01-21-2025
07:00 PM
- last edited on
01-27-2025
02:54 AM
by
rupeshah
Dear Cisco Community,
We use ISE version 3.x both using LAN dot1x and VPN tunnel. ISE integration with AD for Authentication.
When user connect to VPN ( Cisco Secure Client ). It required to check AD user credential, PC certificate and OTP. It also check the Posture and policy we defined.
Is there another alternative solution to replace certificate with VPN? No require check certificate when user connect VPN.
If yes, how can we configure? Is it good practice or not? how about ISE security level?
If cannot do it, do we have the way to simplify from ISE admin / end users not challenge with certificate too much?
Thanks for update and supporting.
Solved! Go to Solution.
02-12-2025 01:09 AM
@Da ICS16 for the contractors (without a corporate device) you can create a different connection profile/tunnel group, this would be configured to use AD + OTP (not a certificate).
02-12-2025 12:39 AM - edited 02-12-2025 12:40 AM
Hello @Flavio Miranda @MHM Cisco World and Cisco Expert team.
Could you help to review and commend / advise whether is it possible to do it?
Please share your experience / solution to do it.
Thanks you.
02-12-2025 12:46 AM
@Da ICS16 If the VPN is using "AD user credential, PC certificate and OTP" then just using AD credentials AND OTP would be secure enough, so yes you could remove the requirement to user PC certificates.
The PC certificate authentication should be transparent to the users assuming the computer already has been issued with the certificate, this can be automated via Windows GPO. Requiring the use of a PC/machine certificate does ensure the computer the user is connecting from is a corporate issued device, so there maybe benefits of still using certificates.
02-12-2025 01:04 AM - edited 02-12-2025 01:07 AM
Dear @Rob Ingram ,
Thanks for your commend.
It works fine with our cooperated devices which join our domain + GPO.
Could you share your advise with vendor devices (not cooperated device) that connect our VPN. To not use our certificate and not join domain by using another layer solution like Microsoft Authentication App or else? When they use their PC just connect with Cisco Secure Client VPN agent, Ad user credential + OTP.
Thanks,
02-12-2025 01:09 AM
@Da ICS16 for the contractors (without a corporate device) you can create a different connection profile/tunnel group, this would be configured to use AD + OTP (not a certificate).
02-12-2025 01:15 AM
Thanks @Rob Ingram Could you share the Cisco docs / link URL please.
02-12-2025 02:00 AM
@Da ICS16 you just create an additional connection profile, select the authentication methods (AD + OTP) and specify a unique group URL or alias for the contractors to connect to.
02-21-2025 07:06 PM
02-21-2025 11:29 PM
02-24-2025 07:41 PM
Hello @Rob Ingram ,
Thanks for sharing the docs.
Beside of integration with DUO, do we have another solution MFA?
Thanks,
02-25-2025 12:19 AM
03-05-2025 02:22 AM - edited 03-05-2025 02:24 AM
Regarding to the link you shared, can we test with FMC/FTD instead of ASA? thanks.
03-05-2025 02:31 AM
@Da ICS16 yes, FTD managed by the FMC has the same functionality as the ASA.
02-12-2025 01:18 AM
Certificate life time is defined by network admin. You can stablish How long the certificate will be valid. For security reason, the life IS not recommended to be too long. Usually one year.
02-21-2025 07:07 PM
Hello @Flavio Miranda ,
Yes, we should consider the cert period as well.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide