On Feb 19, 2009, at 8:28 AM, Tomas wrote:
My problem is that my windows box has no way of communicating with AD
server to verify user credentials for initial login screen (reason for
that is because switch port state is uncontrolled and no other but EAPOL
traffic can pass through)
Is there any way setting my windows box so that user gets authenticated against radius and then AD using single sign on without doing any hacks
to MS GINA or stuff like that?

Tomas, it sounds like you want the following behavior:

1.) machine boots up
2.) machine 802.1x authenticates, opening switch port for AD communication
3.) user enters credentials into OS login screen
4.) machine authenticates user against AD
5.) machine does a 802.1x re-auth with the user's credentials

Windows does support this and (surprise) it actually works well. Assuming you're using the native Windows 802.1x supplicant and have the non-domain case working, you can get the above behavior by enabling the following options in the supplicant: (how you do this varies a bit across Windows versions)

'Authenticate as computer when computer information is available'
'Automatically use my Windows logon name and password (and domain if any)'

Mike Loosbrock
Bethel University Network Services
651-638-6723
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to