<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Tony. I'm not 100% sure, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708011#M55058</link>
    <description>&lt;P&gt;Hi Tony. I'm not 100% sure, but you can&amp;nbsp;add a certificate group tag when you edit the certificate.&amp;nbsp;Or you could add the group tag during the certificate import wizard. I never did that before though. I'll have to test it first &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;</description>
    <pubDate>Thu, 13 Aug 2015 12:42:35 GMT</pubDate>
    <dc:creator>Andre Neethling</dc:creator>
    <dc:date>2015-08-13T12:42:35Z</dc:date>
    <item>
      <title>ISE 1.4 Guest Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708000#M55046</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I have configured ISE 1.4 for the first time and I am having trouble with certificates. I have a CA signed system certificate stored in system certificates and I can log onto ISE without certificate messages.&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I go about guest and sponsor users in regards to certificates. Do I need a separate certificate or will the CA signed cert I have generated work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708000#M55046</guid>
      <dc:creator>Mokhalil82</dc:creator>
      <dc:date>2019-03-11T05:50:32Z</dc:date>
    </item>
    <item>
      <title>You can use the same</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708001#M55047</link>
      <description>&lt;P&gt;You can use the same certificate for multiple functions in ISE. To use the same certificate for the guest portal edit the certificate and enable the "Portal" check box. Then you can tie the certificate to a Certificate Portal Group Tag. That certificate group tag can be attached to the Guest Portal that you create.&lt;/P&gt;&lt;P&gt;I hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jun 2015 21:31:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708001#M55047</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-06-23T21:31:22Z</dc:date>
    </item>
    <item>
      <title>Hi Guys, I hope you don't</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708002#M55048</link>
      <description>&lt;P&gt;Hi Guys, I hope you don't mind me joining this discussion.&amp;nbsp; I have a somewhat similar issue.&lt;/P&gt;&lt;P&gt;I'm running v1.3 and hostname is ise.domain.com and according to documentation, I configured my Sponsor portal as sponsor.domain.com.&lt;/P&gt;&lt;P&gt;This is my issue:&amp;nbsp; When guest users access the Guest portal, they get redirected to ise.domain.com.&lt;/P&gt;&lt;P&gt;That scenario works fine.&lt;/P&gt;&lt;P&gt;However, when I access the Sponsor portal using sponsor.domain.com, I get the certificate warnig error.&amp;nbsp; Obviously, the error is normal due to the fact I don’t have a certificate in ISE with that URL.&lt;/P&gt;&lt;P&gt;To get rid of the error, do I need a second certificate signed with sponsor.domain.com ?&lt;/P&gt;&lt;P&gt;Neno, If I understand your previous post, I should be able to use 1 certificate for both URLS's.&amp;nbsp; Also, are Guest portal and Sponsor portal controlled by the same Certificate portal Group ?&lt;/P&gt;&lt;P&gt;Thanks !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jul 2015 12:38:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708002#M55048</guid>
      <dc:creator>tonyp8581</dc:creator>
      <dc:date>2015-07-25T12:38:53Z</dc:date>
    </item>
    <item>
      <title>Tony,You have three options -</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708003#M55049</link>
      <description>&lt;P&gt;Tony,&lt;/P&gt;&lt;P&gt;You have three&amp;nbsp;options - &amp;nbsp;a second certificate, a single wildcard certificate or a single certificate with&amp;nbsp;SANs (Subject Alternative Names).&lt;/P&gt;&lt;P&gt;The recommended option&amp;nbsp;is to use SANs. I think Cisco could improve the documentation in telling your which ones you might need ahead of time. As one sets up an ISE deployment, it's not always obvious that the use cases will indicate that in the future you might need to use one or another SAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jul 2015 17:59:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708003#M55049</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-25T17:59:40Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin, I prefer the third</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708004#M55050</link>
      <description>&lt;P&gt;Hi Marvin,&amp;nbsp;I prefer the third option,&lt;/P&gt;&lt;P&gt;I was reading up on Certificate usage and using the SAN&amp;nbsp;sounds like&amp;nbsp;the viable option.&lt;/P&gt;&lt;P&gt;I agree, Cisco should improve the documentation on the subject.&lt;/P&gt;&lt;P&gt;One more question, Shortly, I will add a second node.&amp;nbsp; Can I enter the second Hostname into the SAN&amp;nbsp;and then import that same certificate into&amp;nbsp;second node&amp;nbsp;?&lt;/P&gt;&lt;P&gt;Thanks for your help !&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jul 2015 12:51:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708004#M55050</guid>
      <dc:creator>tonyp8581</dc:creator>
      <dc:date>2015-07-26T12:51:28Z</dc:date>
    </item>
    <item>
      <title>Tony,Yes re your "one more</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708005#M55051</link>
      <description>&lt;P&gt;Tony,&lt;/P&gt;&lt;P&gt;Yes re your "one more question".&lt;/P&gt;&lt;P&gt;Any SANs must be included at the time of certification creation (for self-signed) or Certificate Signing Request (CSR) creation (for external CA-signed).&lt;/P&gt;&lt;P&gt;Once you have the certificate with SANs issued and installed&amp;nbsp;on your Primary Admin Node, you can export it (including the server's private key) for use on other nodes in your deployment.&lt;/P&gt;&lt;P&gt;It's mostly the PSNs where your portals will be hosted for which this is most important. Depending on your deployment scale these&amp;nbsp;may be the same as your Primary and Secondary PAN and MnT nodes.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jul 2015 14:47:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708005#M55051</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-26T14:47:49Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,Sorry for the delay</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708006#M55052</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;Sorry for the delay.&amp;nbsp; Lately, I have been very busy. My colleagues are on vacation.&amp;nbsp; I'm still struggling with my Sponsor portal.&amp;nbsp; I have created a new Certificate with all the DNS names in it.&amp;nbsp; But the browser is&amp;nbsp;not trusting my certificate.&amp;nbsp; I stumbled upon the bug CSCut12983. Even though I imported a new certificate, ISE is&amp;nbsp;still presenting the old certificate to the browser. Hence, the&amp;nbsp;error.&amp;nbsp; This morning, I opened a TAC case.&amp;nbsp; They still haven't call. I'll let you know how it goes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 20:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708006#M55052</guid>
      <dc:creator>tonyp8581</dc:creator>
      <dc:date>2015-08-11T20:34:35Z</dc:date>
    </item>
    <item>
      <title>Is the old certificate still</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708007#M55053</link>
      <description>&lt;P&gt;Is the old certificate still in the Certificate store of all the ISE servers? If so, did you deselect the portal check box for the certificates no longer in use?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2015 05:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708007#M55053</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-08-12T05:31:47Z</dc:date>
    </item>
    <item>
      <title>Hi Andre,  Thanks for your</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708008#M55054</link>
      <description>&lt;P&gt;Hi Andre,&amp;nbsp; Thanks for your response !&lt;/P&gt;&lt;P&gt;Presently,&amp;nbsp;I&amp;nbsp;have only one ISE server.&amp;nbsp; About the Portal check box.&amp;nbsp; The option is greyed out,&amp;nbsp;I can't deselect.&amp;nbsp; Also, the certificate I'm trying to delete is¸pointing to the Default portal Certificate group which I'm not using anymore.&amp;nbsp; I created a new one when I imported the new certificate.&lt;/P&gt;&lt;P&gt;Always on that subject, is there a way to use the same Portal Certificate group when&amp;nbsp; importing a new certificate ?&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2015 12:51:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708008#M55054</guid>
      <dc:creator>tonyp8581</dc:creator>
      <dc:date>2015-08-12T12:51:51Z</dc:date>
    </item>
    <item>
      <title>Did you change the portal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708009#M55055</link>
      <description>&lt;P&gt;Did you change the portal certificate group assignment in all your portals you have configured? I think you need to change it from default, to your new certificate group tag. If it is assigned anywhere to a portal, I think it will be greyed out.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2015 04:23:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708009#M55055</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-08-13T04:23:33Z</dc:date>
    </item>
    <item>
      <title>Hi Andre,  you're right. the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708010#M55056</link>
      <description>&lt;P&gt;Hi Andre,&amp;nbsp; you're right.&amp;nbsp;&lt;/P&gt;&lt;P&gt;the Blacklist Portal was still assigned to the default group tag.&amp;nbsp; Out of all the portal, it is the only one&amp;nbsp;using port 8444.&amp;nbsp; This is why it didn't change when I introduced the new Certificate.&amp;nbsp; Thanks for the heads up !&lt;/P&gt;&lt;P&gt;Would&amp;nbsp;you know how to assign&amp;nbsp;the current&amp;nbsp;Certificate group tag when you're importing a new certificate ?&lt;/P&gt;&lt;P&gt;Thanks !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2015 12:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708010#M55056</guid>
      <dc:creator>tonyp8581</dc:creator>
      <dc:date>2015-08-13T12:34:54Z</dc:date>
    </item>
    <item>
      <title>Hi Tony. I'm not 100% sure,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708011#M55058</link>
      <description>&lt;P&gt;Hi Tony. I'm not 100% sure, but you can&amp;nbsp;add a certificate group tag when you edit the certificate.&amp;nbsp;Or you could add the group tag during the certificate import wizard. I never did that before though. I'll have to test it first &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2015 12:42:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708011#M55058</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-08-13T12:42:35Z</dc:date>
    </item>
    <item>
      <title>Hi Andre, sounds good.Thanks</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708012#M55060</link>
      <description>&lt;P&gt;Hi Andre, sounds good.&lt;/P&gt;&lt;P&gt;Thanks for your help !&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2015 12:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-guest-certificate/m-p/2708012#M55060</guid>
      <dc:creator>tonyp8581</dc:creator>
      <dc:date>2015-08-13T12:51:40Z</dc:date>
    </item>
  </channel>
</rss>

