Am 14.03.2024 um 19:38 schrieb Zammit, Ludovic:
This is how I would do it:

- Do EAP TLS computer authentication on the devices
- Make sure to install the Root CA that signed the compter cert into PacketFence root CA authority under  Config / SSL certificate / Root CA
- Create a connection profile with a sub connection filter on TLS
- On that source, put an AD source that is configured properly with:

The search attributes on DNsHostName then having a rule that do a search on serviceprincipalName starts with host/


Hello Ludovic,

as far as I can see our config (now) looks exactly like you suggested, but the pc ist still shown with owner host/myhost.my.domain and host/myhost.my.domain is listed under Users. But why is packetfence looking for a User in the first place? Shouldn't it be clear from the serviceprincipalName and DNsHostName (along with the authentication mode setting on the windows supplicant) that only machine Authentification is requested. Is this hardwired into packetfence? Besides, wouldn't the form host/ (or host$ for that matter) imply at least that this is not a User? MAB authentication for example displays "default" as owner. It would be perfect, if the EAP-TLS Auth could do the same, or at least set any fixed name, so that the Users Tab is kept clear from all the hostnames. If no other means exist, would it be possible to use e.g. a radius filter to set the associated usernmae to someting like 'default' or 'machine', filtering on maybe EAP-TLS, authenticator switch or a TLS-Client-Cert-Common-Name starting with host/? What would such a filter look like?

Kind regards,

     Jochen



_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to