02-01-2021 09:06 AM
Hello,
Very new to Cisco IOS devices and AAA configurations. We currently have a PKI infrastructure, and are using NPS for radius authentication/authorization.
I've been tasked to change our baseline IOS configuration so that it can validate user pki certificate for authentication and then validate the user with the NPS server for authorization.
Currently we have some basic configuration like this:
aaa authentication login default group radius-server1 aaa authentication login console group radius-server1 aaa authorization console aaa authorization exec default group radius-server1
I've successfully gotten the certificate authentication to work with the following:
crypto pki trustpoint domain.local enrollment terminal revocation-check crl none revocation-check ocsp none authorization list CERT authorization username subjectname commonname ip ssh server certificate profile user trustpoint verify domain.local ip ssh server algorithm hostkey x509v3-ssh-rsa ip ssh server algorithm authentication publickey ip ssh server algorithm publickey x509v3-ssh-rsa aaa authorization network CERT none
For the life of me I cannot find a good example for SSH cert authentication/radius authorization. I've read numerous forum posts from people saying you can do cert authentication and then be prompted for username and password for radius authorization, but not concrete examples.
Any help with an example would be appreciated. Thank you
02-01-2021 09:29 AM
Very good question and thinking - i have not deployed and tested. but looking at the document durable.
Authorisation example with ISE- you can replace with NPS configuration here - ( appologies if i misguiding you here)
02-11-2021 05:42 AM
Hello,
Thanks for providing the article, it was helpful but only if I'm using TACACS+ and ISE. Unfortunately I'm trying to use radius.
I read here:
Cisco Content Hub - Configuring Authorization and Revocation of Certificates in a PKI
Under the section RADIUS or TACACS+ Choosing a AAA Server Protocol that if you create radius users with the default password cisco it might be possible.
Will test and update this post.
Thanks
02-11-2022 09:58 AM
I am trying to accomplish this exact same procedure. Were you able to successfully authorize through your AAA server?
02-11-2021 06:40 AM
Thank you for the input, that give more information all members of community, feedback the results will help.
08-26-2024 11:12 AM
any one success to do this ?
the BlastRadius will kill us those week
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide