Aruba ClearPass Onboarding - BYOD

Aruba ClearPass Onboarding - BYOD

Onboarding and Bring Your Own Device (BYOD)

Understanding Onboarding Process

  • Navid introduces the concept of onboarding, specifically in the context of Bring Your Own Device (BYOD), where users connect to a network using their credentials.
  • After initial connection, a certificate is generated for each device, establishing a one-to-one relationship between the user and their devices.
  • The onboarding process transitions from EAP (Extensible Authentication Protocol) to EAP-TLS (Transport Layer Security), ensuring secure communication.

Steps in the Onboarding Process

  • Users can initiate onboarding through various interfaces, such as clicking on "onboard" or accessing it via the network manager.
  • Devices are listed in an onboarding repository along with their certificates, allowing administrators to check if devices need re-importing or fresh onboarding.

Certificate Authority Configuration

  • Navid discusses creating a new Certificate Authority (CA), which will not integrate with other systems but will serve local needs.
  • Details about the CA are provided; options include editing or deleting existing configurations within this lab environment.

Authentication Method Settings

  • The importance of specifying OCSP (Online Certificate Status Protocol) during client access is highlighted for real-time certificate validation.
  • Modifications to authentication methods are discussed, including creating copies of default settings without overriding client-sent data.

Network Settings Configuration

  • The process involves building settings for quick connections that install certificates and configure wireless profiles on client machines.

Employee Secure Wireless Configuration Process

Creating the Configuration Profile

  • The speaker discusses the intention to create a new configuration profile named "employee secure Wireless," utilizing previously established settings.
  • They confirm that two out of three steps in the process have been completed, emphasizing the importance of these settings for multiple SSIDs.

Provisioning Settings Setup

  • A new provisioning setting is introduced, titled "employee secure device provisioning," with a focus on using their own certification authority.
  • The speaker mentions selecting the correct certificate authority for onboarding and adjusting key types for performance optimization.

Web Login and Certificate Validation

  • Discussion about web login redirects clients to a specific page, which will be part of the onboarding process.
  • The validation certificate is set to not validate for lab purposes, although normally it would be validated.

Completing Onboarding Process Steps

  • The speaker summarizes completing all three parts of the onboarding process: network settings, configuration profile, and provisioning settings.
  • They transition to creating onboard services within ClearPass Policy Manager using templates.

Service Creation and Enforcement Policies

  • Three different services are created based on enforcement policies; details include authorization processes and pre-authentication steps before client connection.
  • Emphasis on profiling devices during onboarding as clients initially connect with EAPIP before transitioning through various authentication methods.

Modifications for Lab Environment

  • Adjustments are made to remove guest access from authorization services in favor of local user repositories.
  • Further modifications involve enabling OCSP (Online Certificate Status Protocol), ensuring proper service connections without guest access.

Finalizing Onboarding Services

  • The final adjustments include ensuring correct URLs for online certificate services while maintaining local user repository configurations.

Service Configuration and User Onboarding Process

Adjusting Service Order

  • The speaker discusses the need to prioritize certain services by moving them to the top of the list for better visibility and access.
  • A service related to One X Authentication is identified as unnecessary, prompting a decision to disable it for safety.

Exploring Enforcement Profiles

  • The focus shifts to enforcement profiles, with three pre-provisioning profiles created automatically for user onboarding.
  • The BYOD role assigned by ClearPass during initial connections to a secure SSID is highlighted, which will be communicated back to the mobility controller.

Post-Onboarding User Role

  • After onboarding, users are assigned an authenticated role that allows unrestricted access within the network.
  • Emphasis is placed on configuring the mobility controller correctly so that users can be redirected appropriately during re-onboarding attempts.

Configuring Redirection URL

  • The configuration process involves specifying a URL for redirection during user onboarding, specifically pointing to device_provisioning_2.php.
  • The speaker copies the fully qualified domain name into the configuration settings for ease of use in redirecting users effectively.

Verifying Role Mapping and Testing Onboarding

  • It’s confirmed that the BYOD role is linked correctly with a captive portal necessary for onboarding processes.
  • A test of the client connection reveals successful assignment of pre-provisioning roles upon connecting through wireless services.

Access Tracker Insights

  • Upon accessing ClearPass's tracker, it shows that clients connect as contract users under employee wireless onboarding provisioning services.

Onboarding Process Overview

Initial Setup and Configuration

  • The onboarding process begins with the Quick Connect setup, which applies all settings configured during the onboarding phase.
  • A warning appears regarding an untrusted certificate on the machine; the user opts to accept this warning to proceed.

Connection Attempts and User Authentication

  • The access tracker shows that a contract user initially connects using EBT Ms chap, invoking application-based services for onboarding.
  • Users can view certificates associated with their usernames, indicating two different machines connected for one specific user.

Certificate Management

  • Each user has two certificates (one per machine), with details available for review. The type of certificate is identified as DLS client.
  • After devices are onboarded, authentication methods such as aptls are confirmed, allowing users to check accounting details and input attributes.

Output and User Role Verification

  • Various options (e.g., option 55, option 60) are discussed in terms of output sent back to the controller after user authentication.
  • The command confirms that users are authenticated, displaying roles assigned to them along with MAC addresses and tunneling mode information.

Conclusion of Onboarding Steps

Video description

In this video I explain what is Aruba OnBoarding (BYOD) and how to configure on Aruba ClearPass