If a wildcard certificate is provisioned for *.domain.fqdn
, and has Client Authentication as a defined usage, does this mean the certificate can be used to essentially impersonate any domain machine?
My understanding is that it is up to the receiving entity in how it validates the certificate to machine, but I have not been able to properly ascertain if standard EAP-TLS/802.1x, or similar, do perform any further validation based on subject and/or SAN.
Thanks!