Hi Everyone,
Using EAP-TLS/certs, is it possible to authenticate a device based on what
Azure AD group they are in?
I am successfully authenticating users based on Azure AD group memberships with
user certificates but cannot seem to get this to work using a device
certificate. The device
Hi Everyone,
I am trying to deploy the 12.2 ZEN ova. The VM starts up fine. I am able to
access the VM via the admin portal and assign the management interface and get
through the initial setup. When I add the additional network interfaces to the
VM for isolation and registration and then
Try creating the computer object in AD prior to joining and then join via the
packetfence gui.
Sent from Yahoo Mail for iPhone
On Tuesday, August 23, 2022, 12:11 PM, Aaron Zuercher via PacketFence-users
wrote:
Nate,this part of my install was pretty straight forward. What version of
to eliminate that step so that the user can
just access their PSK from their business device that is connected to the
dot1.x network and then use that PSK to join their BYOD device.
On Thursday, June 30, 2022, 12:24:35 PM EDT, Michael Brown via
PacketFence-users wrote:
Hi Ludovic,
Will this allow
via
PacketFence-users wrote:
Hi Ludovic,
Will this allow them to access their PSK from the portal? I am really just
trying to figure out a way that employees can access their PSK from their
assigned device.that is connected to a PEAP/802.1x network so that they can
connect their BYOD
feature.
Thanks,
| Ludovic Zammit
Product Support Engineer Principal |
| |
| |
| Cell: +1.613.670.8432
| AkamaiTechnologies - Inverse
145 Broadway
Cambridge, MA 02142
|
| |
| Connect with Us: | |
On Jun 27, 2022, at 10:22 PM, Michael Brown via PacketFence-users
wrote:
Hi
Hi Everyone,
My main wifi network is an 802.1x network that uses AD computer and user groups
for authentication. I am opening up a DPSK network to our employees for BYOD.
I would like to provide the ability for all employees, from their assigned
device that is registered and connected to our
Hi Guys,
I am trying to upgrade from 10.1.0 to 10.3.0
I stopped all my services and am trying to upgrade MariaDB. When I run the
command:
mysql_upgrade -u pf -p
I get the following error:
Version check failed. Got the following error when calling the 'mysql' command
line client
ERROR
Just checking in to see if anyone has any ideas on this. I was thinking it
might be something I am missing in my portal module but am not totally
sure.Thanks.
Sent from Yahoo Mail for iPhone
On Friday, February 19, 2021, 11:12 AM, Michael Brown
wrote:
Hi Guys,
I have a root portal
Hi Guys,
I have a root portal module setup that allows a user to sign in to wifi with
username and password, sign up for wifi access via sponsor email and login to
obtain a DPSK.
Is it possible to somehow make this portal available to an already registered
device? When I try to access
(https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Hostapd.pm#L189)
If it works then it will be easy to adapt the meraki switch module.
Regards
Fabrice
Le 20-11-17 à 11 h 53, Michael Brown via PacketFence-users a écrit :
Hey Guys,
Just checking in one more time
Hey Guys,
Just checking in one more time on this one. Any ideas?
Thanks,Mike
On Thursday, November 12, 2020, 11:38:23 AM EST, Michael Brown
wrote:
Based off the auditing log below it looks like PacketFence sends the PSK back
to the Meraki access point as Cisco-AVPair. Is there
I have a wildcard from Digicert and used this to get the cert:Apache: CSR &
SSL Installation (OpenSSL)
|
|
|
| | |
|
|
|
| |
Apache: CSR & SSL Installation (OpenSSL)
Apache: Generating your Apache CSR with OpenSSL and installing your SSL
certificate and Mod_SSL web server
Based off the auditing log below it looks like PacketFence sends the PSK back
to the Meraki access point as Cisco-AVPair. Is there anyway to change
PacketFence to send the PSK as tunnel-password instead of Cisco-AVPair?
RADIUS RequestRADIUS RequestUser-Name = "00e04c19"User-Password =
Checking in on this.
I put a message up on Meraki and it looks like the problem is the RADIUS
Access-Accept message is not returning the Tunnel-Password with the user's
dpsk. It is only returning the VLAN ID. Is there something missing in my
config to make that happen?
Thanks.
On
Hi Guys,
Has anyone been ableto get DPSK working with Meraki access points?
The provisionerportion is working where the user joins a network, signs in to
the portal andthen once they are signed in they are presented with the name of
the networkthat uses DPSK and their DPSK password. The
...@inverse.ca :: +1.514.447.4918 (x145) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
(http://packetfence.org)
On Jul 31, 2020, at 12:19 PM, Michael Brown via PacketFence-users
wrote:
Hi Guys,
Is there a way to have clients who have authenticated
Checking in on this. Thanks.
Sent from Yahoo Mail for iPhone
On Friday, July 31, 2020, 12:19 PM, Michael Brown
wrote:
Hi Guys,
Is there a way to have clients who have authenticated via the captive portal
(Wireless-No-EAP) using their Active Directory credentials to reauthenticate
Hi Guys,
Is there a way to have clients who have authenticated via the captive portal
(Wireless-No-EAP) using their Active Directory credentials to reauthenticate
automatically after their Access Duration time limit has expired?
Thanks,Mike___
That did it. Thanks a lot.
On Wednesday, July 22, 2020, 09:02:17 PM EDT, Christian McDonald via
PacketFence-users wrote:
Bug with winbindd not being enabled after joining the domain...so winbindd
isn’t running when you reboot.
Run /usr/local/pf/addons/pf-maint.pl to pull latest
We are seeing this too. Did you find a solution?
We are running PacketFence 10.1.0 ZEN. Thanks. ___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
Yahoo Mail for iPhone
On Sunday, July 12, 2020, 7:32 PM, G PL via PacketFence-users
wrote:
Hello, bad DNS
Le dim. 12 juil. 2020 à 20:15, Michael Brown via PacketFence-users
a écrit :
Hey Guys,
I am in the middle of setting up sponsor email authentication.
Got everything working up until the sponso
not.
After u enable the sponsor must restart haproxy portal iotable and mybe other
service..or reboot the pf
Bye bye
--
GC Net
domenica, 12 luglio 2020, 08:15PM +02:00 da Michael Brown via PacketFence-users
packetfence-users@lists.sourceforge.net:
Hey Guys,
I am in the middle of setting
DNS assignment? on PacketFence or client or is it AD DNS? What IP should the
approval be going to? management IP?
Sent from Yahoo Mail for iPhone
On Sunday, July 12, 2020, 7:32 PM, G PL via PacketFence-users
wrote:
Hello, bad DNS
Le dim. 12 juil. 2020 à 20:15, Michael Brown via
Hey Guys,
I am in the middle of setting up sponsor email authentication.
Got everything working up until the sponsor approval. When I click on the
Activate Access button/link in the sponsor email I get a 404 error. I am
assuming this is because the link brings the sponsor to the portal and
y 5, 2020, 08:22:42 PM EDT, Durand fabrice via
PacketFence-users wrote:
Hello Michael,
Le 20-06-30 à 00 h 02, Michael Brown via PacketFence-users a écrit :
Hi Guys,
I am trying to get machine authentication working so that if a machine is a
member of the Active
On Sunday, July 5, 2020, 08:22:42 PM EDT, Durand fabrice via
PacketFence-users wrote:
Hello Michael,
Le 20-06-30 à 00 h 02, Michael Brown via PacketFence-users a écrit :
Hi Guys,
I am trying to get machine authentication working so that if a mac
rs wrote:
Hello Michael,
Le 20-06-30 à 00 h 02, Michael Brown via PacketFence-users a écrit :
Hi Guys,
I am trying to get machine authentication working so that if a machine is a
member of the Active Directory Domain Computers group it will join wifi without
prompting the use
up your AD server as the authentication source in PF. It’s explained in
the install doc.
Lots of google articles show how to set up the GPO for your end systems.
Thanks,
Bill
Sent from my iPad
On Jul 4, 2020, at 10:38 PM, Michael Brown via PacketFence-users
wrote:
A Windows Domain
mar. 30 juin 2020 à 22:20, Michael Brown via PacketFence-users
a écrit :
Hi Guys,
I am trying to get machine authentication working so that if a machine is a
member of the Active Directory Domain Computers group it will join wifi without
prompting the user for anything.
The access points
Just checking to see if any ideas on this one. Thanks.
On Tuesday, June 30, 2020, 04:19:42 PM EDT, Michael Brown via
PacketFence-users wrote:
Hi Guys,
I am trying to get machine authentication working so that if a machine is a
member of the Active Directory Domain Computers group
Hi Guys,
I am trying to get machine authentication working so that if a machine is a
member of the Active Directory Domain Computers group it will join wifi without
prompting the user for anything.
The access points are all Meraki.
On packetfence I have the following:Connection Profile
Hey Guys,
I am trying to get 802.1x with captive portal working for a byod wireless
network using MR42 and MR52 Meraki access points.
PacketFence Version: ZEN 10.0.1
PF Management IP - 172.20.254.250PF Registration IP- 172.20.252.250PF Isolation
IP - 172.20.251.250
Added the Meraki MR52 I am
Hey Guys,
I am trying to get 802.1x with captive portal working for a byod wireless
network using MR42 and MR52 Meraki access points.
PacketFence Version: ZEN 10.0.1
PF Management IP - 172.20.254.250PF Registration IP- 172.20.252.250PF Isolation
IP - 172.20.251.250
Added the Meraki MR52 I am
34 matches
Mail list logo