Hi Everyone,
Using EAP-TLS/certs, is it possible to authenticate a device based on what 
Azure AD group they are in?
I am successfully authenticating users based on Azure AD group memberships with 
user certificates but cannot seem to get this to work using a device 
certificate.  The device certificate I am using has the subject set to 
CN={{AAD_Device_ID}}.  I do not have any SANs set on the certificate.  When 
trying to connect on a client device I am getting the following:Aug 21 14:06:28 
srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] handling radius autz request: from switch_ip => 
(10.20.10.28), connection_type => Wireless-802.11-EAP,switch_mac => 
(e0:cb:bc:91:85:df), mac => [98:59:7a:4c:39:b1], port => 1, username => 
"d1315df8-5850-48ec-8055-2801981948bb", ssid => Auth-Enterprise2 
(pf::radius::authorize)
Aug 21 14:06:28 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] Instantiate profile Auth-Enterprise2 
(pf::Connection::ProfileFactory::_from_profile)
Aug 21 14:06:28 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] Found authentication source(s) : 
'Auth-Enterprise2_AzureAD,Catchall-Deny' for realm 'null' 
(pf::config::util::filter_authentication_sources)
Aug 21 14:06:28 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] Using sources Auth-Enterprise2_AzureAD, Catchall-Deny 
for matching (pf::authentication::match2)
Aug 21 14:06:29 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) ERROR: 
[mac:98:59:7a:4c:39:b1] Failed to obtain groups for 
d1315df8-5850-48ec-8055-2801981948bb: 404 Not Found 
(pf::Authentication::Source::AzureADSource::get_memberOf)
Aug 21 14:06:29 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) ERROR: 
[mac:98:59:7a:4c:39:b1] Failed to obtain groups for 
d1315df8-5850-48ec-8055-2801981948bb: 404 Not Found 
(pf::Authentication::Source::AzureADSource::get_memberOf)
Aug 21 14:06:29 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] Matched rule (catchall) in source Catchall-Deny, 
returning actions. (pf::Authentication::Source::match_rule)
Aug 21 14:06:29 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] Matched rule (catchall) in source Catchall-Deny, 
returning actions. (pf::Authentication::Source::match)
Aug 21 14:06:29 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] Found authentication source(s) : 
'Auth-Enterprise2_AzureAD,Catchall-Deny' for realm 'null' 
(pf::config::util::filter_authentication_sources)
Aug 21 14:06:29 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] Role has already been computed and we don't want to 
recompute it. Getting role from node_info (pf::role::getRegisteredRole)
Aug 21 14:06:29 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] Username was defined 
"d1315df8-5850-48ec-8055-2801981948bb" - returning role 'REJECT' 
(pf::role::getRegisteredRole)
Aug 21 14:06:29 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] PID: "d1315df8-5850-48ec-8055-2801981948bb", Status: 
reg Returned VLAN: (undefined), Role: REJECT (pf::role::fetchRoleForNode)
Aug 21 14:06:29 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] According to rules in fetchRoleForNode this node must 
be kicked out. Returning USERLOCK (pf::Switch::handleRadiusDeny)
Aug 21 14:06:29 srv-pf-01 httpd.aaa-docker-wrapper[3710]: httpd.aaa(7) INFO: 
[mac:98:59:7a:4c:39:b1] security_event 1300003 force-closed for 
98:59:7a:4c:39:b1 (pf::security_event::security_event_force_close)



The application in Azure is set with the following permissions on Microsoft 
Graph:
Device.Read.AllDirectory.Read.AllGroupMember.Read.AllUser.Read


Thanks for your help
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to