10-17-2017 06:15 AM - edited 02-21-2020 10:36 AM
Hi
Current setup:
Anyconnect clients establish VPN tunnels to an ASA and are authenticated using an OTP server and AD (primary and secondary configuration under the connection profile). For AD, the ASA sends the authentication request to ISE which is integrated with AD. Clients are associated to different group-policies depending on which AD group they belong to.
We would like to add machine authentication to this, is is possible to additionally check that the client machine is also present and active in AD?
Kind Regards
Solved! Go to Solution.
10-19-2017 06:48 AM
10-19-2017 06:48 AM
10-20-2017 01:29 AM
Thanks for your reply Rahul.
We had already tested the ASA posture / registry key option which worked fine.
My customer asked the question, so I just wanted to make sure I wasn't missing an option that could be used.
Kind Regards
Terry
10-16-2018 10:15 PM
Hi @Rahul Govindan, i tried to search over the internet about VPN 802.1x for machine certificate authentication then I saw this post. Can you provide me a link that tells that 802.1x VPN with machine certificate authentication is unsupported? thanks
10-17-2018 05:11 AM
@fatalXerror: VPN does not use 802.1x. The machine credentials I was referring to was the credentials the machine uses for 802.1x prior to user login (created when machine joins the domain). You can definitely do client certificate authentication using machine certs with the ASA and AnyConnect VPN client.
01-19-2023 06:39 PM
is there any similar solution for MAC computer?
01-20-2023 07:48 AM
What do you mean? This thread addresses that 802.1X is not used on Remote Access VPN. What are you trying to accomplish? MacOS has no concept of a "Machine Account"
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide