 04:46 AM
Thanks for this, Pulkit. This places things into perspective very nicely.
03-28-2024 04:52 AM
But always keep in mind that ChaptGPT often gives inaccurate answers.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide