<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wireless Users Being Prompted to Trust Public Certificate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/4083964#M560297</link>
    <description>&lt;P&gt;You can visit the website of the &lt;A href="https://support.globalsign.com/ca-certificates/root-certificates/globalsign-root-certificates" target="_self"&gt;GlobalSign website and then download their CA certificates&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The trick is to know WHICH ONE to download.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In ISE you simply install them under Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Trusted Certificates&lt;/P&gt;
&lt;P&gt;Click the Import button and then make sure you tick Trust for Authentication within ISE and Trust for client authentication and SYSLOG.&amp;nbsp; Just for good measure, also tick the Validate Cert box.&amp;nbsp; Enter friendly name etc.&lt;/P&gt;</description>
    <pubDate>Tue, 12 May 2020 10:32:21 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2020-05-12T10:32:21Z</dc:date>
    <item>
      <title>iOS Wireless Users Being Prompted to Trust Public Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3820678#M474721</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm&amp;nbsp;using ISE 2.3 P5 and a Cisco WLC 5508 8.5.140.0.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have two ISE PSNs.&amp;nbsp; Both PSNs have a wildcard cert with *.ise.mydomain.com in the CN field. This certificate was issued by Globalsign.&amp;nbsp; I've installed the Globalsign&amp;nbsp;Root CA Cert &amp;amp; the Globalsign&amp;nbsp;Intermediate Cert into my Trusted Certificate Store in ISE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recognize Wildcard certificates are an issue while performing EAP on Windows clients.&amp;nbsp; That is a separate issue and I will be obtaining a new cert to fix that issue, I would like to make sure the new cert fixes this other issue too.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To my issue....&lt;/P&gt;&lt;P&gt;The wildcard certificate is a Globalsign&amp;nbsp;cert.&amp;nbsp; My iPhone iOS 12.1.4 has Globalsign's Root CA in the Trust Store. I've verified this by reviewing the Serial Number of the Root CA cert on Globalsign's website, then looking at Apples list of available trusted root certificates webpage. The serial numbers match up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.apple.com/en-us/HT209501" target="_blank" rel="noopener"&gt;https://support.apple.com/en-us/HT209501&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My assumptions and reading...&amp;nbsp;&lt;/P&gt;&lt;P&gt;Being that Globalsigns&amp;nbsp;Root CA cert is preinstalled on my iPhone, my iPhone should accept identity&amp;nbsp;certificates issued by the Globalsign Intermediate CA.&amp;nbsp; &amp;nbsp;However, the document How to Implement Cisco ISE Server Side Certificates on page 17, it states &lt;EM&gt;"When an iOS client first communicates to a PSN it will not explicitly trust the PSN certificate, even though a trusted Certificate Authority has signed the certificate."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is how to get around the iOS device not trusting the PSN certificate?&amp;nbsp;&amp;nbsp; I don’t believe end users should have to trust an already trusted certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for any tips.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tim&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 14:43:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3820678#M474721</guid>
      <dc:creator>Tim Glen</dc:creator>
      <dc:date>2019-03-26T14:43:54Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Users Being Prompted to Trust Public Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3820692#M474724</link>
      <description>&lt;P&gt;Sometimes the ISE node does not send the intermediate certificate along with its certificate during TLS handshake. It causes a warning on mobile devices. After a node reboot, the behavior may change and the browsers do not complain any more.&lt;/P&gt;</description>
      <pubDate>Sat, 16 Mar 2019 21:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3820692#M474724</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2019-03-16T21:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Users Being Prompted to Trust Public Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3820795#M474842</link>
      <description>&lt;P&gt;First things first, there are known issues with Windows clients when the wildcard is in the CN of a certificate.&amp;nbsp; The recommended approach to this that we know works fine is to nest the wildcard in the SAN fields.&amp;nbsp;&amp;nbsp;Aaron Woland covers this in the Cisco Live session&amp;nbsp;BRKSEC-3697, Advanced ISE Services, Tips and Tricks.&amp;nbsp; I would recommend reviewing it and cutting a new cert to avoid issues.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now your iPhone issue sounds like one we ran in to with the Digicert High Assurance EV signing authority.&amp;nbsp; Since certificate trust relies on a chain of issue, missing the intermediate that issued the certificate should always result in a prompt to trust. This is by design from a security stand point, and also a pain in the butt.&amp;nbsp; The phone trusts the root, but it still doesn't trust the intermediate signing CA.&amp;nbsp; We were able to push the intermediate cert down inline with the MDM wifi profile to managed iphones, and got rid of the prompt.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Mar 2019 08:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3820795#M474842</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-03-17T08:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Users Being Prompted to Trust Public Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3821272#M474843</link>
      <description>&lt;P&gt;Thank you,&amp;nbsp; I understand the issue on the Windows computers and can deal with that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I’ve installed the Root CA and the Intermediate CA Certificate into the ISE trusted store.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE Trusted Certs.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/32122iA0A7B7A5559A358A/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE Trusted Certs.jpg" alt="ISE Trusted Certs.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any way to configure ISE to send both of these certificates while preforming PEAP, the same way that a web server can, if configured?&amp;nbsp; I don’t have an MDM and most of these devices are personal devices so pushing the Intermediate cert is impossible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As I have a public certificate installed on the PSN, I’m hoping there is a way for end users to connect to 802.1x Enterprise networks without having to click Trust in order to ‘trust’ an already publicly trusted certificate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2019 13:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3821272#M474843</guid>
      <dc:creator>Tim Glen</dc:creator>
      <dc:date>2019-03-18T13:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Users Being Prompted to Trust Public Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3821546#M474844</link>
      <description>&lt;P&gt;The only way I know of to get phones to stop prompting to trust certs the first time they client connects is install the WLAN settings via an MDM.&amp;nbsp; If you are having the users manually connect to the SSID they will always have to trust the certificate the first time.&amp;nbsp; That is the nature of mobile devices.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2019 20:17:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3821546#M474844</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-03-18T20:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Users Being Prompted to Trust Public Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3824522#M474845</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the tip.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you help me understand the technical reason behind this.&amp;nbsp; I've been reading about PEAP auth and cannot find an answer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Specifically,&amp;nbsp; I wonder if the certificate exchange over PEAP works differently than the certificate exchange over HTTPS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ID cert installed on the ISE node looks like this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise-cert.jpg" style="width: 804px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/32593i959F6554D2237BAF/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise-cert.jpg" alt="ise-cert.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've checked the serial numbers on all 3 of the certificates in this certificate chain.&amp;nbsp; My iPhone has the GlobalSign Root CA R1 certificate in its Trusted Store. My iPhone does not have the GlobalSign Organizational Validation certificate in the Trusted Store and obviously, it doesn't have the wildcard in the Trusted Store.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So when I go to the ISE Admin Portal page I get to it and I&amp;nbsp;do not receive any errors. My iPhone trusts the wildcard certificate because it Trusts the Root.&amp;nbsp; When I connect to the wireless SSID and attempt PEAP I get the prompt to Trust the cert.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd like to understand the technical details about why, when using PEAP, the certificate chain isn't&amp;nbsp;trusted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks very much, I appreciate any insight.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Mar 2019 13:57:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3824522#M474845</guid>
      <dc:creator>Tim Glen</dc:creator>
      <dc:date>2019-03-23T13:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Users Being Prompted to Trust Public Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3826323#M474846</link>
      <description>&lt;P&gt;I believe this is the answer to the question "Why do Apple iOS devices force a user to Click Trust on a trusted certificate".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note 28 of this document it states:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/compatibility/ise_sdt.html#pgfId-141382" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/compatibility/ise_sdt.html#pgfId-141382&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When Apple iOS devices use Protected Extensible Authentication Protocol (PEAP) with Cisco ISE or 802.1x, certificate warnings might be displayed even for publicly trusted certificates. This usually occurs when the public certificate includes a Certificate Revocation List (CRL) distribution point that the iOS device needs to verify. The iOS device cannot verify the CRL without network access. Click Confirm or Accept in the iOS device to authenticate to the network.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 14:43:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/3826323#M474846</guid>
      <dc:creator>Tim Glen</dc:creator>
      <dc:date>2019-03-26T14:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Users Being Prompted to Trust Public Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/4083938#M560292</link>
      <description>&lt;P&gt;Thank you for this article , it is very helpful. I have the same issue where we have ipads introduced on our network and keep. New devices could not connect as the certificate would not issue to the devices. It is believed or assumed to be the issue with issuing certificate related to the SCEP service.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do you install GlobalSign OrganisationalSSL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your help is greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 09:47:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/4083938#M560292</guid>
      <dc:creator>b0032313@my.shu.ac.uk</dc:creator>
      <dc:date>2020-05-12T09:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Users Being Prompted to Trust Public Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/4083964#M560297</link>
      <description>&lt;P&gt;You can visit the website of the &lt;A href="https://support.globalsign.com/ca-certificates/root-certificates/globalsign-root-certificates" target="_self"&gt;GlobalSign website and then download their CA certificates&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The trick is to know WHICH ONE to download.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In ISE you simply install them under Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Trusted Certificates&lt;/P&gt;
&lt;P&gt;Click the Import button and then make sure you tick Trust for Authentication within ISE and Trust for client authentication and SYSLOG.&amp;nbsp; Just for good measure, also tick the Validate Cert box.&amp;nbsp; Enter friendly name etc.&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 10:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/4083964#M560297</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-05-12T10:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Users Being Prompted to Trust Public Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/4437737#M568643</link>
      <description>&lt;P&gt;Except iPhones...&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jul 2021 10:59:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/4437737#M568643</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2021-07-23T10:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: iOS Wireless Users Being Prompted to Trust Public Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/4480176#M570173</link>
      <description>&lt;P&gt;Looks like the latest android versions are having the same behavior.&lt;/P&gt;&lt;P&gt;Can anyone confirm?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 09:13:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-wireless-users-being-prompted-to-trust-public-certificate/m-p/4480176#M570173</guid>
      <dc:creator>Kenzo De Ruysscher</dc:creator>
      <dc:date>2021-10-05T09:13:48Z</dc:date>
    </item>
  </channel>
</rss>

