<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can ISE serve as an intermediate Certificate Authority? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/can-ise-serve-as-an-intermediate-certificate-authority/m-p/4650798#M576168</link>
    <description>&lt;P&gt;As far as I know, ISE can act as an intermediate only in the case of the ISE BYOD onboarding flow - ISE will forward the cert creation requests from the end devices (e.g. iOS/Android/Windows) and then forward them onto an external PKI.&lt;/P&gt;
&lt;P&gt;Also, ISE doesn't process CSRs, unless you submit them to the internal CA. ISE has its own internal CA - but in this case, ISE is the CA (Root CA on PAN, and PSNs Issuing CAs)&lt;/P&gt;
&lt;P&gt;The ISE Internal CA is mostly used for ISE's BYOD Feature - but you can use it for other things like pxGrid integration, and just generally creating certs for end-devices in a self-service style portal (users log in and generate a cert for themselves).&lt;/P&gt;</description>
    <pubDate>Thu, 14 Jul 2022 20:49:44 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2022-07-14T20:49:44Z</dc:date>
    <item>
      <title>Can ISE serve as an intermediate Certificate Authority?</title>
      <link>https://community.cisco.com/t5/network-access-control/can-ise-serve-as-an-intermediate-certificate-authority/m-p/4650789#M576167</link>
      <description>&lt;P&gt;My company supports multiple implementations of ISE.&amp;nbsp; One of them relies upon our internal AD implementation, which utilizes both a Root certificate and an Intermediate certificate from AD, and all of the internal devices and users are also trusted by our AD as well.&lt;/P&gt;&lt;P&gt;In this new instance, we're building a new ISE cluster on an isolated network that is attached to an exteral entity instead of our internal AD.&amp;nbsp; My assumption is that we'd submit CSRs to the external entity so the ISE servers are trusted.&lt;/P&gt;&lt;P&gt;My question deals with the network devices as well and the end users and end user devices.&amp;nbsp; While we'll need to have each of the devices and users submit a CSR, it seems that once course of action is to submit the CSRs to the external entity, which seems inefficient.&amp;nbsp; The other more desired outcome is that we can submit the CSRs to ISE, and have ISE issue certs on behalf of the external entity, serving as an intermediate CA.&lt;BR /&gt;&lt;BR /&gt;Is this possible?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2022 20:26:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/can-ise-serve-as-an-intermediate-certificate-authority/m-p/4650789#M576167</guid>
      <dc:creator>fitzie</dc:creator>
      <dc:date>2022-07-14T20:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: Can ISE serve as an intermediate Certificate Authority?</title>
      <link>https://community.cisco.com/t5/network-access-control/can-ise-serve-as-an-intermediate-certificate-authority/m-p/4650798#M576168</link>
      <description>&lt;P&gt;As far as I know, ISE can act as an intermediate only in the case of the ISE BYOD onboarding flow - ISE will forward the cert creation requests from the end devices (e.g. iOS/Android/Windows) and then forward them onto an external PKI.&lt;/P&gt;
&lt;P&gt;Also, ISE doesn't process CSRs, unless you submit them to the internal CA. ISE has its own internal CA - but in this case, ISE is the CA (Root CA on PAN, and PSNs Issuing CAs)&lt;/P&gt;
&lt;P&gt;The ISE Internal CA is mostly used for ISE's BYOD Feature - but you can use it for other things like pxGrid integration, and just generally creating certs for end-devices in a self-service style portal (users log in and generate a cert for themselves).&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2022 20:49:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/can-ise-serve-as-an-intermediate-certificate-authority/m-p/4650798#M576168</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-07-14T20:49:44Z</dc:date>
    </item>
  </channel>
</rss>

