<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Certificates in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3840883#M473725</link>
    <description>&lt;P&gt;Hi.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are 4 certificates under "Certificate Authority Certificates" menu which are Root, OCSP, Node and Endpoint. The validity period of these certificates is as long as 10 years (it shows 2029 as the expiration date).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also by default there are a system certificate under "System Certificates" which is used for Admin, EAP Authentication, DTLS and Portals. The validity period of this certificate is as long as 1 year (it shows 2020 as the expiration date)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With these in mind, I think the system certificate used by ISE in EAP Authentication will expire in a year. Customer asked us to increase its validity period to 10 years, so they won't have to deal with expired certificate on 802.1x process after a year.&lt;/P&gt;&lt;P&gt;I know that using CSR menu on ISE GUI I can create a signing request and sign it with external CA. But how it is done as I want to use ISE internal CA instead to sign this new request and extend its validity period to 10 years? And at the first place why does the default self-signed system certificate on ISE has been set to be valid just for a single year despite that the Root CA certificate on the ISE valid for 10 years?&lt;/P&gt;</description>
    <pubDate>Thu, 18 Apr 2019 08:00:00 GMT</pubDate>
    <dc:creator>ciscoworlds</dc:creator>
    <dc:date>2019-04-18T08:00:00Z</dc:date>
    <item>
      <title>ISE Certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3840883#M473725</link>
      <description>&lt;P&gt;Hi.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are 4 certificates under "Certificate Authority Certificates" menu which are Root, OCSP, Node and Endpoint. The validity period of these certificates is as long as 10 years (it shows 2029 as the expiration date).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also by default there are a system certificate under "System Certificates" which is used for Admin, EAP Authentication, DTLS and Portals. The validity period of this certificate is as long as 1 year (it shows 2020 as the expiration date)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With these in mind, I think the system certificate used by ISE in EAP Authentication will expire in a year. Customer asked us to increase its validity period to 10 years, so they won't have to deal with expired certificate on 802.1x process after a year.&lt;/P&gt;&lt;P&gt;I know that using CSR menu on ISE GUI I can create a signing request and sign it with external CA. But how it is done as I want to use ISE internal CA instead to sign this new request and extend its validity period to 10 years? And at the first place why does the default self-signed system certificate on ISE has been set to be valid just for a single year despite that the Root CA certificate on the ISE valid for 10 years?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 08:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3840883#M473725</guid>
      <dc:creator>ciscoworlds</dc:creator>
      <dc:date>2019-04-18T08:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3841070#M473728</link>
      <description>&lt;P&gt;That is a normal CA setup.&amp;nbsp; The root and Sub CAs usually have long lived certificates as they are used to issue and validate a chain of trust.&amp;nbsp; The actual certificates issued to end devices/clients have a much lower expiry time, typically in the 1-2 year range.&amp;nbsp; I don't believe any of the public CA providers do more than 2 years at this point.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your customer wants to use the internal ISE CA issued cert for EAP authentication and portals?&amp;nbsp; Have you explained to them that no one trusts the ISE internal CA and will get certificate warnings unless you turn off server validation (not a good idea) or distribute the ISE root CA cert to the clients' trusted root CA store?&amp;nbsp; The only thing I use the ISE internal CA cert for is pxGrid.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At this point if you client really doesn't care about certificates, you could just generate a self-signed certificate with a 15 year expiry and use that for everything.&amp;nbsp; If you want to use the ISE internal CA you can make a new template under the Certificate Template screen that has an expiry of up to 10 years and issue certs from that template.&amp;nbsp; Again none of this would I ever recommend to a customer.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 12:28:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3841070#M473728</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-04-18T12:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3841144#M473730</link>
      <description>&lt;P&gt;just supposing that we have decided to increase the validity period of the system certificate on ISE which has one-year validity by default, what will be done on expiration date of that certificate? Does ISE renew its self-signed server certificate which is used for EAP Authentication before expiration date or we need to regenerate a new system certificate before expiration date manually?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my regards;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 14:10:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3841144#M473730</guid>
      <dc:creator>ciscoworlds</dc:creator>
      <dc:date>2019-04-18T14:10:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3841282#M473731</link>
      <description>You will need to manually refresh the ISE certificate.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Apr 2019 17:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3841282#M473731</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-04-18T17:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3842826#M473737</link>
      <description>No appliance will automatically renew certificates. That is counter intuitive to security.&lt;BR /&gt;&lt;BR /&gt;-Krishnan</description>
      <pubDate>Tue, 23 Apr 2019 04:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3842826#M473737</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2019-04-23T04:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3850673#M473781</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/68046"&gt;@kthiruve&lt;/a&gt;&amp;nbsp;Do you mean that we won't need to manually renew the ISE self-signed system certificates used for EAP-authentication, portal, RADIUS, etc at all?&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 10:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3850673#M473781</guid>
      <dc:creator>ciscoworlds</dc:creator>
      <dc:date>2019-05-06T10:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3865427#M473784</link>
      <description>&lt;P&gt;Let me clarify, you need to manually renew certificate. ISE does not automatically renew it for you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Krishnan&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2019 20:58:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates/m-p/3865427#M473784</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2019-05-30T20:58:15Z</dc:date>
    </item>
  </channel>
</rss>

