Machine authentication against AD CS
Olivier Le Monnier
olm at unicaen.fr
Wed Jul 18 11:30:54 CEST 2018
Hi everyone,
I've been searching for documentation about FR to manage hosts Access-Requests of this type :
————
(0) Received Access-Request Id 139 from 10.14.240.106:32773 to 10.14.129.201:1812 length 324
(0) User-Name = "host/C304Z-HP2560.campus.unicaen.fr"
(0) Chargeable-User-Identity = 0x00
(0) Location-Capable = Civix-Location
(0) Calling-Station-Id = "08-11-96-6e-09-5c"
(0) Called-Station-Id = "00-3a-99-91-f1-10:flexi"
(0) NAS-Port = 13
(0) Cisco-AVPair = "audit-session-id=0a0ef06a0008a5df5b4c8983"
(0) Acct-Session-Id = "5b4c8983/08:11:96:6e:09:5c/611634"
(0) NAS-IP-Address = 10.14.240.106
(0) NAS-Identifier = "C1-AC5-A1"
(0) Airespace-Wlan-Id = 10
(0) Service-Type = Framed-User
(0) Framed-MTU = 1300
(0) NAS-Port-Type = Wireless-802.11
(0) Tunnel-Type:0 = VLAN
(0) Tunnel-Medium-Type:0 = IEEE-802
(0) Tunnel-Private-Group-Id:0 = "120"
(0) EAP-Message = 0x0202002801686f73742f433330345a2d4850323536302e63616d7075732e756e696361656e2e6672
(0) Message-Authenticator = 0x6965b96bd6574a69e7b1e88560e90146
What I — normally — need to do is to verify the host certificate against the AD CS.
Did anyone here managed to do that?
It would be nice to share or at least show me the breadcrumbs I need to follow…
Thank you in advance!
--
ૐ — Olivier Le Monnier — ☎ 023156.6209
Pôle Infrastructures — SysAdmin Linux
Direction du Système d'Information
Université de Caen Normandie
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 2027 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20180718/bfa55ba5/attachment.bin>
More information about the Freeradius-Users
mailing list