<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using ISE CA to sign CSRs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-to-sign-csrs/m-p/3422251#M520596</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If CSRs as in certificate signing requests and if they are conforming to the certificate templates in ISE, then ISE may sign them as George already pointed out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case CSR as in Cisco Cloud Services Router, then &lt;SPAN style="font-size: 10pt;"&gt;ISE internal CA is not currently supporting to issue certificates for Cisco IOS devices, last I checked. It's because Cisco IOS requiring the certificate with Key-encipherment, digital-signature, or both, and the CA certificates in ISE internal CA chains are not meeting that.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 23 Oct 2017 17:10:12 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2017-10-23T17:10:12Z</dc:date>
    <item>
      <title>Using ISE CA to sign CSRs</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-to-sign-csrs/m-p/3422249#M520585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have an ISE deployment that is currently using AD for auth of users. I would like to use certificates to verify the machine identity, one thing that is holding me back is that the deployment has no PKI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As ISE can function as a CA, is it possible to create CSRs on the endpoints and then use the ISE CA to sign them? These are static endpoints and not BYOD, so once the certs are pushed out there is little ongoing admin.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Oct 2017 10:03:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-to-sign-csrs/m-p/3422249#M520585</guid>
      <dc:creator>cat5__utp</dc:creator>
      <dc:date>2017-10-23T10:03:34Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA to sign CSRs</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-to-sign-csrs/m-p/3422250#M520591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does this help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/certificate_provisioning/b_certificateprovisioningportalFAQs.html#reference_BCF69D6F74A547AB93079B75B94231A2__Q1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200534-ISE-2-0-Certificate-Provisioning-Portal.html&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Oct 2017 16:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-to-sign-csrs/m-p/3422250#M520591</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2017-10-23T16:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA to sign CSRs</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-to-sign-csrs/m-p/3422251#M520596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If CSRs as in certificate signing requests and if they are conforming to the certificate templates in ISE, then ISE may sign them as George already pointed out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case CSR as in Cisco Cloud Services Router, then &lt;SPAN style="font-size: 10pt;"&gt;ISE internal CA is not currently supporting to issue certificates for Cisco IOS devices, last I checked. It's because Cisco IOS requiring the certificate with Key-encipherment, digital-signature, or both, and the CA certificates in ISE internal CA chains are not meeting that.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Oct 2017 17:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-to-sign-csrs/m-p/3422251#M520596</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-10-23T17:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISE CA to sign CSRs</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ise-ca-to-sign-csrs/m-p/3422252#M520598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI, Thank you so much for your helpful answer, thats cleared it up for me. Certificate signing requests was indeed what I was looking at instead of cloud services routers. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Oct 2017 08:27:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ise-ca-to-sign-csrs/m-p/3422252#M520598</guid>
      <dc:creator>cat5__utp</dc:creator>
      <dc:date>2017-10-27T08:27:16Z</dc:date>
    </item>
  </channel>
</rss>

