<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic EAP-TLS - Client still not trust ISE PSN certificate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4959767#M585208</link>
    <description>&lt;P&gt;hello Guys,&lt;/P&gt;
&lt;P&gt;I want to ask you if you meet similar problem to my. I have implemented EAP-TLS for wireless clients. Simple topology:&lt;/P&gt;
&lt;P&gt;Client -&amp;gt; WLC -&amp;gt; ISE - implemented 802.1x EAP-TLS&lt;/P&gt;
&lt;P&gt;My problem is that when client click connect to SSID, he always receive warning that certificate which is sent by PSN is not trusted, but it is not possible. I have all certificate chain in my Trusted Store Certificate (Root, SubCA, Intermediate CA) in client machine.&lt;/P&gt;
&lt;P&gt;I also tried to add PSN certificate to Trusted Store but it not help.&lt;/P&gt;
&lt;P&gt;PSN certificate has Client and Server Authentication atrribute in Enhance Key Usage&lt;/P&gt;
&lt;P&gt;Also in SAN field we have DNS and IP entries.&lt;/P&gt;
&lt;P&gt;I don't have any idea why client still not trust PSN certificate. Any suggestion ?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 15 Nov 2023 09:33:11 GMT</pubDate>
    <dc:creator>mikiNet</dc:creator>
    <dc:date>2023-11-15T09:33:11Z</dc:date>
    <item>
      <title>EAP-TLS - Client still not trust ISE PSN certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4959767#M585208</link>
      <description>&lt;P&gt;hello Guys,&lt;/P&gt;
&lt;P&gt;I want to ask you if you meet similar problem to my. I have implemented EAP-TLS for wireless clients. Simple topology:&lt;/P&gt;
&lt;P&gt;Client -&amp;gt; WLC -&amp;gt; ISE - implemented 802.1x EAP-TLS&lt;/P&gt;
&lt;P&gt;My problem is that when client click connect to SSID, he always receive warning that certificate which is sent by PSN is not trusted, but it is not possible. I have all certificate chain in my Trusted Store Certificate (Root, SubCA, Intermediate CA) in client machine.&lt;/P&gt;
&lt;P&gt;I also tried to add PSN certificate to Trusted Store but it not help.&lt;/P&gt;
&lt;P&gt;PSN certificate has Client and Server Authentication atrribute in Enhance Key Usage&lt;/P&gt;
&lt;P&gt;Also in SAN field we have DNS and IP entries.&lt;/P&gt;
&lt;P&gt;I don't have any idea why client still not trust PSN certificate. Any suggestion ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 09:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4959767#M585208</guid>
      <dc:creator>mikiNet</dc:creator>
      <dc:date>2023-11-15T09:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS - Client still not trust ISE PSN certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4960083#M585226</link>
      <description>&lt;P&gt;This is 100% a client problem.&amp;nbsp; What are the clients?&amp;nbsp; How are you trusting these certificates on the client?&amp;nbsp; Who issues the ISE EAP certificate?&amp;nbsp; Internal PKI our public.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 17:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4960083#M585226</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-11-15T17:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS - Client still not trust ISE PSN certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4960435#M585242</link>
      <description>&lt;P&gt;Is this an Apple iOS device, or Windows?&amp;nbsp; I could be wrong, but with Apple iOS, you will always get the cert warning even if you have manually added the ISE CA chain into the device (through something like Apple Configurator). I have not done this in a while, but I also believe that if Apple devices are MDM managed, then this phenomenon doesn't happen.&lt;/P&gt;
&lt;P&gt;With Windows clients this is never an issue, if the supplicant is configured correctly - you have a lot of control and visibility over this, as compared to Apple.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 06:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4960435#M585242</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-11-16T06:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS - Client still not trust ISE PSN certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4960628#M585248</link>
      <description>&lt;P&gt;Thanks for your reply.&lt;/P&gt;
&lt;P&gt;Problem solved. We have Windows machine, and we don't know why but supplicant wifi (build-in) can't verify certiface even if it has all root CA in Trusted Store.&lt;/P&gt;
&lt;P&gt;We solved this problem by creating WLAN Profile on GPO and set by mark which certificate need be trusted.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After pushing policy to PC, we not observe aby info that client can't verify PSN cert&lt;/P&gt;
&lt;P&gt;We assume that native supplicant has a problem to find right CA in Trusted Store&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 11:06:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4960628#M585248</guid>
      <dc:creator>mikiNet</dc:creator>
      <dc:date>2023-11-16T11:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS - Client still not trust ISE PSN certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4961959#M585268</link>
      <description>&lt;P&gt;Microsoft implemented security changes on Windows 10 and 11 where you MUST checked the TRUSTED ROOT CERTIFICATE CA's in your wireless profile (manually created of distributed via GPO)&amp;nbsp;and not just check the "validate server certificate" box. Without that, no matter you have the Trusted CA Root listed by default in your computer the certificate warning would appear. I had a conversation with a Microsoft support tech about it because our Win 11 laptops were giving us those certificate warnings. See attached pictures about it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CERTIFICATE TRUSTED CA ROOT.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202769i61873D96EEEC027C/image-size/large?v=v2&amp;amp;px=999" role="button" title="CERTIFICATE TRUSTED CA ROOT.png" alt="CERTIFICATE TRUSTED CA ROOT.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2023 16:29:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4961959#M585268</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2023-11-17T16:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS - Client still not trust ISE PSN certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4961964#M585269</link>
      <description>&lt;P&gt;BTW, we had a SIMILAR issue with our MDM managed IPADs where we HAD to add the intermediate trusted CA to the profile used for EAP-TLS, otherwise we got a certificate warning no matter we had the ROOT Trusted CA in those IPADs.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2023 16:32:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4961964#M585269</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2023-11-17T16:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS - Client still not trust ISE PSN certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4962828#M585288</link>
      <description>&lt;P&gt;ajc - thanks for your explanation! One more question: you said "&lt;SPAN&gt;I had a conversation with a Microsoft support tech" - when you spoke with Microsoft ? And what they said ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Nov 2023 10:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-client-still-not-trust-ise-psn-certificate/m-p/4962828#M585288</guid>
      <dc:creator>mikiNet</dc:creator>
      <dc:date>2023-11-20T10:53:33Z</dc:date>
    </item>
  </channel>
</rss>

