Security

 View Only
  • 1.  Clearpass cloud pki get timeout

    Posted Mar 19, 2025 05:57 AM

    Hey, I been trying to enforce a pc the 802.1x authentication (eap-tls) with certificates that I deploy on the pc through intune and cloudpki, the certificates (personal,trusted root) are on the pc but when trying to authenticate using them it fails and I see in the clearpass "client did not complete eap transaction".

    I have the root ca and intermediate ca in the clearpass trusted list, I have no idea what could be the issue.

    And when I try with certificates that i created localy from onprem ca and manualy put the certificate on the pc, it working.

    Happy for suggestions



  • 2.  RE: Clearpass cloud pki get timeout

    Posted Mar 19, 2025 06:16 AM

    Hey,

    It sounds like you're hitting a snag with EAP-TLS authentication using certificates deployed via Intune and CloudPKI, while certificates from your on-premises CA work fine. The "client did not complete EAP transaction" error in ClearPass often points to a breakdown in the EAP-TLS handshake, and since your locally generated certificates work, the issue likely lies in how the CloudPKI certificates are being issued, configured, or trusted. Let's break this down step-by-step to pinpoint the problem.

    First, since the certificates (personal and trusted root) are showing up on the PC, deployment via Intune seems to be working. However, the failure during authentication suggests the client (PC) or ClearPass isn't happy with something in the certificate chain or the TLS negotiation. The fact that on-premises CA certificates work is a big clue-there's likely a difference in the certificate properties or the trust setup between the two scenarios.

    One common culprit is the certificate itself. EAP-TLS requires the client certificate to have specific attributes, like the correct Enhanced Key Usage (EKU) for client authentication (OID 1.3.6.1.5.5.7.3.2). If CloudPKI isn't setting this properly, the handshake could fail. Check the personal certificate on the PC deployed via Intune-open it in the Windows Certificate Manager (certmgr.msc), go to the Details tab, and look at the EKU field. Compare it to the working on-premises certificate. If the CloudPKI cert is missing this or has an unexpected EKU, that could be the issue.

    Next, consider the Subject Name or Subject Alternative Name (SAN) in the certificate. ClearPass might be expecting a specific format (e.g., hostname, device ID, or UPN) to match its policy rules. If Intune/CloudPKI is generating a certificate with a different naming convention than your on-premises CA, ClearPass might reject it or the client might not present it correctly. Again, compare the Subject and SAN fields between the two certificates.

    The trust chain is another area to dig into. You mentioned the root CA and intermediate CA are in ClearPass's trusted list-double-check that they're enabled and that the exact same root and intermediate certs deployed to the PC match what's in ClearPass. Even a slight mismatch (different issuance date, serial number, or version) can break trust. Export the root and intermediate certs from the PC (via certmgr.msc) and compare their thumbprints to what's in ClearPass under Administration > Certificates > Trust List. Also, ensure the intermediate CA is properly chained-sometimes CloudPKI setups miss including the intermediate in the client's certificate store or the chain isn't sent during the handshake.

    Speaking of the handshake, the client might not trust ClearPass's RADIUS certificate. Even though you're focused on client auth, EAP-TLS is mutual-ClearPass presents its cert to the PC too. If the PC doesn't trust it (e.g., missing the RADIUS server's issuing CA in the PC's Trusted Root store), the client could abort the transaction. When you used the on-premises CA, the PC likely already trusted the entire chain from prior config. Check the ClearPass RADIUS cert (under Administration > Certificates > Server Certificate) and ensure its issuing CA is in the PC's Trusted Root store when using CloudPKI.

    TLS version mismatch is another possibility. Windows defaults to negotiating the highest TLS version supported (often 1.2 or 1.3), but ClearPass or your network gear might be stuck on an older version (like 1.0 or 1.1) or vice versa. The on-premises setup might have aligned versions by chance. You can test this by forcing the PC to use TLS 1.2 (via registry: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\PPP\EAP\13, add DWORD TlsVersion = 0xC0, then reboot) and see if it changes the behavior.

    Finally, peek at the ClearPass logs for more detail. In Monitoring > Live Monitoring > Access Tracker, find a failed attempt, click it, and check the logs tab at the bottom. Look for specific errors like "TLS handshake failed," "certificate rejected," or timeout codes (e.g., 9002). This can narrow down whether it's a client-side issue (e.g., not sending the cert) or a server-side rejection.

    Since the on-premises certs work, a quick test could be to mimic that setup with CloudPKI-match the EKU, SAN, and chain as closely as possible in Intune's certificate profile. If that still fails, packet capture the handshake (Wireshark on the PC, filter for EAP) and look at the Client Hello and Server Hello to see where it drops-certificate issues often show up as an "Alert" message from the client.

    My gut says it's either an EKU mismatch or a trust issue with the CloudPKI chain not aligning perfectly with ClearPass's expectations. Start with the certificate properties and work outward from there. Let me know what you find in the certs or logs, and we can zero in further!

    Regards

    Rupesh Mishra






  • 3.  RE: Clearpass cloud pki get timeout

    Posted Mar 19, 2025 09:12 AM

    Thanks for the reply, the certs look the same beside the pki cert has basic constraints subject type "end entity", and the onprem cert as (1.3.6.1.4.1.311.25.2) and key usage of non-repudiation which the pki not has but I dont think they are the issue.

    I wiresharked the authentication with the pki cert
    tlsv1.2 client hello session id length 0
    Where with the local one it has length 32

    And i dont use the clearpass intune extention because from what I saw the intune act as a db and not needed for it to work




  • 4.  RE: Clearpass cloud pki get timeout

    Posted Mar 21, 2025 12:01 AM

    What do you mean by "intune act as a db and not needed for it to work"? Are you using Cloud PKI with Entra ID as your only identity? In this case Clearpass won't have any knowledge of the users without the Intune extension to populate the Endpoint Database. 




  • 5.  RE: Clearpass cloud pki get timeout

    Posted Mar 21, 2025 06:24 AM

    If you don't need knowledge or additional information about the endpoints, but just trust that if the device has a certificate issued by the CA that is used with Intune to deploy the certificates, you don't need a connection between ClearPass and Intune. Just disable authorization during the authentication and allow any certificate.

    Many customers would like to see/use information from Intune about the device; but it's not required.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 6.  RE: Clearpass cloud pki get timeout

    Posted Mar 23, 2025 11:26 AM

    Hey the problem is that I get the timeout and the pki certificate doesn't getting to the clearpass, its getting timeout. The cert doesn't like the computer like its not asking for it which work on the local ca cert what do u think the problem could be?




  • 7.  RE: Clearpass cloud pki get timeout

    Posted Mar 24, 2025 11:16 AM

    My response was on the part "What do you mean by "intune act as a db and not needed for it to work"?".

    What I would do in this situation is run a packet capture on or as close to the client and the ClearPass, then see if the 802.1X/EAPOL starts at all, and where it stops/starts retrying.

    I'd expect the server cert being sent, then the client either trusts the servercert but doesn't have a client certificate that's suitable for the authentication; or it prompts the user (it doesn't according to your observation); or it silently discards as the server cert is not trusted. From the packet capture you can see what certificates are used and find your mis-configuration. It may be useful to have a good understanding of how a successful authentication would look like, and how the client (supplicant) should be setup to match what is configured with what you see. TAC or your partner may be useful in case you find it hard to read the captures or interpret the configuration.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 8.  RE: Clearpass cloud pki get timeout

    Posted Mar 24, 2025 11:55 AM

    Where is ClearPass installed?  What's the path from the NAS to ClearPass?



    ------------------------------
    Carson Hulcher, ACEX#110
    ------------------------------



  • 9.  RE: Clearpass cloud pki get timeout

    Posted Mar 24, 2025 12:37 PM

    Hey,

    Since this is a repeat of your earlier question, I'll refine my previous answer with a sharper focus, assuming you've reviewed it and need a more targeted troubleshooting path. You're deploying EAP-TLS certificates via Intune and CloudPKI, they're landing on the PC (personal and root certs visible), but authentication fails with ClearPass showing "client did not complete EAP transaction." Yet, manually installed certs from an on-prem CA work fine. Let's zero in on why CloudPKI certs are failing and give you actionable steps.

    The error suggests the EAP-TLS handshake is breaking down-either the client (Windows PC) isn't sending the certificate, isn't completing the TLS negotiation, or ClearPass is rejecting something silently. Since on-prem certs work, the issue is likely specific to the CloudPKI certs' properties, trust chain, or client behavior.

    Quick Recap of Key Clues

    • Certificates from Intune/CloudPKI are on the PC but fail.

    • Root and intermediate CAs are in ClearPass's trusted list.

    • On-prem CA certs, manually installed, succeed.

    • ClearPass logs: "client did not complete EAP transaction."

    Likely Culprits and Checks

    1. Certificate Properties (EKU or SAN Mismatch):

      • EAP-TLS requires the client cert to have the Client Authentication EKU (OID 1.3.6.1.5.5.7.3.2).

      • Action: Open the CloudPKI cert on the PC (certmgr.msc > Personal > Certificates), check the Details tab for "Enhanced Key Usage." Compare to the working on-prem cert. If Client Authentication is missing, CloudPKI's template needs fixing in Intune.

      • Also, check the Subject Alternative Name (SAN). If ClearPass expects a specific format (e.g., UPN like user@domain.com), a mismatch could confuse it. Compare SANs between the two certs.

    2. Trust Chain Issues:

      • Even though the root and intermediate CAs are in ClearPass's trusted list, the client might not be sending the full chain, or there's a subtle mismatch (e.g., different intermediate CA version).

      • Action: Export the CloudPKI personal cert with its chain (right-click > All Tasks > Export > Include all certs in the chain) and inspect it in a tool like OpenSSL or Windows Cert Viewer. Ensure the intermediate CA matches exactly what's in ClearPass (Administration > Certificates > Trust List-check thumbprints).

      • On the PC, confirm the intermediate CA is in the "Intermediate Certification Authorities" store, not just the root in "Trusted Root."

    3. Client-Side TLS Failure:

      • Windows might not select the CloudPKI cert for EAP-TLS due to strict filtering (e.g., wrong key usage or trust).

      • Action: In the 802.1x settings (Network Adapter > Authentication tab > PEAP/EAP-TLS properties), manually select the CloudPKI cert under "Client Certificate." If it's grayed out or missing, Windows doesn't trust it or it's misconfigured.

      • Check Event Viewer (Windows Logs > System or Applications and Services Logs > Microsoft > Windows > WLAN-AutoConfig) for EAP-TLS errors-look for codes like "certificate not found" or "handshake failed."

    4. ClearPass RADIUS Cert Trust:

      • EAP-TLS is mutual-ClearPass sends its RADIUS cert to the PC. If the PC doesn't trust it (e.g., missing ClearPass's issuing CA in the Trusted Root store), the client aborts.

      • Action: On ClearPass (Administration > Certificates > Server Certificate), note the RADIUS cert's issuing CA. Ensure that CA is in the PC's Trusted Root store when using CloudPKI certs. Your on-prem setup might've already had this trust established.

    5. TLS Version or Cipher Mismatch:

      • A mismatch between the PC and ClearPass (e.g., PC forcing TLS 1.3, ClearPass on 1.2) could halt the handshake.

      • Action: On the PC, set TLS to 1.2 explicitly (Registry: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\PPP\EAP\13, add DWORD TlsVersion = 0xC0, reboot). Test again.

    Digging Deeper with Logs

    • ClearPass: In Monitoring > Live Monitoring > Access Tracker, find a failed attempt, click it, and check the logs tab. Look for:

      • "TLS handshake failed" (trust or version issue).

      • "Certificate rejected" (EKU or chain problem).

      • Timeout codes (e.g., 9002, client didn't respond).

    • Windows: Run netsh ras diagnostics show all or check Event Viewer for EAP-specific errors. "No certificate found" or "handshake aborted" will point to client-side issues.

    Why On-Prem Works but CloudPKI Fails

    • On-prem certs might have a simpler chain, correct EKU, or a SAN format ClearPass expects.

    • The PC might already trust the on-prem CA ecosystem fully, including the RADIUS cert's chain.

    Action Plan

    1. Compare Certs: Open both CloudPKI and on-prem certs side-by-side in certmgr.msc. Focus on EKU, SAN, and chain.

    2. Force Cert Selection: In Windows 802.1x settings, explicitly pick the CloudPKI cert and test.

    3. Validate Trust: Ensure the PC trusts ClearPass's RADIUS cert and ClearPass trusts the exact CloudPKI chain.

    4. Logs: Pull detailed ClearPass and Windows logs for the failure.

    5. Test TLS: Force TLS 1.2 on the PC and retry.

    Fix Hypothesis

    I'd bet on an EKU mismatch (CloudPKI cert lacking Client Authentication) or a chain issue (intermediate not sent or mismatched). Start with the cert properties-most EAP-TLS flops I've seen stem from there when deployment methods differ.

    Drop the results of your cert comparison or logs, and I'll pinpoint it further!

    Regards

    Rupesh