<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ise certificate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3016698#M23910</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Few question is if I use multiuse csr and get certificate from an external CA like godaddy,&lt;BR /&gt;Can I use it for eap authentication or it need from internal ca .&lt;/P&gt;
&lt;P&gt;If I create csr for external CA ( multiuse ), Is it necessary to bind EAP or I can create a separate certificate for eap authentication from my internal CA&lt;/P&gt;
&lt;P&gt;If I did not choose "Trust for client authentication and Syslog " while importing Root certificate and when Binding I choose EAP authentication &lt;BR /&gt;What will happen in that case ?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 07:28:13 GMT</pubDate>
    <dc:creator>muhsi_2015</dc:creator>
    <dc:date>2019-03-11T07:28:13Z</dc:date>
    <item>
      <title>ise certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3016698#M23910</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Few question is if I use multiuse csr and get certificate from an external CA like godaddy,&lt;BR /&gt;Can I use it for eap authentication or it need from internal ca .&lt;/P&gt;
&lt;P&gt;If I create csr for external CA ( multiuse ), Is it necessary to bind EAP or I can create a separate certificate for eap authentication from my internal CA&lt;/P&gt;
&lt;P&gt;If I did not choose "Trust for client authentication and Syslog " while importing Root certificate and when Binding I choose EAP authentication &lt;BR /&gt;What will happen in that case ?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3016698#M23910</guid>
      <dc:creator>muhsi_2015</dc:creator>
      <dc:date>2019-03-11T07:28:13Z</dc:date>
    </item>
    <item>
      <title>Theoretically you could use a</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3016699#M23915</link>
      <description>&lt;P&gt;Theoretically you could use a certificate from a public CA for EAP. Practically you will use your own CA.&lt;/P&gt;
&lt;P&gt;The CA for the portals is a good candidate for public certificate to minimize certificate warnings.&amp;nbsp;But with&amp;nbsp;EAP you only have company managed clients which have your CA-certificate anyway. And you only want to trust the endpoint certificates of your company and not all that are issued by GoDaddy for example.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2017 12:46:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3016699#M23915</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-02-17T12:46:40Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3016700#M23916</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Thanks for your reply .Basically this is to trust only organization owend devices ,That's why internal CA recommended .Correct me if &amp;nbsp;I am wrong ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And what is "&lt;SPAN&gt;Trust for client authentication and Syslog"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If I did not choose "Trust for client authentication and Syslog " while importing Root certificate and when Binding I choose EAP authentication what will happen .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;And If i bind &amp;nbsp;admin portal , EAP authentication &amp;nbsp;with a certificate (multi use ) &amp;nbsp;issued by public ca ,and later &amp;nbsp;I want to put internal CA for EAP ,What is the procedure &amp;nbsp;?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2017 13:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3016700#M23916</guid>
      <dc:creator>muhsi_2015</dc:creator>
      <dc:date>2017-02-17T13:21:50Z</dc:date>
    </item>
    <item>
      <title>Best to start with reading</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3016701#M23919</link>
      <description>&lt;P&gt;Best to start with reading the admin-guide chapter on certificates:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0111.html&lt;/P&gt;
&lt;P&gt;Each certificate is bound to a specific function. This function has to be enabled to work with one of the certificates. As each function (like EAP) can only be served by one certificate, it has to&amp;nbsp;be disabled on the old certificate when enabled on a different one.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2017 13:39:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3016701#M23919</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-02-17T13:39:44Z</dc:date>
    </item>
  </channel>
</rss>

