<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate Check Workflow in ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537617#M500541</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think ISE checks for extended key usage on the cert to ensure client authentication is enabled, but never tested that.&amp;nbsp; The 802.1x supplicant should only be using certs with client auth EKU enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I usually tell customers ISE at a minimum will do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Has the cert been issued by one of the trusted CA certs loaded into ISE that have the "Trust for client authentication and syslog" option set.&amp;nbsp; ISE will not authenticate certs from any CA loaded into ISE only the ones with that option checked.&lt;/LI&gt;&lt;LI&gt;Is the cert valid, i.e. not expired.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Optionally, if configured ISE will also do CRL or OCSP revocation checking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the certificate profile used in authentication is tied to AD the ISE will ensure the identity in the certificate is present in AD.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 Apr 2018 03:04:23 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2018-04-27T03:04:23Z</dc:date>
    <item>
      <title>Certificate Check Workflow in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537615#M500539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I have a question regarding what exactly ISE checks against when doing certificate authentication.&amp;nbsp; In particular, does ISE check key usage on trusted certificates.&amp;nbsp; Does anyone have a process flow, e.g., first check is to verify the cert was signed by a trusted authority, second check is that it is valid after this date and before that date, third check, etc... then check number X is that the client certificate has Client Authentication key usage, and the trusted authority has Cert Signing key usage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks for any help on this!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2018 14:37:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537615#M500539</guid>
      <dc:creator>grleeson</dc:creator>
      <dc:date>2018-04-26T14:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate Check Workflow in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537616#M500540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The steps in ISE authentication detailed reports should tell how endpoints are authenticated and authorized.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, the following go through the TLS exchanges and TLS handshake won't succeed unless ISE EAP server trusting the client certificates' root CA certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="3" class="content_table_steps"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 12501 &lt;/TD&gt;&lt;TD&gt; Extracted EAP-Response/NAK requesting to use EAP-TLS instead &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 12500 &lt;/TD&gt;&lt;TD&gt; Prepared EAP-Request proposing EAP-TLS with challenge &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 11006 &lt;/TD&gt;&lt;TD&gt; Returned RADIUS Access-Challenge &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 11001 &lt;/TD&gt;&lt;TD&gt; Received RADIUS Access-Request &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 11018 &lt;/TD&gt;&lt;TD&gt; RADIUS is re-using an existing session &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 12502 &lt;/TD&gt;&lt;TD&gt; Extracted EAP-Response containing EAP-TLS challenge-response and accepting EAP-TLS as negotiated &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 12800 &lt;/TD&gt;&lt;TD&gt; Extracted first TLS record; TLS handshake started &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 12805 &lt;/TD&gt;&lt;TD&gt; Extracted TLS ClientHello message &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 12806 &lt;/TD&gt;&lt;TD&gt; Prepared TLS ServerHello message &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 12807 &lt;/TD&gt;&lt;TD&gt; Prepared TLS Certificate message &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 12808 &lt;/TD&gt;&lt;TD&gt; Prepared TLS ServerKeyExchange message &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 12809 &lt;/TD&gt;&lt;TD&gt; Prepared TLS CertificateRequest message &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 12505 &lt;/TD&gt;&lt;TD&gt; Prepared EAP-Request with another EAP-TLS challenge &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following shows checks on expiration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="3" class="content_table_steps"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 15048 &lt;/TD&gt;&lt;TD&gt; Queried PIP - CERTIFICATE.Is Expired &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; 15048 &lt;/TD&gt;&lt;TD&gt; Queried PIP - CERTIFICATE.Days to Expiry &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2018 16:58:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537616#M500540</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-04-26T16:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate Check Workflow in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537617#M500541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think ISE checks for extended key usage on the cert to ensure client authentication is enabled, but never tested that.&amp;nbsp; The 802.1x supplicant should only be using certs with client auth EKU enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I usually tell customers ISE at a minimum will do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Has the cert been issued by one of the trusted CA certs loaded into ISE that have the "Trust for client authentication and syslog" option set.&amp;nbsp; ISE will not authenticate certs from any CA loaded into ISE only the ones with that option checked.&lt;/LI&gt;&lt;LI&gt;Is the cert valid, i.e. not expired.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Optionally, if configured ISE will also do CRL or OCSP revocation checking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the certificate profile used in authentication is tied to AD the ISE will ensure the identity in the certificate is present in AD.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Apr 2018 03:04:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537617#M500541</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-04-27T03:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate Check Workflow in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537618#M500542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I first tested SCEP for ISE BYOD, I used a wrong template so the client certificate did not have client auth and failed EAP-TLS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/compatibility/b_ise_sdt_24.html#supportedciphersuites"&gt;Supported Cipher Suites&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; shows &lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" frame="border" rules="all" style="margin: 0.5em 0 1.25em; font-family: CiscoSans, Arial, sans-serif; font-size: 14px; color: #58585b; border: none #cccccc !important;" summary="" width="90%"&gt;&lt;TBODY style="font-size: inherit; font-style: inherit;"&gt;&lt;TR style="border: 0px; font-size: inherit; font-style: inherit;"&gt;&lt;TD class="cellrowborder" style="margin: 0.5em 0; padding: 5px; border: 2px solid #cccccc; font-style: inherit;" valign="top" width="33.23442136498517%"&gt;&lt;P style="font-style: inherit;"&gt;Validate KeyUsage &lt;/P&gt;&lt;/TD&gt;&lt;TD class="cellrowborder" style="margin: 0.5em 0; padding: 5px; border: 2px solid #cccccc; font-style: inherit;" valign="top" width="37.0919881305638%"&gt;&lt;P style="font-style: inherit;"&gt;Client certificate should have KeyUsage=Key Agreement and ExtendedKeyUsage=Client Authentication for the following ciphers: &lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_F62BBB432B1A4B1CBBB64156599AB83E" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;ECDHE-ECDSA-AES128-GCM-SHA256 &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_CE3EB6666EE643118143F0CF433A874D" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;ECDHE-ECDSA-AES256-GCM-SHA384 &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_B540E158C9274E9E8637DCF03CB0C596" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;ECDHE-ECDSA-AES128-SHA256 &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_477A04E2540D4B8198F36D3EB1261F13" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;ECDHE-ECDSA-AES256-SHA384 &lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD class="cellrowborder" style="margin: 0.5em 0; padding: 5px; border: 2px solid #cccccc; font-style: inherit;" valign="top" width="29.673590504451035%"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="border: 0px; font-size: inherit; font-style: inherit;"&gt;&lt;TD class="cellrowborder" style="margin: 0.5em 0; padding: 5px; border: 2px solid #cccccc; font-style: inherit;" valign="top" width="33.23442136498517%"&gt;&lt;SPAN style="font-style: inherit;"&gt;Validate ExtendedKeyUsage &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD class="cellrowborder" style="margin: 0.5em 0; padding: 5px; border: 2px solid #cccccc; font-style: inherit;" valign="top" width="37.0919881305638%"&gt;&lt;SPAN style="font-style: inherit;"&gt;Client certificate should have KeyUsage=Key Encipherment and ExtendedKeyUsage=Client Authentication for the following ciphers: &lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_30E5581D38994709A14F13842342A752" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;AES256-SHA256 &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_75F12AFA07ED4DEC8D757DA9D53FD409" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;AES128-SHA256 &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_8A44D4A9320A425BBB0700E1255B2C83" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;AES256-SHA &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_F24FCF6B06744E6CBA780AADA4289962" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;AES128-SHA &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_FD2F0BCD251E4BE7920269B0F9DCB443" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;DHE-RSA-AES128-SHA &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_A9D4A5728F874A70A5FBC67419744014" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;DHE-RSA-AES256-SHA &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_B3B37C123D80480C86FB110CAA40B4DD" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;DHE-RSA-AES128-SHA256 &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_06477BABC6B14D56921EA79B3B5503F8" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;DHE-RSA-AES256-SHA256 &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_B23B12E6400B4B54B78366FE512717AA" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;ECDHE-RSA-AES256-GCM-SHA384 &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_17A3FA359FCB4FE78FF1548C401CF5D3" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;ECDHE-RSA-AES128-GCM-SHA256 &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_90C9034B07B34B7AB960564470D07A3A" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;ECDHE-RSA-AES256-SHA384 &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_CBBDA5030DCF4EFBABE299DDD8AD7E41" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;ECDHE-RSA-AES128-SHA256 &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_C3A235DA15A841398703F3F3E3B8EBB5" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;ECDHE-RSA-AES256-SHA &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_BE7C54C8EA304936B21F296278CFCFDF" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;ECDHE-RSA-AES128-SHA &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_4C53BBB735DB4046B47434C4EB171CAA" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;EDH-RSA-DES-CBC3-SHA &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_05CBACD6A2674AB09E1D6710DF26354F" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;DES-CBC3-SHA &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_FED11F981BD74D019A71D720ADFE479B" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;RC4-SHA &lt;/LI&gt;&lt;LI&gt;&lt;A name="supportedciphersuites__li_D4DFE7627A8740869A554832903A320B" style="font-size: inherit; font-style: inherit; color: #007fab;"&gt;&lt;/A&gt;RC4-MD5 &lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD class="cellrowborder" style="margin: 0.5em 0; padding: 5px; border: 2px solid #cccccc; font-style: inherit;" valign="top" width="29.673590504451035%"&gt;&lt;P style="font-style: inherit;"&gt;Server certificate should have ExtendedKeyUsage=Server Authentication&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Apr 2018 03:35:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537618#M500542</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-04-27T03:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate Check Workflow in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537619#M500543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice.  That is good to know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from my iPhone&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Apr 2018 03:38:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537619#M500543</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-04-27T03:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate Check Workflow in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537620#M500544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the input.&amp;nbsp; Specifically what I'm looking for is whether ISE checks if a trusted certificate has the Cert Signing EKU.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What prompted the question was configuring 802.1x on phones with CUCM.&amp;nbsp; The CAPF certificate on Call Manager was signed using the Web Server template, instead of the Sub-CA template, so it didn't have the Cert Signing EKU.&amp;nbsp; Needless to say, things didn't work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I suspect was going on, (but I can't verify without a packet capture from the failed requests), is that the LSC certs that were being applied to the phones by Call Manager were using the self-signed CAPF Sub-CA certificate (CAPF-abc12345).&amp;nbsp; So ISE couldn't authenticate that, since it had to mis-configured WebServer CAPF (CAPF-xyz12345) cert in the trusted store.&amp;nbsp; But the question that I'm being asked is, "Does ISE check whether a trusted cert has the cert-signing EKU?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authentication failure details don't tell you what cert was presented from the client, it just says the handshake failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for the help on this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Apr 2018 13:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537620#M500544</guid>
      <dc:creator>grleeson</dc:creator>
      <dc:date>2018-04-27T13:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate Check Workflow in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537621#M500545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Below link from Aaron blog is also useful&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.networkworld.com/article/2226498/infrastructure-management/simply-put-how-does-certificate-based-authentication-work.html" title="https://www.networkworld.com/article/2226498/infrastructure-management/simply-put-how-does-certificate-based-authentication-work.html"&gt;https://www.networkworld.com/article/2226498/infrastructure-management/simply-put-how-does-certificate-based-authenticat…&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Apr 2018 16:23:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537621#M500545</guid>
      <dc:creator>Parag Mahajan</dc:creator>
      <dc:date>2018-04-28T16:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate Check Workflow in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537622#M500546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/compatibility/b_ise_sdt_24.html#requirementsforca" style="font-size: 10pt;"&gt;Requirements for CA to Interoperate with Cisco ISE&lt;/A&gt;&lt;/P&gt;&lt;P&gt;says,&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="margin-top: 1px; margin-bottom: 0.5em; font-size: 14px; font-style: inherit;"&gt;Key usage should allow signing and encryption in extension.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 May 2018 03:31:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537622#M500546</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-05-05T03:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate Check Workflow in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537623#M500547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, everybody. I appreciate the help. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 May 2018 10:52:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-check-workflow-in-ise/m-p/3537623#M500547</guid>
      <dc:creator>grleeson</dc:creator>
      <dc:date>2018-05-05T10:52:42Z</dc:date>
    </item>
  </channel>
</rss>

