Do EAP-TLS with MS CA but without RADIUS

alextsang010778
Here to help

Do EAP-TLS with MS CA but without RADIUS

Hi all

 

Understanding Meraki can use tag configured by System Manager to do something like cert auth without using RADIUS (Detail in the link below).

 

https://documentation.meraki.com/General_Administration/Cross-Platform_Content/Certificate-based_Wi-...

 

Does Meraki provide a method to do EAP-TLS with the existing MS PKI deployed but not deploying RADIUS and system manager app/enrollment?

 

Best regards

 

Alex Tsang

 

4 Replies 4
KarstenI
Kind of a big deal
Kind of a big deal

You could use "Meraki Local Auth" if this fits your needs:

https://documentation.meraki.com/MR/Encryption_and_Authentication/Meraki_Local_Authentication_-_MR_8...

If you found this post helpful, please give it Kudos. If my answer solves your problem, please click Accept as Solution so others can benefit from it.
alextsang010778
Here to help

Thanks Karstenl

 

I checked the document, would like to see my below understanding is correct or not for the local auth.

 

1. If using password based  - say EAP-TTLS/PAP, LDAP must be exist for the every user first login? Then MR will cache a hash of the credentials, so user can still login is LDAP is unavailable?

2. For the certificate based authentication - EAP-TLS, user can login to the SSID with a valid certificate issued by the issuing CA if the below requirement met. No external Radius and LDAP is required.

 

2.1 We will import the issuing CA certificate to the MR 

alextsang010778_0-1660376937007.png

 

2.2 Do not verify certificate with LDAP setting configured in LDAP option

 

2.3 Client's endpoint trust IdenTrust CA root cert

3. Maximum cache timeout is 24 hours, so is that the LDAP server must be resumed with 24 hours? Otherwise user cache expired and then client cannot login to that SSID?

KarstenI
Kind of a big deal
Kind of a big deal

1: Yes, at the moment only one LDAP-Server can be specified. With this caching, users can still connect if this LDAP-server is down. But still it's a single point of failure that can easily avoided with RADIUS.

2: Right, but it's perhaps not a bad idea to take the CN or a SAN from the certificate and query it against LDAP. Otherwise you can't easily lock out a user that still has his certificate bat doesn't belong to the company any more.

3: Yes, 1d is the max. If you have doubts that in case a recovery takes more time, I would directly go for redundant RADIUS servers.

If you found this post helpful, please give it Kudos. If my answer solves your problem, please click Accept as Solution so others can benefit from it.
PhilipDAth
Kind of a big deal
Kind of a big deal

No.

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels