<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic It also states that Super in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-cisco-ise-internal-ca-to-issue-function-based-certificates/m-p/2780077#M49230</link>
    <description>&lt;P&gt;It also states that Super-Admins can log into the portal, which is also not working for me.&amp;nbsp; I have the Portal setup to authenticate ALL users.&lt;/P&gt;</description>
    <pubDate>Fri, 22 Jan 2016 17:26:08 GMT</pubDate>
    <dc:creator>CCIEBret13</dc:creator>
    <dc:date>2016-01-22T17:26:08Z</dc:date>
    <item>
      <title>Using Cisco ISE Internal CA to issue function based certificates to other ISE nodes.</title>
      <link>https://community.cisco.com/t5/network-access-control/using-cisco-ise-internal-ca-to-issue-function-based-certificates/m-p/2780076#M49228</link>
      <description>&lt;P&gt;Current State:&lt;/P&gt;
&lt;P&gt;2x Admin Nodes&lt;/P&gt;
&lt;P&gt;2x Monitoring and Logging Nodes.&lt;/P&gt;
&lt;P&gt;2x Policy Nodes (Clustered)&lt;/P&gt;
&lt;P&gt;Environment is running using self-signed certificates (copied from all nodes to all other nodes).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Future State:&lt;/P&gt;
&lt;P&gt;I want to replace the self-signed certificates with certificates generated from the Cisco ISE CA.&amp;nbsp; I want to split out the functionality of these certificates into separate certs for Admin/pxGrid/etc.&amp;nbsp; I also want to use the Cisco ISE CA as my internal CA for device management of other systems (routers/switches/firewalls/servers).&amp;nbsp; We do not have a MS CA that we can use.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What I've done so far:&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp; Generated CSRs for all Servers/functions.&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp; Created a Certificate Provisioning Portal.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Issues:&lt;/P&gt;
&lt;P&gt;It appears that the Certificate Provisioning Portal is geared more towards user-based certificate generation.&amp;nbsp; The templates don't allow me to create a template for FQDN or anything server related.&amp;nbsp; Is there a different portal (URL) that I need to be using to generate server certificates?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:25:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-cisco-ise-internal-ca-to-issue-function-based-certificates/m-p/2780076#M49228</guid>
      <dc:creator>CCIEBret13</dc:creator>
      <dc:date>2019-03-11T06:25:03Z</dc:date>
    </item>
    <item>
      <title>It also states that Super</title>
      <link>https://community.cisco.com/t5/network-access-control/using-cisco-ise-internal-ca-to-issue-function-based-certificates/m-p/2780077#M49230</link>
      <description>&lt;P&gt;It also states that Super-Admins can log into the portal, which is also not working for me.&amp;nbsp; I have the Portal setup to authenticate ALL users.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2016 17:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-cisco-ise-internal-ca-to-issue-function-based-certificates/m-p/2780077#M49230</guid>
      <dc:creator>CCIEBret13</dc:creator>
      <dc:date>2016-01-22T17:26:08Z</dc:date>
    </item>
  </channel>
</rss>

