Hi Rich

On 2014-11-11, at 15:37 , Rich Graves <[email protected]> wrote:

> We are happily (within reason) supporting PEAP-MSCHAPv2. I would also like to 
> start supporting EAP-TLS for certain clients.
> 
> It seems safest to leave default_eap_type=peap and rely on supplicants 
> configured for EAP-TLS (probably just MacOS and Windows 7+) to counter with 
> EAP-Acknowledge(EAP-MD5). Does this work in practice?

That should work.
I have tested it with a client and they reported it working. 
Obviously you will also need to configure FreeRADIUS to point to your 
certificate authority using CA_file in eap.conf.


> (How) can I configure my certificate subject resolution such that EAP-TLS 
> authenticated users follow exactly the same role+VLAN derivation logic as 
> PEAP users?

That is all based on the username of the radius request.
While I don't have an example at hand if the subject of the certificate is 
properly configured it should map to a username automatically in radius. 
The eap module should take care of that if I am not mistaken.

> Do any other parts of the PacketFence FreeRADIUS (or beyond) configuration 
> need to be altered to accommodate EAP-TLS?

It should only affect radius. 
Let me know if you need a hand. 
It should not be too complicated.

Regards,
--
Louis Munro
[email protected]  ::  www.inverse.ca 
+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

------------------------------------------------------------------------------
Comprehensive Server Monitoring with Site24x7.
Monitor 10 servers for $9/Month.
Get alerted through email, SMS, voice calls or mobile push notifications.
Take corrective actions from your mobile device.
http://pubads.g.doubleclick.net/gampad/clk?id=154624111&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to