Deployment Models: Standalone vs AD-Joined
Overview
802.1X EAP-TLS can be deployed in two architectures:
| Aspect | Standalone (Home Lab) | AD-Joined (Enterprise) |
|---|---|---|
AD Membership |
No domain join |
Device joins Active Directory |
Certificate Source |
Manual enrollment from CA |
Auto-enrollment via Group Policy |
Certificate Renewal |
Manual (script-assisted) |
Automatic via ADCS |
User Authentication |
Local accounts |
AD accounts (Kerberos/LDAP) |
Policy Management |
Manual configuration |
Group Policy Objects (GPO) |
Example |
This home lab (Domus) |
HOME Linux Workstation |
Security Comparison
|
Both models provide identical 802.1X security. EAP-TLS security is based on:
AD membership adds operational management, not authentication security. |
What AD-Join Provides
-
Automated certificate lifecycle — Certificates auto-enroll and auto-renew
-
Centralized revocation — Revoke via AD/ADCS, ISE checks CRL/OCSP
-
Group Policy — Push configurations, security baselines
-
Single sign-on — Kerberos tickets after 802.1X auth
-
Audit trail — AD logs all authentication events
When to Use Each Model
Certificate Management Comparison
Trust Architecture
Both models use the same trust chain:
The only difference is how the client certificate is issued and renewed.
This Lab’s Architecture
This home lab (PRJ-ISE-HOME-LINUX) uses the standalone model:
-
Linux workstations are NOT domain-joined
-
Certificates are manually enrolled from HOME-ROOT-CA (Windows AD CS)
-
Certificate files stored in
/etc/ssl/certs/and/etc/ssl/private/ -
Renewal is manual (documented in Certificate Enrollment)
This proves EAP-TLS works on Linux without AD membership, validating the approach before enterprise deployment where AD-join would be required.
Related
-
Certificate Enrollment — Manual enrollment process
-
Trust Chain — CA hierarchy