04-10-2019 07:24 AM
Wondering if there is some experience out there with something I'm looking to accomplish related to BYOD and the ever changing security/audit requirements we face in the enterprise.
Problem: Corporate users currently connect to a 'Mobile' with direct PEAP authentication, subjecting their active directory credentials to interception (as noted during a recent security audit). There is no business purpose for this network, it's purely to allow employees to use the wireless network instead of their cell data. An internet only access policy would be plenty sufficient once a user is fully authenticated. We are on ISE 2.3 with no immediate plans to go up to 2.4 just yet but it is a possibility in the future.
The main priority for this revamp is to obscure those AD credentials in the initial logon process. This puts me a little at odds with regard to how best to move forward.
Single SSID: Certainly better from a UX perspective for people with Apple iOS devices, which naturally make up a significant portion of the landscape. However, according to the prescriptive setup guide it looks like the user would still be passing AD credentials as part of the initial authentication/association to the network. This provides the BYOD registration functionality we'd like, but doesn't really fix the problem of passing AD creds.
Dual SSID: Benefit being the AD creds are passed through an SSL secured portal page, as opposed to directly from the device. Downsides being the UX of manual SSID switching for apple iOS, unless that's been changed. Also would require some significant groundwork to convert our existing single SSID setup to multiple.
So, best case scenario, does anyone know if it's possible to use a single SSID method while obscuring the corporate credentials in transit? Or if not, any suggestions on how to handle such a situation?
04-10-2019 07:59 AM
04-10-2019 08:16 AM
That looks promising, but as an alternative is there any other way to accomplish this without the sponsor portion?
Personally I like the sponsored method, it puts responsibility and manager visibility on employees registering devices. But I guess I do have one more curveball to throw in, two separate situations:
1.) employee-owned device, no access to corporate resources, only needs internet
2.) employee-owned device, managed by Microsoft Intune, need access to corporate exchange 365
As simple as different authorization policies because ISE will recognize them, or more complex?
04-10-2019 09:03 AM
@jcatanzaro9 wrote:
That looks promising, but as an alternative is there any other way to accomplish this without the sponsor portion?
JAK> not that i know of. otherwise you're requiring some sort of trusted credentials... You could have some internal way to do it perhaps using API and creating internal ISE accounts?
Personally I like the sponsored method, it puts responsibility and manager visibility on employees registering devices. But I guess I do have one more curveball to throw in, two separate situations:
1.) employee-owned device, no access to corporate resources, only needs internet
2.) employee-owned device, managed by Microsoft Intune, need access to corporate exchange 365
JAK> you can do that right but then have to use AD creds? Or have them create their own guest credentials to use for internet only and then require them to onboard and redirect them to instructional page on how to do this?
As simple as different authorization policies because ISE will recognize them, or more complex?
04-10-2019 09:48 AM
How are you handling your normal guest users? Typically I use self-registering with sponsor approval. If you have a login process for guests you can also allow employees to log into that portal using their AD credentials to give them Internet access. For the employee mobile devices registered with Intune you can push certificates from your internal CA and do EAP-TLS authentication to the secure SSID and give them access to the Internet and Exchange.
04-10-2019 09:54 AM
Guest users go through the standard captive portal w/ sponsored accounts.
The 'mobile' network was created specifically in response to the complaint from employees that they had to enter guest credentials every day for their personal devices, so they now enter AD creds as part of authentication/association direct to the WLAN, which of course opens those credentials up to interception for an attacker with the right tools.
Having them login to that portal is no problem since the guest portal is already there, if it's as simple as using the 'Guest' SSID as my second SSID in a dual setup, employee logs in with AD creds then gets pushed the certs and profiles that works too. But wouldn't that still require manually switching SSID's for the Apple users? Or has that been fixed more recently?
04-10-2019 10:41 AM
04-10-2019 10:53 AM
04-10-2019 11:23 AM
And one further question, if we went this route would it be possible to allow them to stay on that single SSID setup but force the employees through the device onboarding for certs via the internal CA?
Meaning, employee joins Guest SSID, logs in with AD creds. Gets forced through onboarding, receives certs and profiles from ISE, and then they're good to go until the cert expiry as defined within ISE?
So we set the cert to 90 days, guaranteeing that the user will change their password sometime within those 90 days, but the cert will be valid even though the AD creds have changed. Once cert expires, user has to re-authenticate in the same manner (portal, pull certs etc.)
Four times a year doesn't seem too much of a burden to me. Add to that if they complain they're really complaining that we're making it inconvenient for them to browse social media on company time.
04-10-2019 11:58 AM
04-10-2019 11:30 AM
04-10-2019 11:40 AM - edited 04-10-2019 11:47 AM
Ok, I think I get you now. That's making more sense.
So, employee joins SSID, logs into portal for first time with AD creds. Gets redirected to my devices portal, self registers device which places the MAC in the Employee-BYOD endpoint ID group. Create purge policy to require re-registration periodically, accounting for password changes and the like, and then no worries about certs or anything else just strictly going off device MAC and endpoint validity.
How do the users then show up in the auth logs and on the WLC? Does ISE somehow push the user's identity to the WLC or is it only the MAC that shows up?
Spot on about PEAP and account lockouts. Happens all the time, getting rid of that would be a welcome bonus.
04-10-2019 12:45 PM
04-10-2019 02:22 PM
04-15-2019 11:30 AM
So this all makes sense to me, I've begun clicking around in my PAN and locating and building some of this out.
Question now is, how to I get it to where the employee logs into the portal with their AD creds, and is there a way to lock it down to a specific AD group for testing?
Am I configuring the authentication policy within my existing guest authentication policy set, or is there somewhere else to do this?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide