We recently came across this issue when we decided to offer eduroam as our primary secure network. Eduroam works by using the fully qualified username to route authentication requests to the correct home institution. We wanted to maintain machine authentication so users could do an initial login with AD credentials and also for group policy and updates.
An example of a normal eduroam user authentication would be: email@example.com.
An example of a machine authentication would be: host/cappalli-xps13.brandeis.edu.
There are two issues with machine authentication with eduroam. The first being that the machine username is not formatted correctly for eduroam. The second issue is that when the computer switches to user authentication after logon, Windows sends credentials in the REALM\username format (USERS\cappalli). This is not valid for eduroam.
The fix below solves two things:
1) It allows you to maintain machine authentication locally on campus. When users are visiting another university, machine authentication will fail and user authentication will be attempted (and should pass).
2) After logging in for the first time, prompt the user to enter valid eduroam credentials (firstname.lastname@example.org). These credentials will then be saved with the profile and only need to be entered again if their password changes.
CLEARPASS SERVICE CONFIGURATION
WINDOWS CLIENT CONFIGURATION
The client can be configured 3 different ways:
GROUP POLICY1) In your group policy object, navigate to:
Computer Configuration > Policies > Windows Settings > Security Settings > Wireless Network (IEEE 802.11) Policies
2) Right click and select Create a new wireless network policy.
3) Assign the policy a name such as "Brandeis eduroam"
4) Click the Add button and select Infrastructure
5) Assign the name eduroam to the profile and add eduroam to the SSID list. You might want to also uncheck "Connect to a more preferred network if available"
6) Next head over to the Security tab. This should look identical to the client-side supplicant configuration in Windows. 7) First, make sure the Authentication Mode is set to User or Computer authentication. Then click the Properties button next to the network authentication method drop-down.
8) Select the Certificate Authority that signed your RADIUS server certificates and add in your server names to the "Connect to these servers" box. (Use AddTrust if you use InCommon). Next click Configure next to "Select Authentication Method".
9) Uncheck "Automatically use my Windows logon name and password (and domain if any)". This will force Windows to prompt the user for credentials after the first logon.
10) Link your GPO to the appropriate OU's or security groups.
Use the settings starting from step 7 to create your profile in the QuickConnect wizard (quickconnect.arubanetworks.com)
Use the same settings starting from step 7 of the group policy config to manually configure a client.
Still an excellent guide! I'm setting this up at a local school (using eduroam and windows 10 domain joined laptops) but am running into the problem that the user credentials just aren't being saved as mentioned in point 2 in your guide "After logging in for the first time, prompt the user ....". It seems like the profile is read-only on the local laptop.
We manually configured the settings on the laptop and then all seems to work fine. However, when we disable "Connect automatically" by removing the checkmark when trying to connect to eduroam, we also break the Machine Authetication functionallity. Any thoughts what I'm missing or how to resolve this issue?
Thanks cappalli for your detailed layout. We are in the testing portion on Windows and MAC's to do both machine auth and user auth. We went down a slightly different path with the services and enforcement.
Windows works great. The MAC not so much. Looks like there is additonal work that has to be done on the MAC side with setting up profiles. (will put more info out on this topic later)
We are to the point where AD does not see MAC requesting auth. Clearpass and the controller have already passed and the MAC is put in the proper role. The MAC will sit there and eventually time out.
Any thoughts on the MAC machines profiles??
At Aruba, we believe that the most dynamic customer experiences happen at the Edge. Our mission is to deliver innovative solutions that harness data at the Edge to drive powerful business outcomes.
© Copyright 2021 Hewlett Packard Enterprise Development LPAll Rights Reserved.