<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: rfs6000 configuration with samba4 AD ntlm auth for radius in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-configuration-with-samba4-ad-ntlm-auth-for-radius/m-p/56529#M3967</link>
    <description>Hi,&lt;BR /&gt;
you don't need the break.&lt;BR /&gt;
&lt;BR /&gt;
Signed server certificate -&amp;gt; certificate for your server&lt;BR /&gt;
Intermediate CA -&amp;gt; certificate from the intermediate&lt;BR /&gt;
Root CA -&amp;gt; certificate from the Root&lt;BR /&gt;
&lt;BR /&gt;
Are you familiar with PKI? Inside a company you mostly have a offline root CA and a active intermediate CA. The intermediate is signed by the root and your server certificate by the intermediate. Based on this, you include the complete key chain.&lt;BR /&gt;
&lt;BR /&gt;
This community for example use this key chain:&lt;BR /&gt;
DigiCert High Assurance EV Root CA-&amp;gt; DigiCert SHA2 High Assurance Server CA&lt;BR /&gt;
--&amp;gt; community.extremenetworks.com&lt;BR /&gt;</description>
    <pubDate>Mon, 26 Mar 2018 11:50:00 GMT</pubDate>
    <dc:creator>Timo1</dc:creator>
    <dc:date>2018-03-26T11:50:00Z</dc:date>
    <item>
      <title>rfs6000 configuration with samba4 AD ntlm auth for radius</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-configuration-with-samba4-ad-ntlm-auth-for-radius/m-p/56526#M3964</link>
      <description>Hi folks,&lt;BR /&gt;
&lt;BR /&gt;
We have a rfs6000 controller that we are trying to set up radius access with samba4 AD. The "controller" has joined the AD and at the beginning is ok. What we are having problems with and part of the certificates. How to generate the CSR and sign it internally for client authentication to work with your AD credentials? How to proceed?</description>
      <pubDate>Fri, 23 Mar 2018 02:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-configuration-with-samba4-ad-ntlm-auth-for-radius/m-p/56526#M3964</guid>
      <dc:creator>Elias_Morais_Pe</dc:creator>
      <dc:date>2018-03-23T02:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: rfs6000 configuration with samba4 AD ntlm auth for radius</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-configuration-with-samba4-ad-ntlm-auth-for-radius/m-p/56527#M3965</link>
      <description>Do you use the internal AAA from the RFS? The AD connection already run and you just need a valid cert?&lt;BR /&gt;
&lt;BR /&gt;
For that case, you can check this link:&lt;BR /&gt;
&lt;A href="https://extremeportal.force.com/ExtrArticleDetail?n=000014936" target="_blank" rel="nofollow noreferrer noopener"&gt;https://extremeportal.force.com/ExtrArticleDetail?n=000014936&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 23 Mar 2018 14:27:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-configuration-with-samba4-ad-ntlm-auth-for-radius/m-p/56527#M3965</guid>
      <dc:creator>Timo1</dc:creator>
      <dc:date>2018-03-23T14:27:00Z</dc:date>
    </item>
    <item>
      <title>RE: rfs6000 configuration with samba4 AD ntlm auth for radius</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-configuration-with-samba4-ad-ntlm-auth-for-radius/m-p/56528#M3966</link>
      <description>Hey Timo, thanks for the answer!!&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;Do you use the internal AAA from the RFS? &lt;/BLOCKQUOTE&gt;Yes.&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;The AD connection already run and you just need a valid cert?&lt;BR /&gt;
 &lt;/BLOCKQUOTE&gt;Yes.&lt;BR /&gt;
&lt;BR /&gt;
In the link you posted, the first option for configuring certificates looks like this:&lt;BR /&gt;
&lt;BR /&gt;
-----BEGIN CERTIFICATE ----- (Signed server certificate) -----END CERTIFICATE -------    -----BEGIN CERTIFICATE ----- (Intermediate CA certificate 1) -----END CERTIFICATE ------- -----BEGIN CERTIFICATE ----- (Intermediate CA certificate 2) -----END CERTIFICATE ------- -----BEGIN CERTIFICATE ----- (Root CA certificate)  -----END CERTIFICATE -------Do I need to have these two line breaks between the &lt;B&gt;signed server certificate&lt;/B&gt; and the &lt;B&gt;intermediate ca&lt;/B&gt;...?&lt;BR /&gt;
&lt;BR /&gt;
Would the &lt;B&gt;Signed server certificate&lt;/B&gt; be the certificate that, for example, GlobalSign provided?</description>
      <pubDate>Fri, 23 Mar 2018 19:05:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-configuration-with-samba4-ad-ntlm-auth-for-radius/m-p/56528#M3966</guid>
      <dc:creator>Elias_Morais_Pe</dc:creator>
      <dc:date>2018-03-23T19:05:00Z</dc:date>
    </item>
    <item>
      <title>RE: rfs6000 configuration with samba4 AD ntlm auth for radius</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-configuration-with-samba4-ad-ntlm-auth-for-radius/m-p/56529#M3967</link>
      <description>Hi,&lt;BR /&gt;
you don't need the break.&lt;BR /&gt;
&lt;BR /&gt;
Signed server certificate -&amp;gt; certificate for your server&lt;BR /&gt;
Intermediate CA -&amp;gt; certificate from the intermediate&lt;BR /&gt;
Root CA -&amp;gt; certificate from the Root&lt;BR /&gt;
&lt;BR /&gt;
Are you familiar with PKI? Inside a company you mostly have a offline root CA and a active intermediate CA. The intermediate is signed by the root and your server certificate by the intermediate. Based on this, you include the complete key chain.&lt;BR /&gt;
&lt;BR /&gt;
This community for example use this key chain:&lt;BR /&gt;
DigiCert High Assurance EV Root CA-&amp;gt; DigiCert SHA2 High Assurance Server CA&lt;BR /&gt;
--&amp;gt; community.extremenetworks.com&lt;BR /&gt;</description>
      <pubDate>Mon, 26 Mar 2018 11:50:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-configuration-with-samba4-ad-ntlm-auth-for-radius/m-p/56529#M3967</guid>
      <dc:creator>Timo1</dc:creator>
      <dc:date>2018-03-26T11:50:00Z</dc:date>
    </item>
  </channel>
</rss>

