Security

 View Only
last person joined: yesterday 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

Azure AD as ClearPass Authentication Source for TACACS+

This thread has been viewed 39 times
  • 1.  Azure AD as ClearPass Authentication Source for TACACS+

    Posted Jun 01, 2021 03:53 PM
    Hello,

    I am working on a NAC project where the client is migrating to MS Azure AD and Intune.
    At the moment, we successfully integrated ClearPass with Intune (trough Intune extension), and Azure AD for SSO with SAML and Guest Social login with OAuth2.

    Now we are trying to configure TACACS+ for secure login to network devices.
    Is there any other way to add Azure AD to ClearPass Authentication sources and use it for TACACS+ Auth source other than LDAPS (enabling MS Azure AD Domain Services)? Maybe with some Extension or API, using Oauth2 protocol?

    For example, similarly as it is done with the Intune, where you configure Authentication Source Type HTTP and point Base URL to Intune Extension IP.

    Thanks for any thoughts!



    ------------------------------
    Kestutis Viršilas
    ------------------------------


  • 2.  RE: Azure AD as ClearPass Authentication Source for TACACS+

    Posted Jun 01, 2021 04:09 PM
    You should use SSH public key authentication. Legacy authentication methods should never be used.

    ------------------------------
    Tim C
    ------------------------------



  • 3.  RE: Azure AD as ClearPass Authentication Source for TACACS+

    EMPLOYEE
    Posted Aug 19, 2021 12:47 AM
    Hi Tim,

    fully agree with your point, but there is always a BUT :) 

    Most customers use TACACS because they do not want to share and sync public keys among all of their devices and update them if access rights are changing or revoked. This is where TACACS came into play. With TACACS you can manage access rights through a central database without the need to touch every device if something is changing. 
    If we could combine public key and TACACS, this would be the best option at all. 
    What do you think?

    ------------------------------
    -------------------------------------------------------------------------------
    Florian Baaske
    -------------------------------------------------------------------------------
    Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or Aruba Networks.
    -------------------------------------------------------------------------------
    Also visit the AirHeads Youtube Channel:
    https://www.youtube.com/channel/UCFJCnuXFGfEbwEzfcgU_ERQ
    -------------------------------------------------------------------------------
    Feel free to visit my personal Blog
    https://www.flomain.de
    ------------------------------



  • 4.  RE: Azure AD as ClearPass Authentication Source for TACACS+

    Posted Aug 19, 2021 12:20 PM
    Then you should use SSH certificates.

    ------------------------------
    Tim C
    ------------------------------



  • 5.  RE: Azure AD as ClearPass Authentication Source for TACACS+

    EMPLOYEE
    Posted Aug 27, 2021 01:15 AM
    Wasn't aware that something like this exists but it is exactly what is needed to replace username/password auth in larger IT departments. Thanks for the hint.

    ------------------------------
    -------------------------------------------------------------------------------
    Florian Baaske
    -------------------------------------------------------------------------------
    Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or Aruba Networks.
    -------------------------------------------------------------------------------
    Also visit the AirHeads Youtube Channel:
    https://www.youtube.com/channel/UCFJCnuXFGfEbwEzfcgU_ERQ
    -------------------------------------------------------------------------------
    Feel free to visit my personal Blog
    https://www.flomain.de
    ------------------------------