<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE BYOD handling of expired or expiring certs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3730939#M536292</link>
    <description>Yes that’s the only way for the client to be redirect to do so. This is not an MDM solution so we have no controls over the endpoint OS&lt;BR /&gt;</description>
    <pubDate>Tue, 23 Oct 2018 18:03:25 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2018-10-23T18:03:25Z</dc:date>
    <item>
      <title>ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3564168#M536285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I know we have the option since some time back to allow a client whose cert is expired/expiring to the onboarding portal.&lt;/P&gt;&lt;P&gt;I also remember some good slides (ISE techtorial or similar) that described the config to cover for different client OS... &lt;/P&gt;&lt;P&gt;Can anyone point me to those slides?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hakan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2017 18:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3564168#M536285</guid>
      <dc:creator>hnohre</dc:creator>
      <dc:date>2017-02-01T18:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3564169#M536287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe others can followup regarding the deck, but the configuration is same for any client OS. There is an attribute in the authorization condition called 'CERTIFICATE:Days to Expiry'. With that you can craft an Authorization policy rule that reads, 'If CERTIFICATE:Days to Expiry is less than 15 days, then assign BYOD flow' which forces user to go through the BYOD process again. Now if the certificate already expired, then the endpoint will not be able to associate to the secured WLAN as ISE will deny access due to invalid certificate, to cover that scenario, you can allow dual-SSID BYOD flow in the guest WLAN and force them through BYOD flow when employee user logs into the guest portal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2017 19:08:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3564169#M536287</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2017-02-01T19:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3564170#M536288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the screenshot of what is supported as part of CERTIFICATE attribute that you can add as part of authorization condition in the authorization policy under BYOD.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/104364_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2017 19:19:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3564170#M536288</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2017-02-01T19:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3712585#M536289</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/386008"&gt;@howon&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have ISE 2.4 patch 3 and I am testing what happens when a BYOD user is authenticated with a client cert that is about to expire.&lt;/P&gt;
&lt;P&gt;I catch that condition in Authorization Policy, and I use an Authorization Profile as follows&lt;/P&gt;
&lt;P&gt;Web Redirection = Native Supplicant Provisioning&lt;/P&gt;
&lt;P&gt;On the client, I can get redirected and I see the following screen - the error seems to make sense - how does ISE know the user's identity, when they immediately get redirected to the NSP Portal without any authentication?&lt;/P&gt;
&lt;P&gt;When I initially on boarded this user, I did it via Guest Portal - and there I can of course authenticate the user.&amp;nbsp; How does it work if I redirect directly to the NSP BYOD portal?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BYOD-error.PNG" style="width: 562px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19140iEAE259AE1AA3545D/image-size/large?v=v2&amp;amp;px=999" role="button" title="BYOD-error.PNG" alt="BYOD-error.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 04:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3712585#M536289</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-09-25T04:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3712616#M536290</link>
      <description>&lt;P&gt;Arne, actually you caught my error there. You should create a CWA portal that forces BYOD for employees instead of BYOD portal and use it during expired certificate flow on 802.1X WLAN. Quick step here:&lt;/P&gt;
&lt;P&gt;1. Create CWA portal that forces employee to go through BYOD (You can reuse existing one if present already)&lt;/P&gt;
&lt;P&gt;2. Create AuthZ profile for CWA, make sure to check '&lt;SPAN&gt;Display Certificates Renewal Message' option&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-09-25 at 1.23.45 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19141i8E2FFD9C7E2AC6F5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-09-25 at 1.23.45 AM.png" alt="Screen Shot 2018-09-25 at 1.23.45 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. Create policy that gets matched for 802.1X WLAN that user connects to using the certificate as following: "If CERTIFICATE:Days to Expiry LESS X" then assign the AuthZ profile created above&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-09-25 at 1.37.44 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19142i81839118FDDBDB93/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-09-25 at 1.37.44 AM.png" alt="Screen Shot 2018-09-25 at 1.37.44 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now, when the user connects to the 802.1X WLAN with the certificate nearing expiry, the user will get redirected per policy you created, and due to the&amp;nbsp;'Display Certificates Renewal Message' option used in the AuthZ profile, ISE will append 'daysToExpiry=Y' parameter at the end of the URL redirect string as shown below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://ise.example.com:8443/portal/PortalSetup.action?portal=babebabe...babebabe&amp;amp;sessionId=abeabeabe...abeabe&amp;amp;action=cwa&amp;amp;redirect=www.cisco.com%2F&amp;amp;" target="_blank"&gt;https://ise.example.com:8443/portal/PortalSetup.action?portal=babebabe...babebabe&amp;amp;sessionId=abeabeabe...abeabe&amp;amp;action=cwa&amp;amp;redirect=www.cisco.com%2F&amp;amp;&lt;/A&gt;&lt;FONT color="#FF0000"&gt;daysToExpiry=11&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;User will be forced to login to the portal and then the BYOD renewal process will start. Instead of seeing 'Start' button, user will see 'Renewal' button.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-09-25 at 1.36.02 AM.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19143iD0FDAEE91DF9DCE0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2018-09-25 at 1.36.02 AM.png" alt="Screen Shot 2018-09-25 at 1.36.02 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 06:53:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3712616#M536290</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-09-25T06:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3730937#M536291</link>
      <description>&lt;P&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN&gt;Is there an update on this issue?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN&gt;Is the only way to renew a BYOD certificate is through CWA?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 18:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3730937#M536291</guid>
      <dc:creator>daniel.landry</dc:creator>
      <dc:date>2018-10-23T18:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3730939#M536292</link>
      <description>Yes that’s the only way for the client to be redirect to do so. This is not an MDM solution so we have no controls over the endpoint OS&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Oct 2018 18:03:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3730939#M536292</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-10-23T18:03:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3730947#M536293</link>
      <description>&lt;P&gt;&lt;SPAN&gt;no other way to renew without redoing the onbooarding process?&lt;BR /&gt;no difference in dual or single SSID?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 18:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3730947#M536293</guid>
      <dc:creator>daniel.landry</dc:creator>
      <dc:date>2018-10-23T18:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3730967#M536294</link>
      <description>Client needs new cert and that cert associated to the supplicant profile for EAP-TLS. That’s the only way outside of MDM&lt;BR /&gt;&lt;BR /&gt;Page 36 - &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-byod-deployment-guide/ta-p/3641867" target="_blank"&gt;https://community.cisco.com/t5/security-documents/cisco-ise-byod-deployment-guide/ta-p/3641867&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Oct 2018 18:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3730967#M536294</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-10-23T18:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3731062#M536295</link>
      <description>&lt;P&gt;And with this setup (single SSID):&lt;/P&gt;
&lt;DIV class="trans-verified-button-small" id="gt-res-dir-ctr" dir="ltr"&gt;&lt;SPAN&gt;when the certificate is expired, does the user simply enter the NSP process to reinstall a valid certificate ?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="trans-verified-button-small" dir="ltr"&gt;&lt;SPAN&gt;&lt;SPAN class="short_text"&gt;therefore, no CWA with single SSID ?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2018-10-23 16_58_00-MS Word Template_102504 - Adobe Reader.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/21053iBBC69FBBC5C3FB67/image-size/large?v=v2&amp;amp;px=999" role="button" title="2018-10-23 16_58_00-MS Word Template_102504 - Adobe Reader.jpg" alt="2018-10-23 16_58_00-MS Word Template_102504 - Adobe Reader.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 21:02:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3731062#M536295</guid>
      <dc:creator>daniel.landry</dc:creator>
      <dc:date>2018-10-23T21:02:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3732023#M536296</link>
      <description>&lt;P&gt;&lt;SPAN&gt;After a few thoughts and tries, I think my question was not really understandable. In this scenario, i think the renouncement is also done by CWA !?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 19:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3732023#M536296</guid>
      <dc:creator>daniel.landry</dc:creator>
      <dc:date>2018-10-24T19:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3732034#M536297</link>
      <description>&lt;P&gt;We force CWA as we need to confirm the user credential for the re-issuance of certificate. This is a way of making sure the user is indeed the user who was issued the certificate. Without this, any user who has access to the certificate pair would be able to gain access indefinitely. If this is not desired, then recommend extending the validity date.&lt;BR /&gt;&lt;BR /&gt;With your policy, when the certificate expires, user will be denied access to the secure SSID unless ISE is configured to allow expired certificates. If you want to allow renewal flow then follow my example above where you are forcing CWA for secured SSID. Alternatively, user can connect to open/guest SSID to renew certificate provided that BYOD is enabled on open/guest SSID flow.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 20:06:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/3732034#M536297</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-10-24T20:06:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD handling of expired or expiring certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/5350430#M599106</link>
      <description>&lt;P&gt;Was this condition&amp;nbsp;&lt;SPAN&gt;'CERTIFICATE:Days to Expiry' removed from ISE in the 3.x versions?&amp;nbsp;&lt;BR /&gt;I´m running 3.2 P8 and the condition cannot be used/found anymore in the condition builder. Picture attached.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Nov 2025 10:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-handling-of-expired-or-expiring-certs/m-p/5350430#M599106</guid>
      <dc:creator>Andrej Sumak</dc:creator>
      <dc:date>2025-11-27T10:50:19Z</dc:date>
    </item>
  </channel>
</rss>

