Security

 View Only
last person joined: 20 hours ago 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

Authentication based on machine AD membership.

This thread has been viewed 12 times
  • 1.  Authentication based on machine AD membership.

    Posted Dec 11, 2018 09:03 AM

    Hi, is it possible to map roles in clearpas to machines using 802.1X? I have computers in several groups in AD and i want to assign vlans basing on machine group membership (i need to use only machine based authentication).

     

    I have tried with role mapping witch condition:

    autohorization:Domain Controller | Groups | Equals | computer group name

    But it is not working - device always goes to default role.



  • 2.  RE: Authentication based on machine AD membership.

    Posted Dec 11, 2018 09:28 AM
    Are you using groups or OUs ?
    Go to Monitoring > Access Tracker and open one of the rejected machine auth logs entries and look at the input tab > authorization attributes

    That way you can see what AD attributes ClearPass is able to pickup
    Sent from Mail for Windows 10


  • 3.  RE: Authentication based on machine AD membership.

    Posted Dec 11, 2018 09:32 AM

    There is attribute 

    Authorization:lab_DC01:UserDN CN=PC01,CN=Computers,DC=lab,DC=local

    And it works when i specify this attribute as Group. But i need to authenticate all computers in AD group: CN=lab,OU=Grupy,DC=lab,DC=local. PC01 is in group lab.

     

    I can bypass role pammping using condition UserDN | ENDS_WITH | CN=Computers,DC=lab,DC=local but i is important for me to use groups instead of containers.

     



  • 4.  RE: Authentication based on machine AD membership.
    Best Answer