06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

About Certification and EAP Protocols<br />

EAP-TLS Limitations<br />

9-4<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 9 System Configuration: Authentication and Certificates<br />

In effect, enabling an EAP-TLS session resume allows ACS to trust a user based on the cached TLS<br />

session from the original EAP-TLS authentication. Because ACS only caches a TLS session when a new<br />

EAP-TLS authentication succeeds, the existence of a cached TLS session is proof that the user has<br />

successfully authenticated in the number of minutes that the EAP-TLS session timeout option specified.<br />

Note Session timeout is based on the time of the initial, full authentication of the session. It does not depend<br />

on an accounting start message.<br />

The Session resume feature does not en<strong>for</strong>ce changes to the group assignment in an external user<br />

database; because group mapping does not occur when a user session is resumed. Instead, the user is<br />

mapped to the same ACS group to which the user was mapped at the beginning of the session. At the<br />

start of a new session, group mapping en<strong>for</strong>ces the new group assignment.<br />

To <strong>for</strong>ce an EAP-TLS session to end be<strong>for</strong>e the session timeout is reached, you can restart the CSAuth<br />

service or delete the user from the ACS user database. Disabling or deleting the user in an external user<br />

database has no effect because the session resume feature does not involve the use of external user<br />

databases.<br />

You can enable the EAP-TLS session resume feature and configure the timeout interval on the Global<br />

Authentication Setup page. For more in<strong>for</strong>mation about enabling this feature, see Global Authentication<br />

Setup, page 9-21.<br />

The limitations in the ACS implementation of EAP-TLS are:<br />

<strong>Server</strong> and CA certificate file <strong>for</strong>mat—If you install the ACS server and CA certificates from files,<br />

rather than from certificate storage, server and CA certificate files must be in Base64-encoded X.509<br />

<strong>for</strong>mat or DER-encoded binary X.509 <strong>for</strong>mat.<br />

LDAP attribute <strong>for</strong> binary comparison—If you configure ACS to per<strong>for</strong>m binary comparison of<br />

user certificates, the user certificate must be stored in the Active Directory or an LDAP server by<br />

using a binary <strong>for</strong>mat. Also, the attribute storing the certificate must be named usercertificate.<br />

Windows server type—If you want to use Active Directory to authenticate users with EAP-TLS<br />

when ACS runs on a member server, additional configuration is required. For more in<strong>for</strong>mation,<br />

including steps <strong>for</strong> the additional configuration, see the Installation <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> ACS <strong>for</strong><br />

Windows Release 4.2 or the Installation <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> ACS Solution Engine Release 4.2.<br />

Note ACS supports UTF-8 (the 8-bit Universal Coded Character Set (UCS)/Unicode Trans<strong>for</strong>mation Format)<br />

<strong>for</strong> the username and password only when authenticating with Active Directory (AD). The UTF-8 <strong>for</strong>mat<br />

can preserve the full US-ASCII range, providing compatibility with the existing ASCII handling<br />

software.<br />

Enabling EAP-TLS Authentication<br />

This section explains the procedures that are required to configure ACS to support EAP-TLS<br />

authentication.<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!