<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can I used a Wild Card Certificate for ISE 2.2 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/can-i-used-a-wild-card-certificate-for-ise-2-2/m-p/3433205#M536083</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;If not already done, take a look at&amp;nbsp; &lt;/SPAN&gt;&lt;A _jive_internal="true" data-containerid="5301" data-containertype="14" data-objectid="68164" data-objecttype="102" href="https://community.cisco.com/docs/DOC-68164" style="font-size: 12px; font-family: arial; color: #0a63a7;"&gt;How To: Implement ISE Server-Side Certificates&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; and other articles on &lt;/SPAN&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-64012#jive_content_id_Certificates__Private_Key_Infrastructure_PKI" style="font-size: 10pt;"&gt;Certificates / Private Key Infrastructure (PKI)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to do either or a mix of the two, but it's down to what ISE services you would deploy and what your use base like. For example, it would work great to use wild-card certificates for ISE guest services, as your visitors' devices would probably get prompted to accept certificates as they unlikely already trust your enterprise CA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 19 Feb 2017 20:37:05 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2017-02-19T20:37:05Z</dc:date>
    <item>
      <title>Can I used a Wild Card Certificate for ISE 2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/can-i-used-a-wild-card-certificate-for-ise-2-2/m-p/3433204#M536081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am in the process of deploying ISE 2.2 waiting for the hardware delivery. I am thinking of using the Wild Card certificate from Digicert issues to my organisation. Can I use the same certificates or do I need to ask my System team to build an internal CA server? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One advantage I could see to use internal CA servers is the validity of the certificate can be for 10 years where as if I go with a wild card certificate I will be restricted to the validity of the certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just want to know what would be the best approach when it come certificates for ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yasir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Feb 2017 07:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/can-i-used-a-wild-card-certificate-for-ise-2-2/m-p/3433204#M536081</guid>
      <dc:creator>yasirirfan</dc:creator>
      <dc:date>2017-02-19T07:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: Can I used a Wild Card Certificate for ISE 2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/can-i-used-a-wild-card-certificate-for-ise-2-2/m-p/3433205#M536083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;If not already done, take a look at&amp;nbsp; &lt;/SPAN&gt;&lt;A _jive_internal="true" data-containerid="5301" data-containertype="14" data-objectid="68164" data-objecttype="102" href="https://community.cisco.com/docs/DOC-68164" style="font-size: 12px; font-family: arial; color: #0a63a7;"&gt;How To: Implement ISE Server-Side Certificates&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; and other articles on &lt;/SPAN&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-64012#jive_content_id_Certificates__Private_Key_Infrastructure_PKI" style="font-size: 10pt;"&gt;Certificates / Private Key Infrastructure (PKI)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to do either or a mix of the two, but it's down to what ISE services you would deploy and what your use base like. For example, it would work great to use wild-card certificates for ISE guest services, as your visitors' devices would probably get prompted to accept certificates as they unlikely already trust your enterprise CA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Feb 2017 20:37:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/can-i-used-a-wild-card-certificate-for-ise-2-2/m-p/3433205#M536083</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-02-19T20:37:05Z</dc:date>
    </item>
  </channel>
</rss>

