<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You can open the root CA and in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007305#M23677</link>
    <description>&lt;P&gt;You can open the root CA and verify if it has the complete chain.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;**rate helpful posts**&lt;/P&gt;</description>
    <pubDate>Thu, 01 Jun 2017 02:05:16 GMT</pubDate>
    <dc:creator>Ambuj M</dc:creator>
    <dc:date>2017-06-01T02:05:16Z</dc:date>
    <item>
      <title>ISE 2.2 Issue to Bind Signed Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007303#M23671</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I try to import signing certificate on my ISE 2.2.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have Generate Certificate Signing Request and send to Comodo CA. I have CA on Trusted Certifcates Tab &lt;IMG alt="" class="jive-image image-1" src="https://communities.cisco.com/servlet/JiveServlet/downloadImage/105097/pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;
&lt;P&gt;But when I bind the certificate i have this error.&lt;/P&gt;
&lt;P&gt;&lt;IMG alt="" class="jive-image image-2" src="https://communities.cisco.com/servlet/JiveServlet/downloadImage/105098/pastedImage_1.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I don't understand what is the issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:31:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007303#M23671</guid>
      <dc:creator>ypomero06</dc:creator>
      <dc:date>2019-03-11T07:31:03Z</dc:date>
    </item>
    <item>
      <title>Did you determine what was</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007304#M23674</link>
      <description>&lt;P&gt;Did you determine what was causing Certificate path validation error?&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2017 22:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007304#M23674</guid>
      <dc:creator>hamilton.bill</dc:creator>
      <dc:date>2017-05-31T22:05:13Z</dc:date>
    </item>
    <item>
      <title>You can open the root CA and</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007305#M23677</link>
      <description>&lt;P&gt;You can open the root CA and verify if it has the complete chain.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;**rate helpful posts**&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 02:05:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007305#M23677</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2017-06-01T02:05:16Z</dc:date>
    </item>
    <item>
      <title>I confirmed a complete chain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007306#M23679</link>
      <description>&lt;P&gt;I confirmed a complete chain on the Root&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 14:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007306#M23679</guid>
      <dc:creator>hamilton.bill</dc:creator>
      <dc:date>2017-06-01T14:30:41Z</dc:date>
    </item>
    <item>
      <title>Comodo CA has 1 Root and 4</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007307#M23681</link>
      <description>&lt;P&gt;Comodo CA has 1 Root and 4 different Intermediate CA certificates:&lt;/P&gt;
&lt;P&gt;https://support.comodo.com/index.php?/Knowledgebase/List/Index/71&lt;/P&gt;
&lt;P&gt;Can you check which exact intermediate CA has issued your certificate? I do not recall what Comodo Intermediate certificates ISE has in the 2.2 release by default, but your snapshot seems to point to:&lt;/P&gt;
&lt;P&gt;COMODO RSA Organization Validation Secure Server CA (SHA-2)&lt;/P&gt;
&lt;P&gt;Comodo RSA Certification Authority (SHA-2)&lt;/P&gt;
&lt;P&gt;Check if "C&lt;SPAN&gt;OMODO RSA Organization Validation Secure Server CA" issued yours.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 23:51:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007307#M23681</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-06-01T23:51:11Z</dc:date>
    </item>
    <item>
      <title>Import the Root and</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007308#M23682</link>
      <description>&lt;P&gt;Import the Root and Intermediate CA Certs into the trusted list of ISE before binding the cert.&lt;/P&gt;
&lt;P&gt;Usually, ISE does NOT have all the intermediate in the internal trust cert&amp;nbsp;repository. ONE EXAMPLE is L1K Intermediate Entrust Cert so I think the same is happening to you.&lt;/P&gt;
&lt;P&gt;If you see some COMODO certs in the ISE trusted cert list, CHECK the serial number against the ones that signed your cert. I am pretty sure you will find are not the same at least for the Intermediate because Root CA Certs are embedded in the software (example for Apple &amp;amp; Android is the Entrust Root G2 which also applies to ISE trust cert list).&lt;/P&gt;
&lt;P&gt;Hoping this helps&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 22:06:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007308#M23682</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2017-06-06T22:06:51Z</dc:date>
    </item>
    <item>
      <title>We determine there was an</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007309#M23683</link>
      <description>&lt;P&gt;We determine there was an issue in the cert chain and it was corrected.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 16:02:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007309#M23683</guid>
      <dc:creator>hamilton.bill</dc:creator>
      <dc:date>2017-06-08T16:02:27Z</dc:date>
    </item>
    <item>
      <title>Just to let you know, I am</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007310#M23684</link>
      <description>&lt;P&gt;Just to let you know, I am facing issues with binding an entrust cert to the portal certificate tag so the sponsor portal and guest portal are not displayed properly unless you stop/restart the ISE 2.2&amp;nbsp;services on that specific node (PAN or PSN). Still working with TAC on this.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2017 17:19:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007310#M23684</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2017-07-17T17:19:27Z</dc:date>
    </item>
    <item>
      <title>As a general information the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007311#M23685</link>
      <description>&lt;P&gt;As a general information the root cause was found. Having duplicated certificate entries in the TRUSTED CERTIFICATE LIST of ISE with the same CN (common name) causes the Internal Server Error and Guest/Sponsor Portals operation error.&lt;/P&gt;
&lt;P&gt;Removing one of the duplicated entries was enough.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jul 2017 18:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-2-issue-to-bind-signed-certificate/m-p/3007311#M23685</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2017-07-26T18:21:51Z</dc:date>
    </item>
  </channel>
</rss>

