Original Message:
Sent: Feb 18, 2025 05:47 PM
From: RVTO
Subject: 802.1X EAP-TLS + Jamf + Clearpass - Need some conceptual info.
Ok, as promised, I'll illustrate out our end scenario so that if other people have this kind of issue there is maybe at least a little better documentation on an integration of jamf with clearpass.
On the Jamf side, you have to have all the good SCEP server stuff all working, or whatever method you use to get the certificate on the macbook.
Then, you create a new configuration profile for the network.
For EAP-TLS you want to choose Computer level.
Then you need to make sure you have the certificate payloads in there. We have 3 of them in ours. The Root, an intermediate, and I am not sure why but another copy of the root. This part was done before I did my piece.
Then you have to set up the network payload. Give it an SSID, and I think you more than likely will want to disable MAC address randomization depending on your environment. With ours, it could really make things whack out due to the way our policies apply. Make sure to select WPA2 Enterprise, or if you're up there, maybe WPA3.
As you get down to EAP types, select TLS. I don't know if the username field is required, but, putting $COMPUTERNAME in there makes the logs on clearpass show the computer's name, so it is handy. For identity certificate, choose the SCEP proxy cert.
Then, it's important to click over to the TRUST tab as well. Here you can select under trusted certificates, the root, and the sub cert. Also, it is important to add under Trusted Server Certificate Names, add your clearpass server(s) hostname as it would appear on the certificate it uses. I found that all you get is timeouts unless you have this in there.
Save that network payload and in the SCEP payload you need your cert stuff filled in here as well. This part I didn't do, but, hopefully it will make sense to you when you get there.
That's what we needed on the Jamf side, Now for the Clearpass side. Checking your certificate store, you need to make sure your server certificate has the right CN= name that is what was just referenced in the above SCEP/Network payloads. i.e. if your clearpass server is Clearpass.yourcompany.com, then make sure you have that under trusted servers in jamf, and, you have that as the CN= in the subject for your clearpass server.
Original Message:
Sent: Feb 18, 2025 02:27 PM
From: RVTO
Subject: 802.1X EAP-TLS + Jamf + Clearpass - Need some conceptual info.
Ok, I'm going to provide a more complete explanation of the whole setup before I am done, but, I did just get it working. What I had to re-fix from all the stuff I tried is, on the Jamf side, I had to make the identity certificate the SCEP certificate, NOT the clearpass server certificate. And I did end up removing the RADSEC cert from the jamf side too just because I figured it wasn't needed. But I'll try to be more complete later so that others can use the info more effectively.
Original Message:
Sent: Feb 18, 2025 10:43 AM
From: RVTO
Subject: 802.1X EAP-TLS + Jamf + Clearpass - Need some conceptual info.
I might be closer, after trying this again. Here's the error I get when we try to connect:
Here's what's in computed attributes:
Original Message:
Sent: Feb 16, 2025 05:44 AM
From: lord
Subject: 802.1X EAP-TLS + Jamf + Clearpass - Need some conceptual info.
The [EAP TLS] method enforces authorization, i.e. it checks whether the user name exists in the specified Auth-Src. Authentication is rejected with the error message "User not found" if the user does not exist.
If no computer account exists for the Macbooks in the Windows domain, you have to duplicate the [EAP TLS] method and deactivate the "Authorization required" field.

You can only use one TLS Auth method in the service, i.e. if you check Windows computers for domain membership, you have to create a new service for the Macbooks.
------------------------------
Regards,
Waldemar
ACCX # 1377, ACEP, ACX - Network Security
If you find my answer useful, consider giving kudos and/or mark as solution
Original Message:
Sent: Feb 16, 2025 12:02 AM
From: shpat
Subject: 802.1X EAP-TLS + Jamf + Clearpass - Need some conceptual info.
Can you please post the failed message from Access Tracker? Please post all the Tabs from that event.
------------------------------
Shpat | ACEP | ACMP | ACCP | ACDP
Just an Aruba enthusiast and contributor by cases
If you find my comment helpful, KUDOS are appreciated.
Original Message:
Sent: Feb 15, 2025 02:48 PM
From: RVTO
Subject: 802.1X EAP-TLS + Jamf + Clearpass - Need some conceptual info.
Ok, I have already always had our Root and intermediate certs in that trust list, so that should be good. I think maybe I need to figure out what to put in the service, under "authentication sources" then. I'm guessing that I need to remove the 3 Active Directory
Right now my failed entries show that it fails when looking in the local user repository and 3 AD servers. So perhaps just getting those out of there and adding the proper source will be enough. I just need to know what that would be.
Thanks for the tips!
Original Message:
Sent: Feb 15, 2025 01:48 AM
From: shpat
Subject: 802.1X EAP-TLS + Jamf + Clearpass - Need some conceptual info.
In Clearpass you should go to Administration > Certificates > Trust List and place the ROOT certificate in the Trust List.
------------------------------
Shpat | ACEP | ACMP | ACCP | ACDP
Just an Aruba enthusiast and contributor by cases
If you find my comment helpful, KUDOS are appreciated.
Original Message:
Sent: Feb 14, 2025 02:36 PM
From: RVTO
Subject: 802.1X EAP-TLS + Jamf + Clearpass - Need some conceptual info.
We have been using 802.1x with Machine certificates issued by AD, with ClearPass and Windows machines for a couple years now. I understand the process that the windows machine joins the domain, get's a certificate, and then our clearpass servers are domain joined and can authenticate the machine with Active Directory using some of our various AD servers. All of that works well, and makes sense to me.
Now we're extending it to macbooks and adding Jamf, so that we can also set up certificates on the macbooks (they will not be domain joined) via SCEP/NDES integrated with our windows CA, with the goal of them also doing 802.1x with EAP-TLS.
So far, we have the SCEP process working fine, and the macbooks obtain their certificates from our CA via SCEP.
We also created a configuration profile in Jamf for our wifi network that has 1 SCEP payload, 1 Network payload, and not knowing which certs we needed, we our certificate payloads are currently our root, our NDES server, one called Sub Cert that I think is our root again (at the suggestion of Jamf), And then I added our ClearPass server certificate for RADIUS/EAP, and also just in case, the ClearPass RADSEC certificate. I'm not sure if all that is needed or if some aren't. In the network payload, I have our SCEP Proxy as the identity certificate. For "username" field, I have $COMPUTERNAME so that when it hits clearpass I see the computer name. Then on the trust tab, I have the "Trusted Server Certificates Name" set with our Clearpass certificate CN. I'm not really sure if all of this is proper, but, we did go from getting timeouts in the activity monitor on clearpass, to rejected authentications.
Now here's where my knowledge is falling real short and I need the guidance the most:
On the Clearpass side, our normal windows machines basically authenticate with an authentication method of "EAP-TLS", and the authentication sources are 3 of or domain controllers, and clearpass is joined to them in AD. That all makes sense.
But, when authenticating these Macbooks, I get failures because it can't authenticate via the domain controllers. That makes sense, because as far as I know, although our certificates are issued to the macbooks by our windows CA, since the macbooks aren't domain joined, it's not like our AD servers will HAVE knowledge of our certificates that get presented by the macbooks. So I'm trying to understand exactly what the Clearpass would look like, to do this authentication. Do I need to perhaps import our NDES cert into clearpass? I can see that being a possibility but then what would my "authentication source" be? It would have to be local somehow then, right? Or, am I supposed to be trying to get these non-domain macbooks' certificates somehow into AD so that when we bounce the auth off of our AD servers, it knows how to do that?
We're currently on 6.9.13, and are in the middle of renewal of our support contract. Once that's done, we'll be upgrading to 6.11, and at that point we can probably install the Jamf Clearpass connector, but I don't know if that's a required feature, or just gives some nice abilities.
Can anyone paint me a picture of what I'm really looking to do, on the Clearpass side, to get these authentications working, given the above? If I knew the concept well enough, I think I could move forward and maybe have some luck, but right now the clouds are just too thick to see what I'm looking to do.
Thanks for any guidance you can provide.