<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Certificate Chain Not Trusted By WLAN Clients in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-certificate-chain-not-trusted-by-wlan-clients/m-p/2174888#M127844</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks hardiklodhia, your post confirms what we are seeing - the Windows clients have no issue as long as they are set to either NOT validate the EAP server cert or they are set to trust the signing CA cert from the local store by specifically selecting the signing CA (i.e. tick next to "Validate Serverr Certificate" and then another tick next to the signing CA cert in the box below.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The iOS clients ALWAYS prompt for verification (thanks Apple.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: we are using 1.1.3 and the cert chain import using a concatenated PEM file with ALL of the certs in the chain works fine. We are seeing the whole chain on the clients and the ISE extracts each PEM file into its local store.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PEM file format is not adequately described in the user guides rather a vague description of cert order is provided. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The file should look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------Top of page-----------------------------&lt;/P&gt;&lt;P&gt;Root CA PEM FILE&lt;/P&gt;&lt;P&gt;Intermediate CA 1 PEM FILE&lt;/P&gt;&lt;P&gt;Intermediate CA 2 PEM FILE&lt;/P&gt;&lt;P&gt;ETC&lt;/P&gt;&lt;P&gt;ISE CERT PEM FILE&lt;/P&gt;&lt;P&gt;------------------------Bottom of page-------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By "PEM FILE" I mean the actual base64 encoded PEM output from openssl when you convert a .crt or .der file to PEM, including the words "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" for each PEM FILE above, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;&lt;P&gt;MIIE2DCCBEGgAwIBAgIEN0rSQzANBgkqhkiG9w0BAQUFADCBwzELMAkGA1UEBhMC&lt;/P&gt;&lt;P&gt;VVMxFDASBgNVBAoTC0VudHJ1c3QubmV0MTswOQYDVQQLEzJ3d3cuZW50cnVzdC5u&lt;/P&gt;&lt;P&gt;ZXQvQ1BTIGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMc&lt;/P&gt;&lt;P&gt;KGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDE6MDgGA1UEAxMxRW50cnVzdC5u&lt;/P&gt;&lt;P&gt;ZXQgU2VjdXJlIFNlcnZlciBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05OTA1&lt;/P&gt;&lt;P&gt;MjUxNjA5NDBaFw0xOTA1MjUxNjM5NDBaMIHDMQswCQYDVQQGEwJVUzEUMBIGA1UE&lt;/P&gt;&lt;P&gt;ChMLRW50cnVzdC5uZXQxOzA5BgNVBAsTMnd3dy5lbnRydXN0Lm5ldC9DUFMgaW5j&lt;/P&gt;&lt;P&gt;MAwGA1UdEwQFMAMBAf8wGQYJKoZIhvZ9B0EABAwwChsEVjQuMAMCBJAwDQYJKoZI&lt;/P&gt;&lt;P&gt;hvcNAQEFBQADgYEAkNwwAvpkdMKnCqV8IY00F6j7Rw7/JXyNEwr75Ji174z4xRAN&lt;/P&gt;&lt;P&gt;95K+8cPV1ZVqBLssziY2ZcgxxufuP+NXdYR6Ee9GTxj005i7qIcyunL2POI9n9cd&lt;/P&gt;&lt;P&gt;2cNgQ4xYDiKWL2KjLB+6rQXvqzJ4h6BUcxm1XAX5Uj5tLUUL9wqT6u0G+bI=&lt;/P&gt;&lt;P&gt;-----END CERTIFICATE-----&lt;/P&gt;&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;&lt;P&gt;MIIEnzCCBAigAwIBAgIERp6RGjANBgkqhkiG9w0BAQUFADCBwzELMAkGA1UEBhMC&lt;/P&gt;&lt;P&gt;VVMxFDASBgNVBAoTC0VudHJ1c3QubmV0MTswOQYDVQQLEzJ3d3cuZW50cnVzdC5u&lt;/P&gt;&lt;P&gt;ZXQvQ1BTIGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMc&lt;/P&gt;&lt;P&gt;VeSB0RGAvtiJuQijMfmhJAkWuXAwHwYDVR0jBBgwFoAU8BdiE1U9s/8KAGv7UISX&lt;/P&gt;&lt;P&gt;8+1i0BowGQYJKoZIhvZ9B0EABAwwChsEVjcuMQMCAIEwDQYJKoZIhvcNAQEFBQAD&lt;/P&gt;&lt;P&gt;gYEAj2WiMI4mq4rsNRaY6QPwjRdfvExsAvZ0UuDCxh/O8qYRDKixDk2Ei3E277M1&lt;/P&gt;&lt;P&gt;RfPB+JbFi1WkzGuDFiAy2r77r5u3n+F+hJ+ePFCnP1zCvouGuAiS7vhCKw0T43aF&lt;/P&gt;&lt;P&gt;SApKv9ClOwqwVLht4wj5NI0LjosSzBcaM4eVyJ4K3FBTF3s=&lt;/P&gt;&lt;P&gt;-----END CERTIFICATE-----&lt;/P&gt;&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;&lt;P&gt;MIIE9TCCA92gAwIBAgIETA6MOTANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChML&lt;/P&gt;&lt;P&gt;RW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBp&lt;/P&gt;&lt;P&gt;bmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5&lt;/P&gt;&lt;P&gt;IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3QubmV0IENlcnRp&lt;/P&gt;&lt;P&gt;EN551lZqpHgUSdl87TBeaeptJEZaiDQ9JifPaUGEHATaGTgu24lBOX5lH51aOszh&lt;/P&gt;&lt;P&gt;DEw3oc5gk6i1jMo/uitdTBuBiXrKNjCc/4Tj/jrx93lxybXTMwPKd86wuinSNF1z&lt;/P&gt;&lt;P&gt;/6T98iW4NUV5eh+Xrsm+CmiEmXQ5qE56JvXN3iXiN4VlB6fKxQW3EzgNLfBtGc7e&lt;/P&gt;&lt;P&gt;mWEn7kVuxzn/9sWL4Mt8ih7VegcxKlJcOlAZOKlE+jyoz+95nWrZ5S6hjyko1+yq&lt;/P&gt;&lt;P&gt;wfsm5p9GJKaxB825DOgNghYAHZaS/KYIoA==&lt;/P&gt;&lt;P&gt;-----END CERTIFICATE-----&lt;/P&gt;&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;&lt;P&gt;MIIFKjCCBBKgAwIBAgIETB9GEzANBgkqhkiG9w0BAQUFADCBsTELMAkGA1UEBhMC&lt;/P&gt;&lt;P&gt;VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xOTA3BgNVBAsTMHd3dy5lbnRydXN0&lt;/P&gt;&lt;P&gt;Lm5ldC9ycGEgaXMgaW5jb3Jwb3JhdGVkIGJ5IHJlZmVyZW5jZTEfMB0GA1UECxMW&lt;/P&gt;&lt;P&gt;KGMpIDIwMDkgRW50cnVzdCwgSW5jLjEuMCwGA1UEAxMlRW50cnVzdCBDZXJ0aWZp&lt;/P&gt;&lt;P&gt;yhHR/hYfdVM88hBXXypACgrxBv/JFlKzSEDwKydJeT1tcP//nG4jv1WWgLk6O2Mi&lt;/P&gt;&lt;P&gt;0oE0fnGmuf9fTX4+CdapG2gTDFJ29Chv3kavJDNtB85A7CK8oWI8Qav78Rvaz7nA&lt;/P&gt;&lt;P&gt;LiRMLBQ1RkqUrQFL2WHx4mJkCddPXzOeOVJlUTGJ&lt;/P&gt;&lt;P&gt;-----END CERTIFICATE-----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The last PEM output (the one directly above) is the ISE cert in PEM format. The first PEM output (the one at the top) is the Root CA cert in PEM format. The ones in the middle are intermediate signing CAs in order (from root to leaf).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 29 Apr 2013 21:09:55 GMT</pubDate>
    <dc:creator>jeverard</dc:creator>
    <dc:date>2013-04-29T21:09:55Z</dc:date>
    <item>
      <title>ISE Certificate Chain Not Trusted By WLAN Clients</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-chain-not-trusted-by-wlan-clients/m-p/2174886#M127842</link>
      <description>&lt;P&gt;We are running ISE 1.1.3 using Entrust cert signed by Entrust sub CA L1C, which is signed by Entrust.net 2048, which is in all major OS stores as trusted (Windows, Android, iOS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have installed a concatenated PEM file with all of the certificates from the chain, as described in the ISE User Guides. The ISE GUI shows all of the certs in the chain individually after the import (i.e. the chain works and is good). However, we are not sure if the ISE is sending the entire chain to the WLAN clients during EAP authentication or just the ISE cert because of the error message we get on ALL client types which state that the certifiicate is not trusted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the question is if the ISE is really sending the whole chain or just its own cert with out the rest of the certs in the chain (which would explain why the WLAN clients complain about the certificate trust.) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone out there know if the ISE code is not up to sending the cert chain in version 1.1.3 yet or if there is some other explanation? Screenshot attached of iPhone prompting for cert verification.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 00:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-chain-not-trusted-by-wlan-clients/m-p/2174886#M127842</guid>
      <dc:creator>jeverard</dc:creator>
      <dc:date>2019-03-13T00:41:45Z</dc:date>
    </item>
    <item>
      <title>ISE Certificate Chain Not Trusted By WLAN Clients</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-chain-not-trusted-by-wlan-clients/m-p/2174887#M127843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having same issue with ISE 1.1.1 and I have discussed this thing with Cisco (ISE Expert) and he suggested that best practice is to use device certifiacte alone and then upload intermediate root certificate and root certificate to the ISE certificate store. The ISE will send entire certificate chain - device&amp;gt;intermediate&amp;gt;root. But there is known issue with Apple iOS that even when the signing root is already trusted, it will ALWAYS prompt for certificate to be accepted. When I am using Windows, it works fine that mean ISE is sending entire chain. For Windows, you need to explicitly trust CA under wireless profile properties&amp;gt;Security&amp;gt;Micrsoft PEAP&amp;gt;Settings&amp;gt;Validate server certificate and select your CA server.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I am still finding out why iOS not accepting the chain and there is some related discussion on apple support forum. I will update you on this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hope this helps.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Apr 2013 11:17:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-chain-not-trusted-by-wlan-clients/m-p/2174887#M127843</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2013-04-29T11:17:35Z</dc:date>
    </item>
    <item>
      <title>ISE Certificate Chain Not Trusted By WLAN Clients</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-chain-not-trusted-by-wlan-clients/m-p/2174888#M127844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks hardiklodhia, your post confirms what we are seeing - the Windows clients have no issue as long as they are set to either NOT validate the EAP server cert or they are set to trust the signing CA cert from the local store by specifically selecting the signing CA (i.e. tick next to "Validate Serverr Certificate" and then another tick next to the signing CA cert in the box below.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The iOS clients ALWAYS prompt for verification (thanks Apple.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: we are using 1.1.3 and the cert chain import using a concatenated PEM file with ALL of the certs in the chain works fine. We are seeing the whole chain on the clients and the ISE extracts each PEM file into its local store.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PEM file format is not adequately described in the user guides rather a vague description of cert order is provided. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The file should look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------Top of page-----------------------------&lt;/P&gt;&lt;P&gt;Root CA PEM FILE&lt;/P&gt;&lt;P&gt;Intermediate CA 1 PEM FILE&lt;/P&gt;&lt;P&gt;Intermediate CA 2 PEM FILE&lt;/P&gt;&lt;P&gt;ETC&lt;/P&gt;&lt;P&gt;ISE CERT PEM FILE&lt;/P&gt;&lt;P&gt;------------------------Bottom of page-------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By "PEM FILE" I mean the actual base64 encoded PEM output from openssl when you convert a .crt or .der file to PEM, including the words "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" for each PEM FILE above, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;&lt;P&gt;MIIE2DCCBEGgAwIBAgIEN0rSQzANBgkqhkiG9w0BAQUFADCBwzELMAkGA1UEBhMC&lt;/P&gt;&lt;P&gt;VVMxFDASBgNVBAoTC0VudHJ1c3QubmV0MTswOQYDVQQLEzJ3d3cuZW50cnVzdC5u&lt;/P&gt;&lt;P&gt;ZXQvQ1BTIGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMc&lt;/P&gt;&lt;P&gt;KGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDE6MDgGA1UEAxMxRW50cnVzdC5u&lt;/P&gt;&lt;P&gt;ZXQgU2VjdXJlIFNlcnZlciBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05OTA1&lt;/P&gt;&lt;P&gt;MjUxNjA5NDBaFw0xOTA1MjUxNjM5NDBaMIHDMQswCQYDVQQGEwJVUzEUMBIGA1UE&lt;/P&gt;&lt;P&gt;ChMLRW50cnVzdC5uZXQxOzA5BgNVBAsTMnd3dy5lbnRydXN0Lm5ldC9DUFMgaW5j&lt;/P&gt;&lt;P&gt;MAwGA1UdEwQFMAMBAf8wGQYJKoZIhvZ9B0EABAwwChsEVjQuMAMCBJAwDQYJKoZI&lt;/P&gt;&lt;P&gt;hvcNAQEFBQADgYEAkNwwAvpkdMKnCqV8IY00F6j7Rw7/JXyNEwr75Ji174z4xRAN&lt;/P&gt;&lt;P&gt;95K+8cPV1ZVqBLssziY2ZcgxxufuP+NXdYR6Ee9GTxj005i7qIcyunL2POI9n9cd&lt;/P&gt;&lt;P&gt;2cNgQ4xYDiKWL2KjLB+6rQXvqzJ4h6BUcxm1XAX5Uj5tLUUL9wqT6u0G+bI=&lt;/P&gt;&lt;P&gt;-----END CERTIFICATE-----&lt;/P&gt;&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;&lt;P&gt;MIIEnzCCBAigAwIBAgIERp6RGjANBgkqhkiG9w0BAQUFADCBwzELMAkGA1UEBhMC&lt;/P&gt;&lt;P&gt;VVMxFDASBgNVBAoTC0VudHJ1c3QubmV0MTswOQYDVQQLEzJ3d3cuZW50cnVzdC5u&lt;/P&gt;&lt;P&gt;ZXQvQ1BTIGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMc&lt;/P&gt;&lt;P&gt;VeSB0RGAvtiJuQijMfmhJAkWuXAwHwYDVR0jBBgwFoAU8BdiE1U9s/8KAGv7UISX&lt;/P&gt;&lt;P&gt;8+1i0BowGQYJKoZIhvZ9B0EABAwwChsEVjcuMQMCAIEwDQYJKoZIhvcNAQEFBQAD&lt;/P&gt;&lt;P&gt;gYEAj2WiMI4mq4rsNRaY6QPwjRdfvExsAvZ0UuDCxh/O8qYRDKixDk2Ei3E277M1&lt;/P&gt;&lt;P&gt;RfPB+JbFi1WkzGuDFiAy2r77r5u3n+F+hJ+ePFCnP1zCvouGuAiS7vhCKw0T43aF&lt;/P&gt;&lt;P&gt;SApKv9ClOwqwVLht4wj5NI0LjosSzBcaM4eVyJ4K3FBTF3s=&lt;/P&gt;&lt;P&gt;-----END CERTIFICATE-----&lt;/P&gt;&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;&lt;P&gt;MIIE9TCCA92gAwIBAgIETA6MOTANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChML&lt;/P&gt;&lt;P&gt;RW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBp&lt;/P&gt;&lt;P&gt;bmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5&lt;/P&gt;&lt;P&gt;IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3QubmV0IENlcnRp&lt;/P&gt;&lt;P&gt;EN551lZqpHgUSdl87TBeaeptJEZaiDQ9JifPaUGEHATaGTgu24lBOX5lH51aOszh&lt;/P&gt;&lt;P&gt;DEw3oc5gk6i1jMo/uitdTBuBiXrKNjCc/4Tj/jrx93lxybXTMwPKd86wuinSNF1z&lt;/P&gt;&lt;P&gt;/6T98iW4NUV5eh+Xrsm+CmiEmXQ5qE56JvXN3iXiN4VlB6fKxQW3EzgNLfBtGc7e&lt;/P&gt;&lt;P&gt;mWEn7kVuxzn/9sWL4Mt8ih7VegcxKlJcOlAZOKlE+jyoz+95nWrZ5S6hjyko1+yq&lt;/P&gt;&lt;P&gt;wfsm5p9GJKaxB825DOgNghYAHZaS/KYIoA==&lt;/P&gt;&lt;P&gt;-----END CERTIFICATE-----&lt;/P&gt;&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;&lt;P&gt;MIIFKjCCBBKgAwIBAgIETB9GEzANBgkqhkiG9w0BAQUFADCBsTELMAkGA1UEBhMC&lt;/P&gt;&lt;P&gt;VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xOTA3BgNVBAsTMHd3dy5lbnRydXN0&lt;/P&gt;&lt;P&gt;Lm5ldC9ycGEgaXMgaW5jb3Jwb3JhdGVkIGJ5IHJlZmVyZW5jZTEfMB0GA1UECxMW&lt;/P&gt;&lt;P&gt;KGMpIDIwMDkgRW50cnVzdCwgSW5jLjEuMCwGA1UEAxMlRW50cnVzdCBDZXJ0aWZp&lt;/P&gt;&lt;P&gt;yhHR/hYfdVM88hBXXypACgrxBv/JFlKzSEDwKydJeT1tcP//nG4jv1WWgLk6O2Mi&lt;/P&gt;&lt;P&gt;0oE0fnGmuf9fTX4+CdapG2gTDFJ29Chv3kavJDNtB85A7CK8oWI8Qav78Rvaz7nA&lt;/P&gt;&lt;P&gt;LiRMLBQ1RkqUrQFL2WHx4mJkCddPXzOeOVJlUTGJ&lt;/P&gt;&lt;P&gt;-----END CERTIFICATE-----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The last PEM output (the one directly above) is the ISE cert in PEM format. The first PEM output (the one at the top) is the Root CA cert in PEM format. The ones in the middle are intermediate signing CAs in order (from root to leaf).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Apr 2013 21:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-chain-not-trusted-by-wlan-clients/m-p/2174888#M127844</guid>
      <dc:creator>jeverard</dc:creator>
      <dc:date>2013-04-29T21:09:55Z</dc:date>
    </item>
    <item>
      <title>ISE Certificate Chain Not Trusted By WLAN Clients</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-chain-not-trusted-by-wlan-clients/m-p/2174889#M127845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running ISE 1.1.1.268. I am also using entrust l1c chaining. Blackberry and Android devices are not able to validate server certificate when using 802.1x PEAP MSchapV2. Iphone does the job right. The thing is when I export the ISE psn certificate (pem) from PSN, the cert chain look like : Intermediate-&amp;gt;Root-&amp;gt;ISE_PSN ... I guess it should look like : Root-&amp;gt;Intermediate-&amp;gt;ISE_PSN. Is it ISE behavior or simply a setting I can change somewhere ? I tried importing the chain the way&lt;A _jive_internal="true" href="https://community.cisco.com/people/jeverard" id="jive-2026062371330941523211"&gt; jeverard&lt;/A&gt;&amp;nbsp; suggested with no luck. Any suggestion ? Are you guys seeing the same order in your exported pem ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Jun 2013 00:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-chain-not-trusted-by-wlan-clients/m-p/2174889#M127845</guid>
      <dc:creator>ericbourgault</dc:creator>
      <dc:date>2013-06-29T00:55:20Z</dc:date>
    </item>
  </channel>
</rss>

