cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4161
Views
5
Helpful
6
Replies

ISE - EAP-FAST certificate for machine and MSCHAP for user authentication

fedor.solovev
Spotlight
Spotlight

Hello,
Does anyone know what is the correct way to configure 
Policy Set for EAP-FAST when NAM uses certificate machine authentication and MSCHAP user authentication ? 
I have this policy but I doubt this is the correct one.

 

2020-09-09 17-08-49 Identity Services Engine - Google Chrome.png

1 Accepted Solution

Accepted Solutions

fedor.solovev
Spotlight
Spotlight

Let me share my masterpiece of Policy Set configuration and comments. I tested a lot and not it works.
Please correct this if there is something missing.

So we are doing EAP-FAST with machine certificate and user MSCHAP authentication.
Authentication should contain a cert verification for both MACHINE authentication and then for USER auth with MSCHAP otherwise the result for authz is always "user succeeded and machine failed".

2020-09-17 15-09-15 Identity Services Engine - Google Chrome.png

 

For my scenario POSTURE is verified.
So there should be some references to that in order to match the correct policy.
At the same time we don't need any non-domain PCs to be able to connect to the LAN.

2020-09-17 15-15-58 Identity Services Engine - Google Chrome (3).png

 

 

 

For my test the first state for posture before assessment is Posture Status ==NotApplicable so we cannot use UNKNOWN to match the rule.

NOT_CONTAINS == Compliant or
NOT_ENDS_WITH == Compliant works to match the rule POSTURE_UNKNOWN for that state AND to skip it WHEN the status is changed to Non-Compliant or Compliant in order to match lower rules.

 

Other details are on the screenshots.

View solution in original post

6 Replies 6

Greg Gibbs
Cisco Employee
Cisco Employee

You don't want to use a Cert Auth Profile for EAP-MSCHAPv2 as the client does not present a certificate. For this scenario, I would create an Identity Source Sequence with the CAP and AD Join Point (ISS_LabAD_Cert) to use for the EAP-TLS (Computer) session and use just the AD Join Point (LabAD) for the EAP-MSCHAPv2 (User) session. I would then use the EAP method to differentiate between the two.

Example:

Screen Shot 2020-09-10 at 2.27.54 pm.png

You can use additional checks against the certificate (CN, Issuer, etc) if you choose, but ISE will verify that the certificate is signed by a CA in its Trusted Store as part of the AuthC process.

Hello, Greg.

One concern:
On my screenshot if I disable the 2nd rule (MSCHAP_AUTH_USER) the "Default" one matches for user authentication.
In this case if a user enters wrong credentials, ISE shows an issue in logs:
22045 Identity policy result is configured for password based authentication methods but received certificate based authentication request.
Then if a user enters correct credentials ISE authenticates the PC only after 60 seconds (I can see that on ISE Radius logs).
However, if the 2nd rule is enabled nothing happen in logs if enter wrong credentials.

Correct me if I am wrong:
First a PC has machine authentication successful based on a certificate.
Then user logs in and enters credentials and the PC (using EAP-FAST) sends a machine certificate again along with user authentication.


For your example:

assuming I am using a non-domain PC without a trusted certificate for machine authentication ( so machine authentication will fail).
Will authentication with user AD credentials (only) successfully pass and let PC to the network even without successful machine authentication ?

The whole idea is to use a stronger certificate based verification for a machine and for a user, but because of limitations for NAM connections we cannot user certificate for user authentication:
https://community.cisco.com/t5/vpn/anyconnect-nam-eap-fast-user-certificate-issue/td-p/4145877#M1879 ) .

Hello,Greg.

One concern:
For your example will this Policy with your rules authenticate users without machine certificate ?
Because it looks like if AD credentials are correct certificate will not be checked by ISE.

For EAP-FAST first authenticates with a machine certificate. Then user logs in by signing credentials. A PC sends both a machine certificate and user credentials. For that reason I used a profile with certificate. It should be only AD credentials checking ?

Yes, a user without a machine certificate will authenticate if MSCHAPv2 is configured, but EAP Chaining controls are done in the AuthZ Policy, not the AuthC Policy.

You would configure an AuthZ rule that uses the 'User and machine both succeeded' condition as per the below example. If you prefer, you could fine-tune the policy with matches on specific EAP protocols and/or create another rule below to redirect users that fail the EAP Chaining condition to a BYOD flow, etc. It all depends on your requirements.

Screen Shot 2020-09-11 at 8.39.20 am.png

Hello, Greg.
Thank you for your answers.

fedor.solovev
Spotlight
Spotlight

Let me share my masterpiece of Policy Set configuration and comments. I tested a lot and not it works.
Please correct this if there is something missing.

So we are doing EAP-FAST with machine certificate and user MSCHAP authentication.
Authentication should contain a cert verification for both MACHINE authentication and then for USER auth with MSCHAP otherwise the result for authz is always "user succeeded and machine failed".

2020-09-17 15-09-15 Identity Services Engine - Google Chrome.png

 

For my scenario POSTURE is verified.
So there should be some references to that in order to match the correct policy.
At the same time we don't need any non-domain PCs to be able to connect to the LAN.

2020-09-17 15-15-58 Identity Services Engine - Google Chrome (3).png

 

 

 

For my test the first state for posture before assessment is Posture Status ==NotApplicable so we cannot use UNKNOWN to match the rule.

NOT_CONTAINS == Compliant or
NOT_ENDS_WITH == Compliant works to match the rule POSTURE_UNKNOWN for that state AND to skip it WHEN the status is changed to Non-Compliant or Compliant in order to match lower rules.

 

Other details are on the screenshots.