Hi,

I've tried looking for information on this but most led me to use auto cert enrollment policy in the GPO for Active Directory. This means that when a new machine joins the AD, it will receive a certificate stored in the local computer certificate store. But, what about computers already joined to the AD but did not receive any cert because the policy was not enabled then? How does one generate a machine cert? What type of cert are we requesting from the CA? Also, what is the user credential we use to access the CA when we want to request a new cert from web cert enrolment (http://ca/certsrv)?

I tried generating a user cert and importing into the Personal store of the "local computer" cert store but when I tried to use CSSC to perform a machine (EAP-TLS) and user login (any eap methods), i never see the machine trying authentication with the ACS. If i enable MAR with "no-access" for failed machine authentication, naturally i will not be able to pass authentication. But i also don't see any failed attempts from my machine in the ACS logs. I've tried user authentication only with EAP-TLS/PEAP/FAST and all worked flawlessly. I've also configured all the necessary ACS settings at the external database (windows database) configurations which allows EAP-TLS for machine authentication. I suspect my cert in concern for machine authentication is not correct hence machine authentication does not even take place.

Any directions to that is appreciated.

Alvin B

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to