02-02-2019 10:26 AM
Hi All,
I have a customer that need to authenticate and authorize endpoints using some advanced certificate fields like extended key usage, organization unit and much more without going to any other external identity source like AD , just from the certificate fields using EAP-TLS.
Is it possible ? If yes is below steps are the right way to do it or there is a missing or wrong piece ?
1- import PKI CA certificate and intermediate certificates as trusted to ISE, and sign the ISE self-signed certificate from the CA.
2- create CAP and will not specify any identity store.
3- create authentication policy to match endpoints certificate with the trusted chain.
4- create authorization policy using fields from certificate, like from organization unit X and departement Y apply that authorization profile and so on.
Solved! Go to Solution.
02-09-2019 01:37 PM
John,
OU or other field:
not suitable to determine the identity, not suitable for authentication
suitable for conditions in the authorization rules, so you can assign different results for different values
02-02-2019 07:00 PM
For certificate based authentication following options are available:
02-02-2019 08:03 PM
Hi pan,
so there is no way to authenticate and authorize them based on something like organization unit or department or other certificate fields , right ?
02-11-2019 12:12 AM
02-11-2019 12:14 AM
02-09-2019 01:37 PM
John,
OU or other field:
not suitable to determine the identity, not suitable for authentication
suitable for conditions in the authorization rules, so you can assign different results for different values
02-10-2019 08:05 AM
Just to expand on this. Don't confuse authentication and authorization. Each of them act independently.
In the authentication phase, you use an certificate authentication profile (CAP) to tell ISE where to find the identity in the certificate. Usually the general SAN field setting is all you need, i.e. don't specify where in the SAN field. If you don't tie the CAP into AD there is no AD lookup in the authentication phase. All ISE is validating during authentication is:
Once you move to authorization you have the many options available to you. You can use information in the cert (OU, O, etc.) to provide different authorization results. You can also have ISE take the identity pulled during authentication and do an AD lookup for AD group attributes or any other AD attributes you have mapped into ISE.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide