08-20-2012 11:15 PM - edited 03-10-2019 07:26 PM
Hi
Is there any way to use machine + user auth at same time when authenticating Windows machine through ISE. In Windows native supplicant there is option as
1) Machine OR user Auth
2) User Authentication
3) Machine Authentication
4) Guest authentication
I want to give more priveledge access to endpoints where they are joined to AD domain AND the user is logged in using AD credentials.
Is there any way to achieve this functionality ...
Solved! Go to Solution.
08-23-2012 12:15 AM
There is one way to achieve Machine+User authentication through ISE.
Prerequisites: For windows 7 machine, please select “User or computer Authentication “ in authentication method ( Not applicable to Windows Xp)
You need to create two rules in Authorization policy as below
1st Rule :
iselabin.local:ExternalGroups==Domain Computers
With the 1st rule , machine will get authorized access when machine boots up ( Before user enters his credentials)
2nd Rule:
Network Access:WasMachineAuthenticated ==True
AND
iselabin.local:ExternalGroups==Domain Users
User will enter credentials and he will get authorized access because of 2nd Rule.Please find attached screenshot
I hope it answers your query
Neelesh Marathe
SecurView Systems
08-21-2012 03:33 PM
With windows you do not have the option, however with ISE 1.1.1 and the latest cisco anyconnect nam supplicant (which is free) has a feature called eap chaining, it uses eap-fast to send the authentication sequence just as you want.
Here is the reference:
ISE release notes
http://www.cisco.com/en/US/docs/security/ise/1.1.1/release_notes/ise111_rn.html#wp307279
Anyconnect release notes
Configuration of anyconnect -
Tarik Admani
*Please rate helpful posts*
08-23-2012 12:15 AM
There is one way to achieve Machine+User authentication through ISE.
Prerequisites: For windows 7 machine, please select “User or computer Authentication “ in authentication method ( Not applicable to Windows Xp)
You need to create two rules in Authorization policy as below
1st Rule :
iselabin.local:ExternalGroups==Domain Computers
With the 1st rule , machine will get authorized access when machine boots up ( Before user enters his credentials)
2nd Rule:
Network Access:WasMachineAuthenticated ==True
AND
iselabin.local:ExternalGroups==Domain Users
User will enter credentials and he will get authorized access because of 2nd Rule.Please find attached screenshot
I hope it answers your query
Neelesh Marathe
SecurView Systems
08-23-2012 12:22 AM
Thanks Neelesh. That is very helpful.
09-05-2012 03:41 AM
I have tested solution what Neelesh has suggested. I just want to confirm it is not related to MAR (Machine Access Restriction ).. I have enabled/disbaled MAR from ISE from external Identity source - AD - advance setting. but it seems that MAR does not play any role for above authorization policies...
Any thoughts on this...
09-05-2012 08:23 AM
Hi,
There is a new feature in ise 1.1.1 and cisco anyconnect network access manager called eap chaining. What this does it allows you send both the machine and user authentication request in a single eap transaction. There is a new attribute called eapchaining and I am sure that will provide the results you are after. However, there is a bug that is open that will place you in a posturing loop, but if you are just performing authentication at the moment please take a look at this feature:
http://www.cisco.com/en/US/docs/security/ise/1.1.1/release_notes/ise111_rn.html#wp307279
Tarik Admani
*Please rate helpful posts*
11-10-2012 12:33 PM
Hi Paraq,
How did you achieve this (AD domain AND the user is logged in using AD credentials) as I have same requirement. Could you please share your experience with me.
My requirement is, I am xyz company employee having company laptop as well as my personal laptop. Both need to be authenticated through AD credentials but should go to different authorization profiles (company asset & non company asset). How to achieve this. Please help
Awaiting for your positive & prompt response.
Thanks
11-12-2012 03:02 PM
Hi,
as Tarik mentioned. With help of EAP-Chaining you can do this. There is a policy condition for this - EAP-Chaining machine succeeded, user suceeded which can match company assets and aditional rule can be machine failed, user succeeded which can go to different VLAN, ACL ....
K.
08-30-2019 06:14 AM
Hi,
For sure your procedure is working but there is a problem on it.
I have tested it.
During bootup, let us says the Endpoint authenticates successfully (maybe through AD) and got temporary access.
After user credentials u got full access.
When u are trying to a RDP with a local account which is allowed because it is a non domain user, you connect to local machine and you got Endpoint credentials because on RDP endpoint authentication information are sent to the ISE not USER.
How to resolve that issue ? It is a serious problem !!!
Matt
11-20-2019 01:35 PM
Neelesh,
What will happen when user switches from Wired connection to Wireless connection, will ISE keep track of Machine authentication which happened over wired connection or does user need to log out and log back in every time they switch between wired and wireless connection?
11-20-2019 02:25 PM
12-06-2019 04:04 PM
Hello Sir,
I would like to confirm if the prerequisite is only windows 7 or it works with windows 10 machine also
11-20-2019 07:41 AM
Does the Windows native supplicant support EAP-TEAP? or will it be supported in a near future?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide