<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE multiple EAP certificates support in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4504911#M571133</link>
    <description>&lt;P&gt;Can I have different policies point to different certificates for authentication with EAP? when I try to create a different EAP certificate I get a message saying that the already available EAP certificate will be replaced.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this is not supported are there any plans to support this?&lt;/P&gt;</description>
    <pubDate>Thu, 18 Nov 2021 12:43:10 GMT</pubDate>
    <dc:creator>SMD28316</dc:creator>
    <dc:date>2021-11-18T12:43:10Z</dc:date>
    <item>
      <title>ISE multiple EAP certificates support</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4504911#M571133</link>
      <description>&lt;P&gt;Can I have different policies point to different certificates for authentication with EAP? when I try to create a different EAP certificate I get a message saying that the already available EAP certificate will be replaced.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this is not supported are there any plans to support this?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 12:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4504911#M571133</guid>
      <dc:creator>SMD28316</dc:creator>
      <dc:date>2021-11-18T12:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE multiple EAP certificates support</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4505123#M571137</link>
      <description>&lt;P&gt;I do not belive single ISE can have 2 Certs same time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 18:06:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4505123#M571137</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-11-18T18:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE multiple EAP certificates support</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4510882#M571321</link>
      <description>&lt;P&gt;Only one ISE server certificate is supported for all EAP-based authentications currently.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE can authenticate &lt;EM&gt;endpoint certificates&lt;/EM&gt; from different CAs using Certificate Profiles.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Nov 2021 22:56:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4510882#M571321</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-11-30T22:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE multiple EAP certificates support</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4719965#M578186</link>
      <description>&lt;P&gt;If you have a ISE cluster, can Node 1 use CA/Cert 1 for EAP and Node 2 use CA/Cert 2 for EAP?&amp;nbsp; &amp;nbsp; Reason: Our current CA is expiring and we want to gently migrate to a new CA.&amp;nbsp; &amp;nbsp;If we can have both CAs and certs active, we run in parallel until the CA expires.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 20:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4719965#M578186</guid>
      <dc:creator>cklam</dc:creator>
      <dc:date>2022-11-11T20:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE multiple EAP certificates support</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4719978#M578188</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319502"&gt;@cklam&lt;/a&gt; that doesn't sound practical,&amp;nbsp; the authentication request could go to either PSN - so therefore the client must trust both CAs that sign the respective EAP Cert, otherwise it would error.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 21:22:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4719978#M578188</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-11T21:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE multiple EAP certificates support</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4719988#M578190</link>
      <description>&lt;P&gt;Our supplicant (cat/eduroam) can offer both CAs.&amp;nbsp; &amp;nbsp;So, the client will be trusting both.&amp;nbsp; &amp;nbsp;I am concerned that we would see fails as clients try one ISE server fail and then move to the next one which contains the winning CA/cert.&amp;nbsp; &amp;nbsp; &amp;nbsp;If we cannot do this, then we can test on a staging server and then do a hard cutover when the original CA expires.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 22:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4719988#M578190</guid>
      <dc:creator>cklam</dc:creator>
      <dc:date>2022-11-11T22:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE multiple EAP certificates support</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4719991#M578193</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319502"&gt;@cklam&lt;/a&gt; the client authentication request is sent to one server, it won't move to the next if the authentication request was&amp;nbsp; denied on the first. If the client supplicant trusts both CA's then there shouldn't be a problem to cutover the EAP certs on all PSNs to the new CA.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 22:07:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4719991#M578193</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-11T22:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE multiple EAP certificates support</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4946204#M584778</link>
      <description>&lt;P&gt;Hi Thomas, do you mind pointing me to some official Cisco documents on how to do this "&lt;SPAN&gt;ISE can authenticate&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;endpoint certificates&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;from different CAs using Certificate Profiles"?&amp;nbsp; I was planning on migrating from one internal CA to another and would like our ISE to be able to authenticate endpoint certificates from the two CAs at the same time during the migration, but I was told this was not supported. Thank you very much for your time.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Oct 2023 14:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-eap-certificates-support/m-p/4946204#M584778</guid>
      <dc:creator>Fan2023</dc:creator>
      <dc:date>2023-10-23T14:44:41Z</dc:date>
    </item>
  </channel>
</rss>

