<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE: dealing with certificates that remain in endpoints in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-dealing-with-certificates-that-remain-in-endpoints/m-p/3596451#M518997</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is ok with this option in mine deployment i did&amp;nbsp; same ,if you choose first option you must change the option in to continue if user not found but there is no user if it is machine certificate and if option is reject it will fail .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Dec 2017 07:07:45 GMT</pubDate>
    <dc:creator>ognyan.totev</dc:creator>
    <dc:date>2017-12-21T07:07:45Z</dc:date>
    <item>
      <title>ISE: dealing with certificates that remain in endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dealing-with-certificates-that-remain-in-endpoints/m-p/3596450#M518995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; &lt;SPAN style="font-size: 12pt;"&gt;Hi Team,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;My customer authenticates their Corporate SSID though their CA certificates.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;However, by some unknown reason, sometimes the endpoints (laptops) maintain those certificates, although they are no longer present in the AD.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;This anomaly results in those endpoints failing authentication to the Wireless Network.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;They found a workaround: altering in ISE, the &lt;SPAN style="font-family: Calibri, sans-serif;"&gt;option “&lt;/SPAN&gt;&lt;SPAN style="font-family: Helvetica, sans-serif;"&gt;&lt;EM&gt;Match Client Certificate Against Certificate In Identity Stor&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;e&lt;/EM&gt;&lt;SPAN style="font-family: Calibri, sans-serif;"&gt;”, from “&lt;/SPAN&gt;&lt;SPAN style="font-family: Helvetica, sans-serif;"&gt;&lt;EM&gt;Always perform binary comparison&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri, sans-serif;"&gt;” to “&lt;/SPAN&gt;&lt;SPAN style="font-family: Helvetica, sans-serif;"&gt;&lt;EM&gt;Only to resolve identity ambiguity&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: Calibri, sans-serif;"&gt;”.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: Calibri, sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: Calibri, sans-serif;"&gt;They would like to know the impact of that workaround, namely in terms of access security.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: Calibri, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: Calibri, sans-serif;"&gt;Any other comments are welcomed!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: Calibri, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: Calibri, sans-serif;"&gt;Thank you in Advance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: Calibri, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: Calibri, sans-serif;"&gt;Best Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: Calibri, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri',sans-serif;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Filipe&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Dec 2017 18:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dealing-with-certificates-that-remain-in-endpoints/m-p/3596450#M518995</guid>
      <dc:creator>jolopes</dc:creator>
      <dc:date>2017-12-19T18:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: dealing with certificates that remain in endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dealing-with-certificates-that-remain-in-endpoints/m-p/3596451#M518997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is ok with this option in mine deployment i did&amp;nbsp; same ,if you choose first option you must change the option in to continue if user not found but there is no user if it is machine certificate and if option is reject it will fail .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Dec 2017 07:07:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dealing-with-certificates-that-remain-in-endpoints/m-p/3596451#M518997</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2017-12-21T07:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: dealing with certificates that remain in endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dealing-with-certificates-that-remain-in-endpoints/m-p/3596452#M518998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much, Ognyan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer would also like to know of possible security issues on using such a workaround.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you or anyone would like to comment, I'd really appreciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Filipe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2017 10:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dealing-with-certificates-that-remain-in-endpoints/m-p/3596452#M518998</guid>
      <dc:creator>jolopes</dc:creator>
      <dc:date>2017-12-22T10:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: dealing with certificates that remain in endpoints</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dealing-with-certificates-that-remain-in-endpoints/m-p/3596453#M518999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, no security violations,if machine have a valid certificate authentication and authorization will be ok ,i test it without certificate cant access network i test it and with expired certificate no access too ,as i told above this work in mine deployment about 1 year .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2017 13:44:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dealing-with-certificates-that-remain-in-endpoints/m-p/3596453#M518999</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2017-12-22T13:44:15Z</dc:date>
    </item>
  </channel>
</rss>

