<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BYOD iOS/Android profiles - EAP-TLS when ISE using EAP System certificate signed by different Root CA than is in BYOD profile in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/byod-ios-android-profiles-eap-tls-when-ise-using-eap-system/m-p/4424923#M568164</link>
    <description>&lt;P&gt;You will need to go through the BYOD flow to get proper certificate chain. ISE will send the whole chain during authentication but if client doesn't trust it due to mis-match, authentication will fail. You can overcome this by going through the flow again so client and ISE matches.&lt;/P&gt;</description>
    <pubDate>Mon, 28 Jun 2021 16:02:36 GMT</pubDate>
    <dc:creator>howon</dc:creator>
    <dc:date>2021-06-28T16:02:36Z</dc:date>
    <item>
      <title>BYOD iOS/Android profiles - EAP-TLS when ISE using EAP System certificate signed by different Root CA than is in BYOD profile</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-ios-android-profiles-eap-tls-when-ise-using-eap-system/m-p/4421571#M567992</link>
      <description>&lt;P&gt;Dear community,&lt;/P&gt;&lt;P&gt;I've many endpoints based on iOS and Android OS in the BYOD environment. With certificates in the profile pushed to the endpoint, there is a part of the profile, which also contains the issuer Root CA certificate of the ISE's EAP System certificate. ISE is 2.6p7.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EndPoint itself has a certificate issued by ISE CA. But ISE, for the EAP-TLS the EAP, uses certificate issued by another (external) CA.&amp;nbsp;This ISE's EAP System certificate needs to be changed to the new one, and is signed by another (new) Root CA. So endpoint will be able to trust the new EAP System certificate during the handshake procedure. Due to a lack of a new Root CA certificate on the endpoint, the connection of the endpoint to the BYOD SSID not work properly and fail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible to send the full certificate chain during the initial handshake, containing the new Root CA certificates? Will endpoint work with that change?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the ISE's menu Trusted certificates chain, under particular Root CA certificate is a checkbox:&lt;/P&gt;&lt;DIV class="trustedForEndpoints"&gt;Trust for certificate based admin authentication&lt;/DIV&gt;&lt;DIV class="trustedForEndpoints"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="trustedForEndpoints"&gt;Will this option makes ISE send the whole chain? Will the endpoint trust the new ISE's EAP certificate instead of that which is in the pushed BYOD profile?&lt;/DIV&gt;&lt;DIV class="trustedForEndpoints"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="trustedForEndpoints"&gt;For example, I attached iOS profile and arrow points to the Root CA certificate which should not be used anymore due a new Root CA and new EAP System certificate of the ISE.&lt;/DIV&gt;&lt;DIV class="trustedForEndpoints"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="trustedForEndpoints"&gt;Regards,&lt;/DIV&gt;&lt;DIV class="trustedForEndpoints"&gt;Filip&lt;/DIV&gt;</description>
      <pubDate>Tue, 22 Jun 2021 07:06:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-ios-android-profiles-eap-tls-when-ise-using-eap-system/m-p/4421571#M567992</guid>
      <dc:creator>Filip Po</dc:creator>
      <dc:date>2021-06-22T07:06:34Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD iOS/Android profiles - EAP-TLS when ISE using EAP System certificate signed by different Root CA than is in BYOD profile</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-ios-android-profiles-eap-tls-when-ise-using-eap-system/m-p/4424923#M568164</link>
      <description>&lt;P&gt;You will need to go through the BYOD flow to get proper certificate chain. ISE will send the whole chain during authentication but if client doesn't trust it due to mis-match, authentication will fail. You can overcome this by going through the flow again so client and ISE matches.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 16:02:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-ios-android-profiles-eap-tls-when-ise-using-eap-system/m-p/4424923#M568164</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2021-06-28T16:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD iOS/Android profiles - EAP-TLS when ISE using EAP System certificate signed by different Root CA than is in BYOD profile</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-ios-android-profiles-eap-tls-when-ise-using-eap-system/m-p/4424943#M568167</link>
      <description>&lt;P&gt;So I have to do new onboarding for all endpoints?&lt;/P&gt;&lt;P&gt;But I have over 300 BYOD clients.&lt;/P&gt;&lt;P&gt;I can not do a new SSID, because ISE does not support two EAP certificates.&lt;/P&gt;&lt;P&gt;It's even possible to add a new root CA to the BYOD Profile? Then new devices should have two Root CAs (old one, and new).&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 16:36:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-ios-android-profiles-eap-tls-when-ise-using-eap-system/m-p/4424943#M568167</guid>
      <dc:creator>Filip Po</dc:creator>
      <dc:date>2021-06-28T16:36:45Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD iOS/Android profiles - EAP-TLS when ISE using EAP System certificate signed by different Root CA than is in BYOD profile</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-ios-android-profiles-eap-tls-when-ise-using-eap-system/m-p/4424948#M568169</link>
      <description>&lt;P&gt;Client device can only have one profile for a given Wi-Fi. IOW, you can't have two different Wi-Fi profile for the same SSID. Also, on Android you need to select Root CA for a given SSID so you can't tie two root to a single Wi-Fi profile.&lt;/P&gt;
&lt;P&gt;Yes, ISE can only support single EAP certificate, but if this is temporary, you can bring up another ISE instance with different EAP certificate for the separate SSID. Once you have migrated all users, you can decommission one of the ISE instance and the SSID.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 16:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-ios-android-profiles-eap-tls-when-ise-using-eap-system/m-p/4424948#M568169</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2021-06-28T16:50:28Z</dc:date>
    </item>
  </channel>
</rss>

