10-27-2022 03:01 PM
Hi Guys,
We want implement a WLAN with 802.1x certificate based client authentication. I am following the document Understand and Configure EAP-TLS with a WLC and ISE , but is there a way to automatically install the certificate on the client machines without having to go manually to each? Like for example, the clients downloading the certificate form the ISE.
Thanks for your support.
Regards,
10-27-2022 03:10 PM
If all the clients are part of the domain, you can deploy the certificate using a GPO. https://learn.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/distribute-certificates-to-client-computers-by-using-group-policy#:~:text=To%20distribute%20certificates%20to%20client%20computers%20by%20using%20Group%20Policy
If you have non-domain devices, then you need to deploy it using a MDM solution. Explore your MDM vendor for more info on how to do.
Certificates Payload (Pushing Certificates) - Cisco Meraki
Create trusted certificate profiles in Microsoft Intune | Microsoft Learn
Certificate Management | ManageEngine Mobile Device Manager Plus
10-27-2022 05:38 PM
What Arshad said. Other options look at securew2.com if you need a managed PKI environment to do this
02-23-2023 10:58 AM
Ok. Thanks for the suggestion.
With respect to the already installed certificates on the ISE from factory, will these work for 802.1x client authentication?
Thanks again.
Regards,
02-23-2023 03:09 PM
I think you need to at least have domain services and pki in your environment to successfully do this. The client along with the radius has to trust the certty chain. You can always try and use whatever cert you are using on ISE for EAP, but you will have to then upload the chain to the device cert store, manually setup the profile etc. Then you will have to figure out the policy to get all that to work.
You didnt provide if you have a domain you are using, is GPO possible, do you have a CA, what is your radius server and are you currently doing PEAP?
02-23-2023 03:56 PM
02-23-2023 06:18 PM
For your PoC, you should validate that certificates (user or computer) are pushed to each domain joined machine. Then your ISE should have a certificate installed from your CA (device, intermediates, and root) and make sure that cert is imported and used for EAP. This helps with the two way trust. Then you would push out a wireless profile via GPO for your test SSID and configure the policies in ISEe to authenticate the user/device cert.
Take a look at some guides and blogs on ISE using EAP-TLS and that will help with the steps you need to perform for your PoC.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide