02-24-2020
04:20 AM
- last edited on
03-13-2020
04:00 PM
by
Kelli Glass
Hello,
We have a SDA network with DNAC and ISE.
In this network we have different teams with different AD domain and PKI. (domains do not trust each other)
Users are only sharing same switches in the fabric.
We want to authenticate the endpoints with EAP-TLS.
Each domain computer receives a machine cert for the domain it belongs
1- Will ISE be able to check the machine certificate against each CA and then check for a group in the corresponding AD?
2- Can I have only 1 Identity Source Sequence with all the Active Directory to acheive this?
3- Are there some restrictions or any caveats?
Thanks
Solved! Go to Solution.
02-24-2020 06:30 AM - edited 02-24-2020 06:31 AM
I agree with @Mohammed al Baqari for one valid option. Adding additional information that will hopefully be helpful:
I currently support an environment that has a similar setup that you have described. We are running an SDA fabric with a dnac cluster and ise cluster that supports user onboarding from multiple domains that do not have any trust. The nice thing about SDA is the mobility aspect. One thing to keep in mind is that you will want to determine how to virtually segregate these separate domains in SDA. What I mean by this is, are you going to rely on multiple VNs or rely heavily on policy with trustsec to control east-west traffic within a VN or two. IMO this design decision comes down to requirements. Just note that if clients in VN1 need to reach clients in VN2 then you will have to traverse traffic through your fusion routers and leak accordingly.
1- Will ISE be able to check the machine certificate against each CA and then check for a group in the corresponding AD?
Yes. Make sure you have all cert chains imported into the ISE trust store. You can setup separate ocsp client profiles that you can assign to each respective chain for cert status validation. You can also configure separate respective crl download locations for each chain.
2- Can I have only 1 Identity Source Sequence with all the Active Directory to acheive this?
Yes. Note that ISE will search from the top down so order them accordingly. Depending on how you build out your policies you may want to consider setting up separate policies for each domain. IMO this would be cleaner, and easier to read once setup for other members (this is just a preference thing). Since you are wishing to use certificate auth you will need to properly configure your Certificate Authentication Profile (CAP). Within your CAP/s you specify the identity store to use (AD1, AD2, ADall, etc.), and things like what cert attribute to use for identity.
3- Are there some restrictions or any caveats?
Yes. Of the top of my head one I can think of is, ISE can support up to 50 AD integrations. See here for more info:
02-24-2020 05:27 AM
02-24-2020 06:30 AM - edited 02-24-2020 06:31 AM
I agree with @Mohammed al Baqari for one valid option. Adding additional information that will hopefully be helpful:
I currently support an environment that has a similar setup that you have described. We are running an SDA fabric with a dnac cluster and ise cluster that supports user onboarding from multiple domains that do not have any trust. The nice thing about SDA is the mobility aspect. One thing to keep in mind is that you will want to determine how to virtually segregate these separate domains in SDA. What I mean by this is, are you going to rely on multiple VNs or rely heavily on policy with trustsec to control east-west traffic within a VN or two. IMO this design decision comes down to requirements. Just note that if clients in VN1 need to reach clients in VN2 then you will have to traverse traffic through your fusion routers and leak accordingly.
1- Will ISE be able to check the machine certificate against each CA and then check for a group in the corresponding AD?
Yes. Make sure you have all cert chains imported into the ISE trust store. You can setup separate ocsp client profiles that you can assign to each respective chain for cert status validation. You can also configure separate respective crl download locations for each chain.
2- Can I have only 1 Identity Source Sequence with all the Active Directory to acheive this?
Yes. Note that ISE will search from the top down so order them accordingly. Depending on how you build out your policies you may want to consider setting up separate policies for each domain. IMO this would be cleaner, and easier to read once setup for other members (this is just a preference thing). Since you are wishing to use certificate auth you will need to properly configure your Certificate Authentication Profile (CAP). Within your CAP/s you specify the identity store to use (AD1, AD2, ADall, etc.), and things like what cert attribute to use for identity.
3- Are there some restrictions or any caveats?
Yes. Of the top of my head one I can think of is, ISE can support up to 50 AD integrations. See here for more info:
02-25-2020 01:18 AM
02-25-2020 05:51 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide