09-19-2017 06:07 AM
I am deploying ISE 2.2 for a client and we are using AnyConnect NAM for both machine and user authentication. Unfortunately we hit this bug: CSCuw01496
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuw01496/?referring_site=bugquickviewredir
The Microsoft support KB is no longer available on Microsoft site.
The available solution was to do the following:
HKEY_LOCAL_MACHINESystemCurrentControlSetControlLsa
.The registry edit worked but the customer don't want to do registry edit.
Is there no other way around this bug apart from registry edit?
Solved! Go to Solution.
09-20-2017 11:28 AM
The other workaround, if applicable, is to use certificate auth instead of passwords.
09-20-2017 11:28 AM
The other workaround, if applicable, is to use certificate auth instead of passwords.
05-21-2020 12:46 AM
10-28-2020 07:31 PM
Microsoft support has informed that making this change will effectively make a hole in protecting the credentials.
Stated, :"kindly be informed that create and change registry key LsaAllowReturningUnencryptedSecrets to 1 will opens a hole in credential protection to allow application compatibility so applications (and yes attackers) can extract device secrets in clear text. This behavior is by design and improves protection of the LSA secret. Therefore we need to make it clear that they are opening a credential theft vector. Organizations concerned about credential theft attacks also known as pass-the-hash attacks, should understand that deploying this registry key makes it easy for attackers to steal the domain-joined device's clear-text password. "
Apart from using the machine certificate, do we have an alternative?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide