<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic BYOD Certificate Issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/byod-certificate-issue/m-p/4015279#M454404</link>
    <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've got a problem with my BYOD deployment (dual SSID) on MacOS Catalina.&lt;/P&gt;&lt;P&gt;Everything works fine until the Network Setup Assistant tries to download a profile.&lt;BR /&gt;Even though both of the portals ISE uses in BYOD flow (admin &amp;amp; client provisioning) certificates are signed by a public CA - the NSA shows a warning "the certificate is not valid".&lt;BR /&gt;If I click "continue”, I'm able to successfully enroll certificate and join the network.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When i try to connect to both these portals via safari/chrome, the certificate is validated as expected.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;It seems to me like the NSA doesn’t have rights to use the Mac’s certificate store.&lt;BR /&gt;I know there are some changes for certificates in Catalina (sha1 no longer supported etc..), but our certificates seem to match these new policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using SP wizard version 2.7.0.1&lt;BR /&gt;ISE Version 2.4 patch 9 and also tested with 2.6&lt;/P&gt;&lt;P&gt;Catalina 10.15.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can open a TAC case, but just wanted to ask here before I do so.&lt;/P&gt;&lt;P&gt;Appreciate every hint &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thank You.&lt;/P&gt;</description>
    <pubDate>Wed, 22 Jan 2020 08:05:52 GMT</pubDate>
    <dc:creator>stanislav.pilat</dc:creator>
    <dc:date>2020-01-22T08:05:52Z</dc:date>
    <item>
      <title>BYOD Certificate Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-certificate-issue/m-p/4015279#M454404</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've got a problem with my BYOD deployment (dual SSID) on MacOS Catalina.&lt;/P&gt;&lt;P&gt;Everything works fine until the Network Setup Assistant tries to download a profile.&lt;BR /&gt;Even though both of the portals ISE uses in BYOD flow (admin &amp;amp; client provisioning) certificates are signed by a public CA - the NSA shows a warning "the certificate is not valid".&lt;BR /&gt;If I click "continue”, I'm able to successfully enroll certificate and join the network.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When i try to connect to both these portals via safari/chrome, the certificate is validated as expected.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;It seems to me like the NSA doesn’t have rights to use the Mac’s certificate store.&lt;BR /&gt;I know there are some changes for certificates in Catalina (sha1 no longer supported etc..), but our certificates seem to match these new policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using SP wizard version 2.7.0.1&lt;BR /&gt;ISE Version 2.4 patch 9 and also tested with 2.6&lt;/P&gt;&lt;P&gt;Catalina 10.15.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can open a TAC case, but just wanted to ask here before I do so.&lt;/P&gt;&lt;P&gt;Appreciate every hint &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thank You.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2020 08:05:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-certificate-issue/m-p/4015279#M454404</guid>
      <dc:creator>stanislav.pilat</dc:creator>
      <dc:date>2020-01-22T08:05:52Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD Certificate Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-certificate-issue/m-p/4050495#M559069</link>
      <description>&lt;P&gt;No one? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 14:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-certificate-issue/m-p/4050495#M559069</guid>
      <dc:creator>stanislav.pilat</dc:creator>
      <dc:date>2020-03-23T14:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD Certificate Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-certificate-issue/m-p/4052539#M559161</link>
      <description>&lt;P&gt;IIRC... this related to the trust settings of certificates in macOS. Similar to what described at &lt;A href="https://www.jamf.com/jamf-nation/discussions/22294/adding-a-certificate-to-the-system-keychain-set-to-always-trust" target="_self"&gt;Adding A Certificate To The System Keychain Set To Always Trust&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 00:27:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-certificate-issue/m-p/4052539#M559161</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-03-26T00:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD Certificate Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-certificate-issue/m-p/4055587#M559267</link>
      <description>&lt;P&gt;You already have a TAC case open so not going to duplicate efforts.&lt;/P&gt;
&lt;P&gt;See &lt;A href="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356" target="_self"&gt;How to Ask The Community for Help&lt;/A&gt; &amp;gt; &lt;A href="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356#toc-hId--1967577845" rel="nofollow noopener noreferrer" target="_blank"&gt;The Community is Not TAC&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 00:05:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-certificate-issue/m-p/4055587#M559267</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-03-31T00:05:50Z</dc:date>
    </item>
  </channel>
</rss>

