<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.4 Stuck &amp;quot;Default Portal Cetificate Group&amp;quot; certs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-4-stuck-quot-default-portal-cetificate-group-quot-certs/m-p/4041123#M558619</link>
    <description>&lt;P&gt;Okay, looks like it's really stuck in a weird way. It let me assign the self-signed cert to the Portal, but it only took the role away from "portal-ssl-1", leaving "portal-ssl-2" and the self-signed cert assigned to Default Portal duty.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll either call TAC or simply reinstall the node. (Probably the latter, since I'm now wary of what else may be messed up on it, and it's currently in a backup role anyway.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the help, Greg.&lt;/P&gt;</description>
    <pubDate>Thu, 05 Mar 2020 17:53:56 GMT</pubDate>
    <dc:creator>joe_lizzi</dc:creator>
    <dc:date>2020-03-05T17:53:56Z</dc:date>
    <item>
      <title>ISE 2.4 Stuck "Default Portal Cetificate Group" certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-stuck-quot-default-portal-cetificate-group-quot-certs/m-p/4040462#M558583</link>
      <description>&lt;P&gt;I have an interesting issue on one of my ISE 2.4 (Patch 11) nodes. It has somehow managed to get two separate certs assigned to the "Default Portal Certificate Group". For example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Name: portal-ssl-1.ise&amp;nbsp;&amp;nbsp;&amp;nbsp; Use: Portal&amp;nbsp;&amp;nbsp;&amp;nbsp; Portal group tag: Default Portal Certificate Group&lt;/P&gt;&lt;P&gt;&amp;nbsp; Name: portal-ssl-2.ise&amp;nbsp;&amp;nbsp;&amp;nbsp; Use: Portal&amp;nbsp;&amp;nbsp;&amp;nbsp; Portal group tag: Default Portal Certificate Group&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Note: portal-ssl-2 was imported as a replacement for portal-ssl-1, but instead of switching the tag to the newer cert, it instead seems to have duplicated it.) It won't let me delete either one of them, complaining that they're in use by existing portals. It won't let me edit either one to use a different group tag. I don't have this issue on any of the other nodes in the cluster, all of which had their certs updated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to resolve this, perhaps via CLI?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 21:01:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-stuck-quot-default-portal-cetificate-group-quot-certs/m-p/4040462#M558583</guid>
      <dc:creator>joe_lizzi</dc:creator>
      <dc:date>2020-03-04T21:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Stuck "Default Portal Cetificate Group" certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-stuck-quot-default-portal-cetificate-group-quot-certs/m-p/4040494#M558585</link>
      <description>&lt;P&gt;You might try the following:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Export the 'portal-ssl-2' certificate and key to back them up&lt;/LI&gt;
&lt;LI&gt;Create a new self-signed certificate and bind it to the Default Portal Certificate Group&lt;/LI&gt;
&lt;LI&gt;Delete both the 'portal-ssl-1' and 'portal-ssl-2' certificates&lt;/LI&gt;
&lt;LI&gt;Import the 'portal-ssl-2' certificate and key and bind it to the Default Portal Certificate Group&lt;/LI&gt;
&lt;LI&gt;Delete the self-signed certificate&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If that still fails, you will need to open a TAC case. Fixing these types of certificate binding issues typically requires TAC using the root patch to delete the certificate bindings directly from the database.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 21:55:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-stuck-quot-default-portal-cetificate-group-quot-certs/m-p/4040494#M558585</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-03-04T21:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Stuck "Default Portal Cetificate Group" certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-stuck-quot-default-portal-cetificate-group-quot-certs/m-p/4041123#M558619</link>
      <description>&lt;P&gt;Okay, looks like it's really stuck in a weird way. It let me assign the self-signed cert to the Portal, but it only took the role away from "portal-ssl-1", leaving "portal-ssl-2" and the self-signed cert assigned to Default Portal duty.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll either call TAC or simply reinstall the node. (Probably the latter, since I'm now wary of what else may be messed up on it, and it's currently in a backup role anyway.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the help, Greg.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 17:53:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-stuck-quot-default-portal-cetificate-group-quot-certs/m-p/4041123#M558619</guid>
      <dc:creator>joe_lizzi</dc:creator>
      <dc:date>2020-03-05T17:53:56Z</dc:date>
    </item>
  </channel>
</rss>

