cancel
Showing results for 
Search instead for 
Did you mean: 

NAC EAP-TLS + Microsoft PKI - custom subject/common name not possible

NAC EAP-TLS + Microsoft PKI - custom subject/common name not possible

AntonS
Contributor II
We have a working setup with Netsight/NAC + Microsoft Windows PKI 2012 R2
Our Clients get Certificates with Auto Enrollment, which they use to authenticate in the network.
Additionally we use LDAP User Groups to put the Clients into different Networks -> UserVLAN, AdminVLAN, InternetVLAN etc.
This works great, but we noticed a problem.
When using a non Windows Device it is possible to set a different Username/Identity that is sent to the Authentication Server.
This can be used to get into a different network than supposed to, if the Username/Identy is valid (eg. Admin)

613175a82d9e46b2bd79a46f60e511af_RackMultipart20180720-22629-vtp2y2-CaptureIphone1_inline.png



613175a82d9e46b2bd79a46f60e511af_RackMultipart20180720-121465-6c02gr-CaptureUSER1_inline.jpg



In another area we used RADIUS User Group to seperate those client families, but this is not possible here because in the certificate from User and Admin there is nothing different than the hostname.

We thought of writing something in the Subject/common name of the Certificate/Template in the PKI. But we don't know how this can be achieved since there is no possibility to write CUSTOM Information.

613175a82d9e46b2bd79a46f60e511af_RackMultipart20180720-123696-i3blh5-CaptureTemplate1_inline.jpg



Any MCSE knows how to deal with that? 😉

11 REPLIES 11

StephanH
Valued Contributor III
Hello Anton,

if you can write differen SANs (subject alt name) in the certificate you can use this as criteria.
If you can't do this with your certificate template on the Windows CA you can create a new template (enterprise server needed!) with SAN as attribute.

If this is not possible. You export the serial from Windows CA and import again in the NAC I think.
But therefore you have to dig deeper into the Windows Certificate command line.

Regards Stephan

AntonS
Contributor II
hy stephan,

i know that article. we also used TLS-fields in RADIUS User Groups for other devices/areas
but in that case there is no TLS-field we can use, because the certificates are mostly the same.
except hostname/dns name, but i cannot build a rule from that

for example hostname1 is ADMIN hostname2 is USER

i thought to write in the subject of ther certificate hostname1-ADMIN so I can make a RADIUS User Group *-Admin

StephanH
Valued Contributor III
Anton,

if you need the CN as username read that:

https://gtacknowledge.extremenetworks.com/articles/How_To/Configure-NAC-To-Use-The-TLS-Client-Certif...

Best regards
Stephan
Regards Stephan

StephanH
Valued Contributor III
Hello Anton,

I think that article should help:

https://gtacknowledge.extremenetworks.com/articles/Solution/Using-TLS-Certificate-fields-for-authent...

Best regards
Stephan
Regards Stephan

Brian_Holmes
New Contributor III
I am not familure with Netsight, but on Identity Engines this could be written as part of the Authorization rule I believe.
GTM-P2G8KFN