<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE default trusted CA certificates in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736883#M542841</link>
    <description>&lt;P&gt;Hey hslai,&lt;/P&gt;
&lt;P&gt;thanks for the feedback!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;Root: Cisco Root CA M2 / Intermediate: Cisco Manufacturing CA SHA2&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This is there for your convenience to use cert-based auth for Cisco devices, such as Cisco APs and Cisco IP phones. You may disable or delete them if you have no Cisco devices performing EAP-TLS against ISE.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Ok - got that. Except the point with the APs ... the lightweight APs are only capable of performing EAP-FAST using credentials if acting as an 802.1X supplicant. For the phones - I don't know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Root: DigiCert root CA / Intermediate: DigiCert SHA2 High Assurance Server CA&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;Earlier on, this was the root CA certificate for &lt;A href="http://www.cisco.com" target="_blank"&gt;www.cisco.com&lt;/A&gt; in some region and needed for ISE feed services.&amp;nbsp; &lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I might be wrong, but then the "trusted for" settings are incorrect. For feed service the "trusted for" purpose must be set to "Cisco services" - correct? Furthermore the field notice is referring to another CA....&lt;/P&gt;</description>
    <pubDate>Wed, 31 Oct 2018 21:51:23 GMT</pubDate>
    <dc:creator>Johannes Luther</dc:creator>
    <dc:date>2018-10-31T21:51:23Z</dc:date>
    <item>
      <title>ISE default trusted CA certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736297#M542830</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;in ISE 2.4 i see the following enabled default CA certificates in the trusted store for infrastructure and endpoint trust:&lt;/P&gt;
&lt;P&gt;Root: Cisco Root CA M2 / Intermediate: Cisco Manufacturing CA SHA2&lt;/P&gt;
&lt;P&gt;Root: DigiCert root CA / Intermediate: DigiCert SHA2 High Assurance Server CA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't quite get why these CAs are preinstalled for infrastructure and client trust. These CAs are not mentioned in any ISE guide I found.&lt;/P&gt;
&lt;P&gt;If you don't build your EAP-TLS authorization rules very carefully (e.g. not checking the issuer CN or doing an additional AD lookup), client certificates signed by these CAs are allowed to access the network. (certificate based authentication will pass / it all depends on the authorization).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are the CAs there by intention (because we're doing intention-based networking &amp;gt;:) ). If yes, what is the purpose?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 08:51:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736297#M542830</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2019-03-11T08:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE default trusted CA certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736340#M542832</link>
      <description>&lt;P&gt;that's an interesting observation about the Digicert CA certs.&amp;nbsp; Yes it could cause a backdoor into ISE if not careful.&amp;nbsp; Might be worth deleting these certs - they serve no purpose.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 11:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736340#M542832</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-10-31T11:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE default trusted CA certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736378#M542835</link>
      <description>&lt;P&gt;Hi again Arne (obviously the ISE world is kinda' small) &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#3366FF"&gt;&lt;EM&gt;&amp;gt;&amp;gt; Might be worth deleting these certs - they serve no purpose.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;I'm &lt;EM&gt;assuming &lt;/EM&gt;this as well, but I'm quite unsure... Before I delete them in a big production environment, I want to understand the purpose (or the itention &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Perhaps anyone from Cisco stumbles upon this... Otherwise I guess I'll have to open a TAC case.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 12:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736378#M542835</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2018-10-31T12:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE default trusted CA certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736800#M542838</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;Root: Cisco Root CA M2 / Intermediate: Cisco Manufacturing CA SHA2&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This is there for your convenience to use cert-based auth for Cisco devices, such as Cisco APs and Cisco IP phones. You may disable or delete them if you have no Cisco devices performing EAP-TLS against ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Root: DigiCert root CA / Intermediate: DigiCert SHA2 High Assurance Server CA&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;Earlier on, this was the root CA certificate for &lt;A href="http://www.cisco.com" target="_blank"&gt;www.cisco.com&lt;/A&gt; in some region and needed for ISE feed services. With&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/field-notices/701/fn70122.html" target="_blank"&gt;Field Notice: FN - 70122 - Cisco Identity Services Engine – Posture and BYOD Package Updates Will Fail Without ISE Trust Store Update to New HydrantID Root Certificates - Software Upgrade Recommended - Cisco&lt;/A&gt;&lt;/SPAN&gt;, I do not think ISE still needing it. You may double check the certificate chain of &lt;A href="https://www.cisco.com" target="_blank"&gt;https://www.cisco.com&lt;/A&gt; in your region.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 19:24:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736800#M542838</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-31T19:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE default trusted CA certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736883#M542841</link>
      <description>&lt;P&gt;Hey hslai,&lt;/P&gt;
&lt;P&gt;thanks for the feedback!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;Root: Cisco Root CA M2 / Intermediate: Cisco Manufacturing CA SHA2&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This is there for your convenience to use cert-based auth for Cisco devices, such as Cisco APs and Cisco IP phones. You may disable or delete them if you have no Cisco devices performing EAP-TLS against ISE.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Ok - got that. Except the point with the APs ... the lightweight APs are only capable of performing EAP-FAST using credentials if acting as an 802.1X supplicant. For the phones - I don't know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Root: DigiCert root CA / Intermediate: DigiCert SHA2 High Assurance Server CA&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;Earlier on, this was the root CA certificate for &lt;A href="http://www.cisco.com" target="_blank"&gt;www.cisco.com&lt;/A&gt; in some region and needed for ISE feed services.&amp;nbsp; &lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I might be wrong, but then the "trusted for" settings are incorrect. For feed service the "trusted for" purpose must be set to "Cisco services" - correct? Furthermore the field notice is referring to another CA....&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 21:51:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736883#M542841</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2018-10-31T21:51:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE default trusted CA certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736925#M542845</link>
      <description>&lt;P&gt;I am probably wrong in assuming Cisco AP using the manufacturing CA, but potentially anything made by Cisco could use the same chain. Newer Cisco APs appear capable of such. See &lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-7/b_802_1x_eap_supplicant_on_cos_ap.html" target="_self"&gt;802.1X EAP Supplicant on COS AP - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;I might be wrong, but then the "trusted for" settings are incorrect. For feed service the "trusted for" purpose must be set to "Cisco services" - correct? Furthermore the field notice is referring to another CA....&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Correct. For ISE Feed Services, the option "Trust for authentication of Cisco Services" is what required, so we may disable the other options unless the same certificate chain used for other purposes.&lt;/P&gt;
&lt;P&gt;As to the field notice about another CA used for the feed services, that is correct as well and that is the reason why the DigiCert one likely no longer used.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 23:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736925#M542845</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-31T23:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE default trusted CA certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736938#M542848</link>
      <description>&lt;P&gt;The DigiCert CA certificate pair are actually used for Guest Social Login Flow with FaceBook. The trust settings are those for the protocol runtime. You may disable/delete them if not using such flow in your deployment.&lt;/P&gt;
&lt;P&gt;Sorry for wrong info, earlier.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Nov 2018 00:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3736938#M542848</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-11-01T00:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE default trusted CA certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3738942#M542851</link>
      <description>&lt;P&gt;Hello Hslai,&lt;/P&gt;
&lt;P&gt;thank you for the very detailed answer! I didn't know, that the newer Cisco APs supplicant support EAP-TLS (well, the 8.7 release is kinda new) &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So for now I'll disable those CA certificates. Thanks again!&lt;/P&gt;</description>
      <pubDate>Mon, 05 Nov 2018 08:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-default-trusted-ca-certificates/m-p/3738942#M542851</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2018-11-05T08:56:59Z</dc:date>
    </item>
  </channel>
</rss>

