12-03-2025 12:12 AM
Hello everyone
Does anyone has an experience with ISE (3.x) configuration related to 802.1x for wired clients connecting to network where identity lookup in AD shouldn't be done?
We have some specific use case for clients who are issued with certificate from internal PKI and there is a need to allow such clients to perform 802.1x authentication based on client (machine) certificate, but there is NO need for identity lookup in any store (not AD nor internal).
Basically client should just present valid certificate signed by internal PKI which is verified by ISE that certificate is valid/trusted and then run authorization policy to assing user into VLAN X.
Problem is that it looks that ISE always perform some kind of identity lookup which is taken e.g. from certificate CN or SAN entry etc.
Any clue how to configure ISE policy or profile to NOT perform any identity lookup and simply accept client if presented certificate is valid/trusted? Can't see any option in Certificate auth profile for such a way.
In policy authorization policy it looks straighforward however from logs I can see identity lookup is always performed.
Thank you for any hint.
Martin
12-03-2025 12:21 AM
@Martin Jelinek is a CAP (Certificate Authentication Profile) used which is performing lookup to AD?
12-03-2025 01:03 AM - edited 12-03-2025 06:50 AM
Hi,
Although not a common scenario, you should be able to make it work as follows:
1. Ensure your CAP / Certificate Authentication Profile does not rely on AD for the authentication phase; when you create the CAP, leave the Identity field empty, to prevent ISE from performing an AD query/lookup; also ensure that "Binary Comparison" option is unchecked, to also prevent ISE perform AD lookup during authentication phase; ensure to configure which certificate attribute / field you want ISE to use as Identity, ideally pick something which is not specific to an endpoint (like CN or SAN), rather pick a filed which has the same value for all certificate issued to any endpoint.
2. When configuring authorization policy, ensure you don't use AD lookup as condition, rather use a certificate match criteria that matches on whatever certificate attribute you've mentioned in previous step as Identity.
Least but not last, ensure that the building the above, you're not matching on other requests that might reach ISE, so you're not accidentally authenticating and authorising other endpoint as well.
Thanks,
Cristian.
12-03-2025 02:48 AM
Hi @Rob Ingram @Cristian Matei
My CAP is configured as per attachment and there is no option to "exclude" such AD lookup as far as I can tell..
However, even though I can see in log entries that processing is trying to query domain for an identity check:
| 24209 | Looking up Endpoint in Internal Endpoints IDStore - xxxxxx-yyyyy-zzzz-aaaaa | 1 | |
| 24211 | Found Endpoint in Internal Endpoints IDStore | 2 | |
| 15048 | Queried PIP - Radius.Service-Type | 1 | |
| 15048 | Queried PIP - Radius.NAS-Port-Type | 0 | |
| 24433 | Looking up machine in Active Directory -xxxxxx-yyyyy-zzzz-aaaaa | ||
| 24325 | Resolving identity | ||
| 24313 | Search for matching accounts at join point | ||
| 24318 | No matching account found in forest | ||
| 24322 | Identity resolution detected no matching account | ||
| 24352 | Identity resolution failed | ||
| 24437 | Machine not found in Active Directory | ||
| 15048 | Queried PIP - AD1.ExternalGroups | 19 | |
| 15048 | Queried PIP - AD1.ExternalGroups | 0 |
Please note that obviously we use ISE and AD integration for other use cases so identity check is required normally, but trying to fit in with other use case to simply authorize specific clients based on certificate attribute (SAN entry) to verify just validity/trust of such client based on certificate and if so, than authorization policy should assign correct VLAN for the client...
I don't have policy rule with condition to refer to AD lookup. Well at least not that i would be aware of.
12-03-2025 02:57 AM
I know ISE is a beast though I would normally expect in CAP to simply say "don't validate identity" to keep it simple, though not simple as that.
12-03-2025 06:54 AM
Hi,
Your CAP looks good per what you're trying to achieve, not mentioning AD in Identity Store field, means no AD lookup.How do your authentication and authorization policies look like for the goal you have in place? Do you have an active client to test with and check results / logs?
Thanks,
Cristian.
12-03-2025 11:47 PM
Hi, yes I have a client to test this policy with and I can always see in log details (steps) involving identity lookup which shouldn't be happening, to my understanding.
Policy is quite simple.
Policy matching criteria is based on Wired_802.1X using TLS so client and server (ISE) needs to trust each other.
In authentication part there is "Network Access:AuthenticationMethod = x509_PKI" checking content of the SAN entry within certificate presented by client. The authentication part looks to succeed..
| 22070 | Identity name is taken from certificate attribute | 0 | |
| 22037 | Authentication Passed | 0 | |
| 12506 | EAP-TLS authentication succeeded | 0 |
And within Authorization part, it looks matching rule is missed. Though, still it jsut check SAN entry for specific content and doing "Network Access: EapAuthentication = EAP-TLS" with specic authorization results to assign such client to vlan X.
It is just that simple and that is why I'm not sure where it Identity lookup is comming from as I have not specified it to what I can tell
| 15036 | Evaluating Authorization Policy | 0 | |
| 24209 | Looking up Endpoint in Internal Endpoints IDStore -xxxxxx-yyyyy-zzzz-aaaaa | 1 | |
| 24211 | Found Endpoint in Internal Endpoints IDStore | 2 | |
| 15048 | Queried PIP - Radius.Service-Type | 1 | |
| 15048 | Queried PIP - Radius.NAS-Port-Type | 0 | |
| 24433 | Looking up machine in Active Directory -xxxxxx-yyyyy-zzzz-aaaaa | ||
| 24325 | Resolving identity | ||
| 24313 | Search for matching accounts at join point | ||
| 24318 | No matching account found in forest | ||
| 24322 | Identity resolution detected no matching account | ||
| 24352 | Identity resolution failed | ||
| 24437 | Machine not found in Active Directory |
12-04-2025 03:50 AM
It could be the SAN check you're doing on the authorization rule that is causing ISE to go and check that identity in the AD. The "not applicable" option you rightly selected in the CAP affects only authentication, it has nothting to do with authroization. I would suggest to try to remove the SAN check on the authorization rule for testing, and if that resolves the issue then probably you would need to find another way to trying to match specific clients.
12-04-2025 05:58 AM
I can give a try, though this would be quite unfortunate as Windows 11 are by nature manage through EntraID and therefore are not part of internal domain ISE uses for identity lookups...That is the reason why we are looking into verification of the certificate and specific SAN content with hope ISE will not do identity lookup!
I can try to test next week hopefully
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide