There are different Identity Agent deployment methods:
Notes:
$NACPORTAL_HOME/htdocs/nac/nacclients/customAgent.msi
To configure Identity Agent deployment from Captive Portal:
When necessary, you can configure specific groups to download the Identity Agent. For example, if you have a group of mobile users that roam and it is necessary for them to stay connected as they move between networks.
To configure Identity Agent deployment for user groups:
Before the Identity Agent can connect to an Identity Awareness Gateway, the Identity Agent must discover and trust the server, to which it connects. There are several methods to configure this. The basic method is to configure one server. Another method is to deploy a domain-wide Policy, to connect to an Identity Awareness Gateway, based on the Identity Agent client current location.
Server Trust makes sure that the Identity Agent connects to a genuine Identity Awareness Gateway. It makes sure that the communication between the Identity Agent and the Security Gateway is secure. For example, Server Trust blocks man-in-the-middle attacks.
Trust is made with when the server fingerprint matches the expected fingerprint, as calculated during the SSL handshake.
There are different server discovery and trust methods:
Discovery and Trust Method |
Description |
---|---|
File name based server configuration |
If no other method is configured (out of the box situation), the Identity Agent downloaded from the Captive Portal is renamed to include the Captive Portal computer IP address in its name. During installation, the Identity Agent uses this IP address for the Identity Awareness Gateway. Users manually accept the server in the Trust window. |
AD based configuration |
If the Identity Agent computers are members of an Active Directory domain, deploy the server IP addresses and trust data with a dedicated Distributed Configuration tool (installed as a part of the Identity Agent). |
DNS SRV record based server discovery |
Configure the Identity Awareness Gateway's addresses on the DNS server. Users manually accept the server in the Trust window. Note - This is the only server discovery method for the Mac OS Identity Agent. |
Remote registry |
All client configurations, including Identity Server IP addresses and trust data, are in the Windows OS Registry. Deploy these values before installing the client (by GPO, or other method that lets you remotely control the Windows registry). The Identity Agent uses the data immediately. |
Create a custom version of the Identity Agent installation that comes with the Identity Awareness Gateway. |
In the Identity Sources section of the Identity Awareness page, select Identity Agents to configure Identity Agent settings.
To configure the Identity Agent settings:
Click Edit to select from where the Identity Agent can be accessed. The options are based on the topology configured for the Security Gateway.
Users can communicate with the servers if they use networks connected to these interfaces.
Configure data for the logged in session using the Identity Agent.
Configure data for Identity Agent upgrades.
Note - When you install or upgrade the Full Identity Agent version, the user will experience a momentary loss of connectivity.
Some users cannot authenticate with the Identity Agent
This issue can occur in Kerberos environments with a very large Domain Controller database. The authentication failure occurs when the CCC message size is larger than the default maximum size. You can increase the maximum CCC message size to prevent this error.
To increase the maximum CCC message size, use the procedure in sk66087.
Transparent Portal Authentication fails for some users
This issue can occur for users that try to authenticate with Kerberos authentication with the transparent portal. The user sees a 400 Bad Request page with this message:
Your browser sent a request that this server could not understand.
Size of a request header field exceeds server limit.
The authentication failure occurs because the HTTP request header is larger than the default maximum size. You increase the maximum HTTP request header to prevent this error.
To increase the maximum HTTP request header size, use the procedure in sk92802.