06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Advanced System Configuration Pages Reference<br />

Field Description<br />

Accept client on authenticated<br />

provisioning<br />

Require client certificate <strong>for</strong><br />

provisioning<br />

When receiving client<br />

certificate, select one of the<br />

following lookup methods:<br />

9-46<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 9 System Configuration: Authentication and Certificates<br />

This option is only available when the allow authenticated in-band PAC provisioning<br />

option is selected. The server always sends an <strong>Access</strong>-Reject at the end of the<br />

provisioning phase, <strong>for</strong>cing the client to reauthenticate using the tunnel PAC. This option<br />

enables ACS to send an <strong>Access</strong>-Accept to the client at the end of the provisioning phase.<br />

Allows provisioning PACs based on certificates only. Other inner EAP methods <strong>for</strong> PAC<br />

provisioning are not allowed. If the client does not present its certificate during the first<br />

TLS handshake, the server initiates a TLS renegotiation. The renegotiation requests the<br />

client to start a new TLS handshake; the cipher that was negotiated in the first handshake<br />

protects it. During the second TLS handshake, the server requests the client 's certificate.<br />

If the certificate is not sent, the handshake fails and the user is denied access.<br />

If you choose more than one comparison type, ACS per<strong>for</strong>ms the comparisons in the<br />

order listed. If the one comparison type fails, ACS attempts the next enabled comparison<br />

type. Comparison stops after the first successful comparison. The two types of<br />

comparison are:<br />

Certificate SAN comparison—Verifies user identity by comparing the name in the<br />

Subject Alternative Name field of the end-user certificate to the username in the<br />

applicable user database, check this check box.<br />

Certificate CN comparison—Verifies user identity by comparing the name in the<br />

Common Name field of the end-user certificate to the username in the applicable<br />

user database, check this check box.<br />

Allow Machine Authentication ACS provisions an end-user client with a machine PAC and per<strong>for</strong>ms machine<br />

authentication (<strong>for</strong> end-user clients who do not have the machine credentials). The<br />

machine PAC can be provisioned to the client by request (in-band) or by administrator<br />

(out-of-band). When ACS receives a valid machine PAC from the end-user client, the<br />

machine identity details are extracted from the PAC and verified in the ACS database or<br />

external databases. After these details are correctly verified, no further authentication is<br />

per<strong>for</strong>med.<br />

Note After per<strong>for</strong>ming machine authentication and when the Required or Posture<br />

Only check boxes are checked, ACS also requests the posture credentials.<br />

Machine PAC TTL Enter a value <strong>for</strong> the amount of time that a machine PAC is acceptable <strong>for</strong> use. When ACS<br />

receives an expired machine PAC, it automatically reprovisions the end-user client with<br />

a new machine PAC (without waiting <strong>for</strong> a new machine PAC request from the end-user<br />

client).<br />

Allow Stateless session resume Uncheck this option:<br />

If you do not want ACS to provision authorization PACs <strong>for</strong> EAP-FAST clients.<br />

To always per<strong>for</strong>m phase two of EAP-FAST.<br />

Authorization PAC TTL This option determines the expiration time of the user authorization PAC. When ACS<br />

receives an expired authorization PAC, Allow Stateless session resume fails and,<br />

there<strong>for</strong>e, phase two EAP-FAST authentication is per<strong>for</strong>med.<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!