Security

last person joined: 10 hours ago 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

Clearpass EAP-TLS with ADCS configuration help

This thread has been viewed 11 times
  • 1.  Clearpass EAP-TLS with ADCS configuration help

    Posted Jan 26, 2017 03:28 PM

    Hello everyone, 

     

    I am testing EAP-TLS authentication using Active Directory as the authentication source. basically what I want to achive is:

     

    1. If a device connects using a wired or wireless DOT1x, I need to authenticate/validate only the Certificate (ADCS) and allow access.

     

    I dont need to check the username or password only the Cert, I followed the steps in one technical doc called ""ADCS wtih ClearPass onBoard". exact same configuration on the WIndows Active directory side, also imported the Root CA to the trusted list on the ClearPass and the root CA to the Client WIndows PC, I always get these error messages, did I miss a step maybe? SSLClient.JPG

    SSL.JPG

     



  • 2.  RE: Clearpass EAP-TLS with ADCS configuration help

    EMPLOYEE
    Posted Jan 26, 2017 03:46 PM
    your error means the client does not have the clearpass server certificate in its trust store. The client still needs to trust CPPM.


  • 3.  RE: Clearpass EAP-TLS with ADCS configuration help

    Posted Jan 26, 2017 04:03 PM

    I imported the RADIUS Server certificate and the HTTPS Server certificate, and I'm always getting the message



  • 4.  RE: Clearpass EAP-TLS with ADCS configuration help

    EMPLOYEE
    Posted Jan 26, 2017 04:08 PM
    so if you look at your screen shots you will see. "EAP-TLS: fatal alert by client" which means the client doesn't trust the cert being presenting by the server. on the second screen shot it shows fatal alert by server. which means the opposite. your server does not trust the CA that has signed the clients cert.

    You have to go through and double check the trust list on both.


  • 5.  RE: Clearpass EAP-TLS with ADCS configuration help

    EMPLOYEE
    Posted Jan 26, 2017 04:10 PM
    it also might mean that you dont have the full trust chain in the cert you imported into clearpass. You will need to have all. Root CA, intermediate, etc


  • 6.  RE: Clearpass EAP-TLS with ADCS configuration help

    Posted Jan 26, 2017 04:14 PM

    Thanks, I will check that and post the results.



  • 7.  RE: Clearpass EAP-TLS with ADCS configuration help

    Posted Jan 31, 2017 09:09 AM

    Is there a way to use Only ClearPass to Validate the client Certificate and the Server certificate without using the Authentication source (Active Directory)?, in other words is possible to use EAP-TLS Client-ClearPass and then if the client has a valid certificate send Login Status ACCEPT



  • 8.  RE: Clearpass EAP-TLS with ADCS configuration help

    EMPLOYEE
    Posted Jan 31, 2017 09:14 AM
    Yes. You would need to create a new EAP-TLS method and disable authorization.


  • 9.  RE: Clearpass EAP-TLS with ADCS configuration help

    Posted Jan 31, 2017 09:26 AM

    SO the steps will be:

    1. Import the Root CA from the Active directory server to the trust list in ClearPass.

    2. Create a new EAP-TLS authentication method (Do I need to choose  anithing in the Certificate Comparasion?)TLS.JPG

    3. Create the service and choose the new authentication Method

    auth.JPG

    4. Create a valid client certificate and import it to the client.

     

    Am I missing any steps ?

     

     

     



  • 10.  RE: Clearpass EAP-TLS with ADCS configuration help

    EMPLOYEE
    Posted Feb 27, 2017 08:04 AM

    In step 3 you need to put an authentication source in. If you just put in the Local User Repository or the Endpoint Repository, it will be fine. They will not be used, but need to be in for ClearPass to accept the configuration.

     

    For Onboarding, the recommended method in most cases is to use the ClearPass Onboard built-in CA as a Root CA, and avoid any links with other (Enterprise) PKI. First reason is that it is much easier to setup, quicker with fewer dependencies which make it more reliable (in most cases). Second reason is that you don't risk inadvertently trust for certificates that are issued by ClearPass Onboard by keeping the PKI completely separated. Please only use integration with other PKI if you understand the implications and need specific features delivered by that integration.