User and Machine Certificate Authentication using EAP-TLS
User and Machine Certificate Configuration in Cisco ISE:
Step1:
Create Certificate Authentication profile:
Under Identity Store use AD1 (Active directory) or Not Applicable
-Basic certificate checking does not require an Identity store
-When an AD1 is selected all subject names in a certificate can be used to lookup a user.
Use Identity From:
Certificate Attribute: select Common Name (CN)
-This Username will be used for AD lookup and also in ISE Logs.
Any other subject or Alternative Name Attribute:
-All other subject names and alternative names in a certificate will be tried when looking up a user.
The Active directory implicit UPN(User principle name) will be used as username for logs.
Note:it is only available if AD1 is selected as Identity store.
Match Client Certificate Against Certificate in Identity Store:
-For Binary Comparison of certificates (AD or LDAP) must be selected.
-If AD1 is selected then we can also use only to resolve ambiguity during lookup.
Machine Certificate Profile:
Create Authentication and Authorization rules under > policy sets as shown below:
Create a condition If it matches Radius:User-Name STARTS WITH host/
Under Authentication Policy use the Certificate authentication Profile which was created in Step1 Machine Certificate Profile
In Authorization policy we are permitting all other traffic.
Step3: User certificate Policy Sets
Create Authentication and Authorization rules under > policy sets as shown below:
Create a condition If it matches All WLC's OR Radius:Called-Station-ID ENDS WITH <SSID NAME>
Under Authentication Policy use the Certificate authentication Profile which was created in Step1
User Certificate Profile.
In Authorization policy we are permitting all other traffic.
Step4:-
Under Administration>System>Certificates>system Certificates:
Make sure you have a certificate issued by any of your Internal Root CA, and select "EAP Authentication"
This Root CA has to be present in All Clients PC's>Trusted Root CA's.
Step5:-
Under Administration>System>Certificates>Trusted Certificates:
Import All Root and intermediate certificates over here and check following options
"Trust for client authentication and Syslog"
"Trust for authentication of Cisco Services"
Step6:-
PC wireless NIC card settings:
For User Certificate use Below Settings:-
For Machine Certificate use Below Settings: