06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 12 <strong>User</strong> Databases<br />

Enabling Machine Authentication<br />

OL-14386-02<br />

Windows <strong>User</strong> Database<br />

This procedure contains an overview of the detailed procedures required to configure ACS to support<br />

machine authentication.<br />

Note You must configure end-user client computers and the applicable Active Directory to support machine<br />

authentication. This procedure is specific to configuration of ACS only. For in<strong>for</strong>mation about<br />

configuring Microsoft Windows operating systems to support machine authentication, see Microsoft<br />

Windows and Machine Authentication, page 12-13.<br />

Note Solution Engine only: Windows authentication requires that you install at least one ACS Remote Agent<br />

<strong>for</strong> Windows and complete the steps in Adding a Remote Agent, page 3-21. For in<strong>for</strong>mation about<br />

installing the ACS Remote Agent <strong>for</strong> Windows, see the Installation and Configuration <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong><br />

<strong>Secure</strong> ACS Remote Agents Release 4.2.<br />

To enable ACS to per<strong>for</strong>m machine authentication:<br />

Step 1 Install a server certificate in ACS. PEAP (EAP-MS-CHAPv2) and EAP-TLS require a server certificate.<br />

ACS uses a single certificate to support both protocols. For detailed steps, see Installing an ACS <strong>Server</strong><br />

Certificate, page 9-22.<br />

Note If you have installed a certificate to support EAP-TLS or PEAP user authentication or to support<br />

HTTPS protection of remote ACS administration, you do not need to per<strong>for</strong>m this step. A single<br />

server certificate will support all certificate-based ACS services and remote administration.<br />

Step 2 For EAP-TLS machine authentication, if certificates on end-user clients are issued by a different CA<br />

than the CA that issued the server certificate on ACS, you must edit the certification trust list so that CAs<br />

that issue end-user client certificates are trusted. If you do not per<strong>for</strong>m this step and the CA of the server<br />

certificate is not the same as the CA of an end-user client certificate CA, EAP-TLS will operate<br />

normally; but reject the EAP-TLS machine authentication because it does not trust the correct CA. For<br />

detailed steps, see Editing the Certificate Trust List, page 9-28.<br />

Step 3 Enable the applicable protocols on the Global Authentication Setup page:<br />

To support machine authentication with PEAP, enable the PEAP (EAP-MS-CHAPv2) protocol.<br />

To support machine authentication with EAP-TLS, enable the EAP-TLS protocol.<br />

Note Solution Engine only: If you are using a Network <strong>Access</strong> Profile (NAP), the same protocols must<br />

be enabled in the NAP configuration.<br />

You can use ACS to complete this step only after you have successfully completed Step 1. For detailed<br />

steps, see Configuring Authentication Options, page 9-21.<br />

Step 4 Configure a Windows external user database and enable the applicable types of machine authentication<br />

on the Windows <strong>User</strong> Database Configuration page:<br />

To support machine authentication with PEAP, check the Enable PEAP machine authentication<br />

check box.<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

12-15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!