01-31-2020 02:53 AM
Hello Experts,
I have a customer where they are using AD, but there is no identity store for machine credentials. So based on that I have different questions for machine authentication.
1. Machine supports dot1x supplicant, so how ISE can differentiate between corporate and non-corporate or personal machines?
2. Machine doesn't support supplicant, so how ISE can differentiate between corporate and personal machines?
3. If they have a CA server and machines are having certificates, can ISE query CA server to validate machine's credentials?
Thanks,
Rakesh Kumar
Solved! Go to Solution.
02-01-2020 08:20 PM
Hello @raksec
Are you saying that the customer is using AD, but ISE will not be given access to their AD environment for AuthN/AuthZ purposes? Wow that's not great. What's the point of that? If you wanted to authenticate a network user with their AD creds then what better place to check than with AD ... failing that, what hope is there? None.
You could ask the customer to create you an Identity Database (e.g. a daily sync of the AD User tree and copy it into a standalone LDAP directory - this will shield the customer's AD from ISE. ISE simply uses LDAP - however, this is also fraught with issues because password authentication to LDAP won't work - but if the LDAP Store is done right, then you could use it to perform an AD Group lookup (you have to of course copy all the AD Group membership details from AD to LDAP for each account). But beware that password authentication is not possible - you may have to simple perform Authorization only.
As for option #3, a CA server is not an authentication server and it cannot be used to validate credentials - that's the AD Domain Controller's job. Why would your customer give you network access to CA, but not to the AD Domain Controllers themselves. As @Mike.Cifelli mentioned, you interface with a CA for OSCP - but that's it. The OSCP response might only tell you that this client cert has not been revoked. But no details about AD membership.
01-31-2020 05:34 AM
01-31-2020 09:51 PM
02-01-2020 08:20 PM
Hello @raksec
Are you saying that the customer is using AD, but ISE will not be given access to their AD environment for AuthN/AuthZ purposes? Wow that's not great. What's the point of that? If you wanted to authenticate a network user with their AD creds then what better place to check than with AD ... failing that, what hope is there? None.
You could ask the customer to create you an Identity Database (e.g. a daily sync of the AD User tree and copy it into a standalone LDAP directory - this will shield the customer's AD from ISE. ISE simply uses LDAP - however, this is also fraught with issues because password authentication to LDAP won't work - but if the LDAP Store is done right, then you could use it to perform an AD Group lookup (you have to of course copy all the AD Group membership details from AD to LDAP for each account). But beware that password authentication is not possible - you may have to simple perform Authorization only.
As for option #3, a CA server is not an authentication server and it cannot be used to validate credentials - that's the AD Domain Controller's job. Why would your customer give you network access to CA, but not to the AD Domain Controllers themselves. As @Mike.Cifelli mentioned, you interface with a CA for OSCP - but that's it. The OSCP response might only tell you that this client cert has not been revoked. But no details about AD membership.
02-01-2020 09:37 PM
Hi Arne.
Sorry for the confusion here.
Customer is giving access to AD. But they are saying that in AD they have only user credentials, not machine credentials. So we won't have any problem validating user's credentials. That's why my questions are just to validate machine credentials and differentiate between corporate and personal machines. The machines could be dot1x or non-dot1x.
02-04-2020 03:31 AM
Hi @raksec
I am no AD guru, but I know that if a Windows machine is Domain Joined, then this means (and it HAS to mean) that during the joining of the AD Domain, the AD controller creates a machine account for the machine. You can search for the machine's hostname in AD and you'll find it.
if the machines are not domain joined, then I don't know what you mean by "machine credentials". In that case we're no longer talking about Microsoft Active Directory and Machine Authentication.
Some confusion ... needs clarity.
02-04-2020 03:44 AM
Hi Arne,
What you are saying that makes sense. I will double check with customer on AD and machine name.
Thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide