Security

last person joined: yesterday 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

Authorization Attributes and Policy Evaluation Cache

This thread has been viewed 11 times
  • 1.  Authorization Attributes and Policy Evaluation Cache

    Posted Nov 15, 2015 12:43 AM

    Running into a small issue with the authorization attributes and using them to do role mappings.

     

    ClearPass Version: 6.5.4.x

     

    The scenario:

    • A new domain joined laptop attempts to connect to our wireless for the first time. It is using MSCHAPv2.
    • Laptop is able to successfully authenticate. Upon successul authentication, it's endpoint profile is updated in the follows ways. It's status is set to "known" and an attribute is written in identifying which location it is from.
    • I then sign in on this laptop. As a user I also perform authentication against the wireless. My authentication is rejected because I am missing a role mapping.
    • I then go to the endpoints DB and clear the policy evaluation cache and attempt to reauthenticate. I am able to successful get connected to the wireless. I can also get connected if I allow the timer on the evaluation cache to timeout on it's own.

    Initially I thought the Policy Evalution cache was causing the issue. I noticed though that with my user authentication attempt the evaluation cache had been updated.

     

    What I did notice was that the Authorization Attributes are not completly updated. The "Status" attribute does not match the Endpoints DB.

    Role_Mapping_Issue_001.png

    I have a role mapping rule that looks at the following two attributes from the Endpoints db:

    • (Authorization:[Endpoints Repository]:Status  EQUALS  Known)
    • (Endpoint:[Corporate Asset]  EQUALS  USA) *Custom Attribute*

    If both these attributes are true then a role is assigned.

     

    When I looked at my authentication (user auth) attempt I can see the corporate asset attribute is computed, however, the Status still shows as "Unknown".

    When I check the Endpoints DB itself, it shows the status as "Known".

    Role_Mapping_Issue_003.png

    Role_Mapping_Issue_002.png

     

    I am assuming that the ClearPass is using a cache that was generated from the machines first attempt at authenticating, which is why the status is the only thing that isn't correct. Because at the time of the authentication, the endpoint's status hadn't been updated. It is weird though because on the Policy Evaluation cache tab, there is no mention of endpoint information. So I was assuming it was only caching roles. But it seems it caches more.

     

    Would this be the case?

    I can work around this, but I am just curious if anyway else has seen this behavior?

     

    Cheers



  • 2.  RE: Authorization Attributes and Policy Evaluation Cache

    Posted Nov 18, 2015 11:35 AM

    Have you tried amending the cache timeout value on the Endpoint Repository as below:

     

    Capture.JPG

     

    Sounds like the Authorisation attributes have been cached from the initial authentication request.

     



  • 3.  RE: Authorization Attributes and Policy Evaluation Cache

    Posted Nov 23, 2015 11:17 AM

    Sorry for my late response.

     

    Yes I suspect the samething is happening.

     

    I have never played around with the cache timeout value for the Endpoint Respository.

     

    Is there another recommended value that can be placed here?

     

     



  • 4.  RE: Authorization Attributes and Policy Evaluation Cache

    Posted Dec 26, 2015 06:46 AM

    i guess that mainly depends on your deployment. if you need low timeout you set it low, but that will mean more lookups and possibly more load.



  • 5.  RE: Authorization Attributes and Policy Evaluation Cache
    Best Answer

    Posted Dec 26, 2015 09:36 AM

    This makes sense.

     

    What I ended up doing was removing the requirement for "Known" device.

    I now just rely on the custom attribute that I apply to the endpoint profile.

     

    This seems to be working reliably.

     

    I think it is probably better I avoid adding to much additional load to the servers if it is not necessary.



  • 6.  RE: Authorization Attributes and Policy Evaluation Cache

    Posted Dec 26, 2015 10:38 AM

    good solution, i use that a lot also. better control.



  • 7.  RE: Authorization Attributes and Policy Evaluation Cache

    Posted Dec 26, 2015 10:50 AM

    Good to know!

    Always curious about how other people tackle the different challenges faced when dealing with wireless acccess.

     

    Cheers