<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE 2.3 as intermediate CA und Microsoft Root CA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3704859#M507681</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am trying to&amp;nbsp;&lt;SPAN&gt;Bind CA Signed Certificate to the CSR generated for intermediate CA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The root ca is a Microsoft Server 2012R2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ISE is Version 2.3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When binding the certificate, i get the following error:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Certificate does not comply with intermediate certification authority template.&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Unbenannt.PNG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/18482iFB2E3376159C5213/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Unbenannt.PNG" alt="Unbenannt.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The certficate i am trying to bind, looks fine to me:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Digital Signature, Certificate Signing, Off-line CRL Signing, CRL Signing (86)&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Unbenannt.PNG" style="width: 321px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/18485iF445EBBA8595B885/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Unbenannt.PNG" alt="Unbenannt.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Has anyone encountered this issue before?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'm guessing something is wrong with our Root ca, but who knows.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help is appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 11 Sep 2018 14:08:52 GMT</pubDate>
    <dc:creator>nw-team01</dc:creator>
    <dc:date>2018-09-11T14:08:52Z</dc:date>
    <item>
      <title>ISE 2.3 as intermediate CA und Microsoft Root CA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3704859#M507681</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am trying to&amp;nbsp;&lt;SPAN&gt;Bind CA Signed Certificate to the CSR generated for intermediate CA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The root ca is a Microsoft Server 2012R2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ISE is Version 2.3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When binding the certificate, i get the following error:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Certificate does not comply with intermediate certification authority template.&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Unbenannt.PNG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/18482iFB2E3376159C5213/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Unbenannt.PNG" alt="Unbenannt.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The certficate i am trying to bind, looks fine to me:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Digital Signature, Certificate Signing, Off-line CRL Signing, CRL Signing (86)&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Unbenannt.PNG" style="width: 321px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/18485iF445EBBA8595B885/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Unbenannt.PNG" alt="Unbenannt.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Has anyone encountered this issue before?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'm guessing something is wrong with our Root ca, but who knows.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help is appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 14:08:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3704859#M507681</guid>
      <dc:creator>nw-team01</dc:creator>
      <dc:date>2018-09-11T14:08:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 as intermediate CA und Microsoft Root CA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3704912#M507682</link>
      <description>&lt;P&gt;Suggest looking at ise-psc.log. The log should provide information on why the certificate was rejected.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 14:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3704912#M507682</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-09-11T14:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 as intermediate CA und Microsoft Root CA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3704929#M507683</link>
      <description>&lt;P&gt;I can't see your EKU settings.&amp;nbsp; Do you have both client and server authentication enabled?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 15:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3704929#M507683</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-11T15:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 as intermediate CA und Microsoft Root CA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3705537#M507684</link>
      <description>&lt;P&gt;Yes, i have both client server authentication enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I searched the ise-psc.log. I can't find anything conclusive, i've attached the log segment from when attempting to bind the certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Sep 2018 13:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3705537#M507684</guid>
      <dc:creator>nw-team01</dc:creator>
      <dc:date>2018-09-12T13:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 as intermediate CA und Microsoft Root CA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3705852#M507685</link>
      <description>&lt;P&gt;Try bumping up the ca-service log under Administration -&amp;gt; System -&amp;gt; Logging -&amp;gt; Debug Log Configuration to debug and go through bind process again.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Sep 2018 20:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3705852#M507685</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-09-12T20:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 as intermediate CA und Microsoft Root CA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3705866#M507686</link>
      <description>&lt;P&gt;Please see if you are using the right template in the CA to create the certificate.&lt;/P&gt;
&lt;P&gt;Here is more information&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI id="reference_BA12C702B56C45ECA55ED620EAF80D84__li_0D9803A650FD48199F9879C419BC8669" class="li"&gt;
&lt;P class="p"&gt;ISE Intermediate CA—(Applicable only for the internal CA service when &lt;SPAN class="ph"&gt;ISE&lt;/SPAN&gt; acts as an intermediate CA of an external PKI) Used to generate an intermediate CA certificate on the Primary PAN and subordinate CA certificates on the PSNs. The certificate template on the signing CA is often called a Subordinate Certificate Authority. This template has the following properties:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI id="reference_BA12C702B56C45ECA55ED620EAF80D84__li_A72BFBF38ADE47E8866D1D1C09E36F0F" class="li"&gt;
&lt;P class="p"&gt;Basic Constraints: Critical, Is a Certificate Authority&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="reference_BA12C702B56C45ECA55ED620EAF80D84__li_8C90E427C90F48CD80E9F75C37039902" class="li"&gt;
&lt;P class="p"&gt;Key Usage: Certificate Signing, Digital Signature&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="reference_BA12C702B56C45ECA55ED620EAF80D84__li_F8952D99BECA4A9DBAABEBFEB26AB5FE" class="li"&gt;
&lt;P class="p"&gt;Extended Key Usage: OCSP Signing (1.3.6.1.5.5.7.3.9)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Krishnan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Sep 2018 20:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3705866#M507686</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2018-09-12T20:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 as intermediate CA und Microsoft Root CA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3706325#M507687</link>
      <description>&lt;P&gt;This ist the only useful message i'm getting from the log file, after setting debug condition:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Error occurred while verifying certificates for host: svtg001ise01.tg-cee.net. com.cisco.epm.cert.validator.CertPathVerificationException: Certificate Signature Verification failed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I created a Policy.inf file to generate the certificate, please see attached.&lt;/P&gt;
&lt;P&gt;As it is a offline root ca, there are no (visible) certificate templates. The only thing i can influence, is the .inf file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have the root ca certificate imported under trusted certificates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm running out of Ideas &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 14:14:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3706325#M507687</guid>
      <dc:creator>nw-team01</dc:creator>
      <dc:date>2018-09-13T14:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 as intermediate CA und Microsoft Root CA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3706368#M507688</link>
      <description>Would recommend troubleshoot through TAC.&lt;BR /&gt;&lt;BR /&gt;Also consider do you truly need to add ISE to be part of the PKI? If you’re doing BYOD onboarding using Native supplicant and certificate provisioning then use ISE self contained. It just works out of the box with minor setup ☺&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Sep 2018 15:04:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3706368#M507688</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-09-13T15:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 as intermediate CA und Microsoft Root CA</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3862661#M507689</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This was probably already solved for you but if someone else runs into this, make sure to use a SubCa (Subordinate Certification Authority) as the certificate template from Microsoft CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my lab this is what the cert has and it works for ISE's intermediate CA:&lt;/P&gt;
&lt;P&gt;EKU&lt;/P&gt;
&lt;P&gt;Server Authentication (1.3.6.1.5.5.7.3.1)&lt;BR /&gt;Client Authentication (1.3.6.1.5.5.7.3.2)&lt;BR /&gt;OCSP Signing (1.3.6.1.5.5.7.3.9)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Key Usage&lt;/P&gt;
&lt;P&gt;Digital Signature, Certificate Signing, Off-line CRL Signing, CRL Signing (86)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The template has Basic Constraint as: "The subject is a certification authority (CA)." Critical extension.&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 21:06:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-as-intermediate-ca-und-microsoft-root-ca/m-p/3862661#M507689</guid>
      <dc:creator>Eric Pineda</dc:creator>
      <dc:date>2019-05-24T21:06:15Z</dc:date>
    </item>
  </channel>
</rss>

