<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sponsor portal redirect in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719809#M507175</link>
    <description>Updated my certificate to include the SAN for sponsor, now it works. Again, thanks for helping Paul &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
    <pubDate>Fri, 05 Oct 2018 08:39:44 GMT</pubDate>
    <dc:creator>Michael Bartholomæussen</dc:creator>
    <dc:date>2018-10-05T08:39:44Z</dc:date>
    <item>
      <title>Sponsor portal redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719135#M507156</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When sponsors try to access the sponsor portal via FQDN they are unable to access the site. It works if the use the full url &lt;A href="https://helpmyguest.xxx.com:8550/sponsorportal/PortalSetup.action?portal=5b873480-ba69-11e8-ab53-1e43651b66b5" target="_blank"&gt;https://helpmyguest.xxx.com:8550/sponsorportal/PortalSetup.action?portal=5b873480-ba69-11e8-ab53-1e43651b66b5&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I test the portal form within ISE the link fails, and I receive the certificate used on the admin page?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 10:55:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719135#M507156</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-10-04T10:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: Sponsor portal redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719147#M507160</link>
      <description>&lt;P&gt;That is normal.&amp;nbsp; If your sponsor portal certificate is not the same as the admin certificate then you are going to have issues with the sponsor portal FQDN.&amp;nbsp; If the users go to http://&amp;lt;sponsor FQDN&amp;gt; it will work, but problem is ISE support HSTS and if the browser support HSTS even if they type in http:// it will get changed to https://.&amp;nbsp; The certificate running on port 443 on the ISE node is the admin certificate.&amp;nbsp; So you need to connect to admin side to get the URL redirect to the full sponsor URL on 8550.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basically if you are trying to use sponsor FQDN you should be using the same certificate for the admin and sponsor portal cert then everything works fine.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 11:11:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719147#M507160</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-04T11:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: Sponsor portal redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719158#M507164</link>
      <description>Then the solution is to add the SAN of the sponsor portal to the admin certificate?</description>
      <pubDate>Thu, 04 Oct 2018 11:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719158#M507164</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-10-04T11:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: Sponsor portal redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719161#M507167</link>
      <description>&lt;P&gt;Yep, your admin cert should have all the one-off type sites you plan to use in your ISE install.&amp;nbsp; I usually do something like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FQDN of all my ISE nodes&lt;/P&gt;
&lt;P&gt;sponsor.mycompany.com&lt;/P&gt;
&lt;P&gt;ise-bypass.mycompany.com (for the MyDevices portal I use to allow devices onto the network)&lt;/P&gt;
&lt;P&gt;mydevices.mycompany.com (to allow for BYOD use cases)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 11:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719161#M507167</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-04T11:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: Sponsor portal redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719167#M507170</link>
      <description>Did they put that in the config guide - really doesn't ring a bell!&lt;BR /&gt;&lt;BR /&gt;I'll reconfigure my certificate to include the SANs. Would it be ok to use a *, although it's not security best practise?</description>
      <pubDate>Thu, 04 Oct 2018 11:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719167#M507170</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-10-04T11:30:21Z</dc:date>
    </item>
    <item>
      <title>Re: Sponsor portal redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719179#M507173</link>
      <description>&lt;P&gt;Wildcard is fine.&amp;nbsp; I haven't read the guides in years, but I doubt this issue is called out.&amp;nbsp; The issue you are seeing is really an unintended side effect of ISE supporting HSTS.&amp;nbsp; If ISE didn't support HSTS then you could tell your sponsor to go to &lt;A href="http://sponsor.mycompany.com" target="_blank"&gt;http://sponsor.mycompany.com&lt;/A&gt; and everything would work perfectly.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 11:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719179#M507173</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-04T11:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: Sponsor portal redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719809#M507175</link>
      <description>Updated my certificate to include the SAN for sponsor, now it works. Again, thanks for helping Paul &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Fri, 05 Oct 2018 08:39:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/3719809#M507175</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2018-10-05T08:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: Sponsor portal redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/5115935#M589620</link>
      <description>&lt;P&gt;Thank you Paul! We started getting HSTS errors with the portals on a new 3.x deployment. We neglected to check ADMIN on the PSN nodes for our signed cert. Admin (where the redirect happens) and the portal therefore were not using the same certificate.&lt;BR /&gt;Once we checked that both were using same, our HSTS issue was resolved. Hope this detail might help others.&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2024 18:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sponsor-portal-redirect/m-p/5115935#M589620</guid>
      <dc:creator>jone1513</dc:creator>
      <dc:date>2024-05-24T18:39:45Z</dc:date>
    </item>
  </channel>
</rss>

