<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Generate a CSR form openssl in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/generate-a-csr-form-openssl/m-p/3706796#M507653</link>
    <description>&lt;P&gt;Just curious, why aren't you using the ISE internal CA for pxGrid?&amp;nbsp; Makes the whole process of generating certs/private keys for pxGrid client much easier.&amp;nbsp; pxGrid is a special framework to pass information to and from ISE.&amp;nbsp; I haven't seen a good argument not to let the ISE CA control access to the pxGrid.&lt;/P&gt;</description>
    <pubDate>Fri, 14 Sep 2018 01:52:29 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2018-09-14T01:52:29Z</dc:date>
    <item>
      <title>Generate a CSR form openssl</title>
      <link>https://community.cisco.com/t5/network-access-control/generate-a-csr-form-openssl/m-p/3706458#M507635</link>
      <description>&lt;P&gt;&lt;SPAN&gt;hi, &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This is a general certificate question but I guess ISE community is the best place to answer it &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I am trying to do an infoblox pxGrid with ISE. Infoblox does not have ability to generate a CSR with pxGrid template and CA folk is struggling to generate a cert without CSR (pkcs12 or pkcs8). Does it make sense to generate a csr via openssl, retain the private key, send the csr to CA and then bind the returned certificate in to pk12 and import it into infoblox ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 16:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/generate-a-csr-form-openssl/m-p/3706458#M507635</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2018-09-13T16:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: Generate a CSR form openssl</title>
      <link>https://community.cisco.com/t5/network-access-control/generate-a-csr-form-openssl/m-p/3706530#M507637</link>
      <description>&lt;P&gt;have you checked any of the ise infloblox docs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cisco-marketing.hosted.jivesoftware.com/docs/DOC-64012#jive_content_id_InfoBlox" target="_blank"&gt;https://cisco-marketing.hosted.jivesoftware.com/docs/DOC-64012#jive_content_id_InfoBlox&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also copied&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/55921"&gt;@jeppich&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 18:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/generate-a-csr-form-openssl/m-p/3706530#M507637</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-09-13T18:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: Generate a CSR form openssl</title>
      <link>https://community.cisco.com/t5/network-access-control/generate-a-csr-form-openssl/m-p/3706565#M507642</link>
      <description>&lt;P&gt;Thanks a lot Jason.&lt;/P&gt;
&lt;P&gt;This is the exact document I was looking for.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately I was following the doc which uses internal ISE as the CA for this integration.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 18:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/generate-a-csr-form-openssl/m-p/3706565#M507642</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2018-09-13T18:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: Generate a CSR form openssl</title>
      <link>https://community.cisco.com/t5/network-access-control/generate-a-csr-form-openssl/m-p/3706748#M507648</link>
      <description>&lt;P&gt;Maybe I can help.&amp;nbsp; I had a situation yesterday with an Aruba controller - I need to get an admin cert on this box, signed by our PKI.&amp;nbsp; This controller has the ability to create CSR, but it doesn't allow provision for SAN attributes. Stupid, right?&amp;nbsp; No problem to solve this with openssl and some elbow grease &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp; The good news is that the controller allowed the admin cert to be imported as a single file.&amp;nbsp; Aha.&amp;nbsp; A PCKS12 file that contains the cert, the private key and any CA chain required.&amp;nbsp; &lt;/P&gt;
&lt;P&gt;High level tasks&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Create private key with openssl&lt;/LI&gt;
&lt;LI&gt;Create a CSR with all the attributes you need (if you need SAN, then you need to create a config file)&lt;/LI&gt;
&lt;LI&gt;Send the CSR to the PKI to create the cert.&lt;/LI&gt;
&lt;LI&gt;Once you have the cert, you need to package cert+privkey into a PKCS12 file, password protected.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Here is a worked example in Linux openssl (just substitute the filenames and contents as appropriate)&lt;/P&gt;
&lt;P&gt;I created a san.cnf file that contained the data I needed for SAN - if you don't need a SAN then ignore this&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;[ req ]
default_bits       = 2048
distinguished_name = req_distinguished_name
req_extensions     = req_ext
[ req_distinguished_name ]
countryName                 = Country Name (2 letter code)
stateOrProvinceName         = State or Province Name (full name)
localityName               = Locality Name (eg, city)
organizationName           = Organization Name (eg, company)
commonName                 = Common Name (e.g. server FQDN or YOUR name)
[ req_ext ]
subjectAltName = @alt_names
[alt_names]
DNS.1   = aruba7005
DNS.2   = aruba7005.mydomain.com
IP.1   = 192.168.1.2&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then I ran these commands&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;openssl genrsa -out aruba7005-key.pem 2048
openssl req -new -sha256 -key aruba7005-key.pem -out aruba7005-cert.csr -config san.cnf
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Get the CSR processed by the CA.&amp;nbsp; In my case the certificate was called aruba7005-cert-with-san.pem&lt;/P&gt;
&lt;P&gt;Then create the PKCS12 file as follows&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;openssl pkcs12 -export -out arubafinal.pfx -inkey aruba7005-key.pem -in aruba7005-cert-with-san.pem&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The final resulting package is called arubafinal.pfx and this is password protected (the openssl will prompt for a password) - this is the file you should be able to import into your device.&amp;nbsp; The private key and the public cert/key will be installed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 23:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/generate-a-csr-form-openssl/m-p/3706748#M507648</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-09-13T23:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: Generate a CSR form openssl</title>
      <link>https://community.cisco.com/t5/network-access-control/generate-a-csr-form-openssl/m-p/3706796#M507653</link>
      <description>&lt;P&gt;Just curious, why aren't you using the ISE internal CA for pxGrid?&amp;nbsp; Makes the whole process of generating certs/private keys for pxGrid client much easier.&amp;nbsp; pxGrid is a special framework to pass information to and from ISE.&amp;nbsp; I haven't seen a good argument not to let the ISE CA control access to the pxGrid.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Sep 2018 01:52:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/generate-a-csr-form-openssl/m-p/3706796#M507653</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-14T01:52:29Z</dc:date>
    </item>
  </channel>
</rss>

