<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Smartphone Authentication via EAP-TLS on Cisco ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5013323#M587101</link>
    <description>&lt;P&gt;HI&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I generated an endpoint certificate provisioned through the ISE portal and installed it on the Android 11 smartphone with the same MAC as the generated certificate.&lt;/P&gt;&lt;P&gt;I also installed the CA ISE certificates on the smartphone:&lt;BR /&gt;- Certificate Services Root CA&lt;BR /&gt;- Certificates Node CA&lt;BR /&gt;- Certificates Services Endpoint Sub CA.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_0-1707185306485.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209669iF1EA255CB6C86099/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_0-1707185306485.png" alt="rafaelsalvinos_0-1707185306485.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured the wireless network on the smartphone:&lt;BR /&gt;Security: WPA/WPA2/WPA3-Enterprise&lt;BR /&gt;EAP Method: TLS&lt;BR /&gt;Identity: &amp;lt;I entered the same user used on the ISE certificate portal&amp;gt;&lt;BR /&gt;CA Certificate: Certificate Services Root CA&lt;BR /&gt;Note: I also did a test pointing to Certificates Services Endpoint Sub CA.&lt;BR /&gt;User certificate: &amp;lt;Endpoint certificate generated in the ISE certificate provisioning portal&amp;gt;&lt;/P&gt;&lt;P&gt;I selected the option to use the device's MAC instead of Random MAC.&lt;/P&gt;&lt;P&gt;Still, I was unsuccessful in authentication, I got the following errors, according to the ISE log:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_1-1707185395754.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209670iB08399339F40704A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_1-1707185395754.png" alt="rafaelsalvinos_1-1707185395754.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_2-1707185500217.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209671i00321B6DD85E05A8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_2-1707185500217.png" alt="rafaelsalvinos_2-1707185500217.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_4-1707185577816.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209673i304CAE4784858C57/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_4-1707185577816.png" alt="rafaelsalvinos_4-1707185577816.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_6-1707185634095.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209675i6BD9029DF28CE1D7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_6-1707185634095.png" alt="rafaelsalvinos_6-1707185634095.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Feb 2024 02:15:05 GMT</pubDate>
    <dc:creator>rafaelsalvinos</dc:creator>
    <dc:date>2024-02-06T02:15:05Z</dc:date>
    <item>
      <title>Smartphone Authentication via EAP-TLS on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012282#M587049</link>
      <description>&lt;P&gt;Hey guys!&lt;/P&gt;&lt;P&gt;I am studying a demand to enable smartphone authentication on the BYOD network, with authentication via EAP-TLS on Cisco ISE.&lt;/P&gt;&lt;P&gt;I have experience in previous projects, where I configured EAP-TLS authentication for computers, which received a personal certificate via GPO, generated by the Internal CA, a certificate that makes up the ISE's chain of trusted certificates.&lt;/P&gt;&lt;P&gt;Could you tell me how I can enable smartphone authentication through a certificate, authenticating with Cisco ISE?&lt;/P&gt;&lt;P&gt;Note: My Internal CA is not capable of generating certificates for smartphones.&lt;/P&gt;&lt;P&gt;Is ISE capable of generating a certificate to authenticate smartphones? If not, what would be the alternative to enable this method of smartphone authentication in ISE.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Feb 2024 02:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012282#M587049</guid>
      <dc:creator>rafaelsalvinos</dc:creator>
      <dc:date>2024-02-03T02:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: Smartphone Authentication via EAP-TLS on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012402#M587052</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1003519"&gt;@rafaelsalvinos&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below is the best prescriptive guide for BYOD on ISE, and it will give you all you need and more.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ciscocustomer.lookbookhq.com/iseguidedjourney/ise-byod-certificates" target="_blank" rel="noopener"&gt;https://ciscocustomer.lookbookhq.com/iseguidedjourney/ise-byod-certificates&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Feb 2024 17:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012402#M587052</guid>
      <dc:creator>Ruben Cocheno</dc:creator>
      <dc:date>2024-02-03T17:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: Smartphone Authentication via EAP-TLS on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012444#M587056</link>
      <description>&lt;P&gt;Yes, ISE is capable to do this through configuring BYOD onboarding portal. That will allow the corporate users to use their own devices when they connect to wireless. In this case ISE will be acting as your internal CA but only to issue certificates for the BYOD users, and it will also allow you to configure an "onboarding" profile that will take care of configuring their personal devices with the right wireless settings.&lt;/P&gt;
&lt;P&gt;However, please note that for android devices they would need to download the network setup assistance software from Google play before they are onboarded, during the onboarding process they will get a page with the link to download the software. There is no need to do any manual download with Apple devices.&lt;/P&gt;
&lt;P&gt;Also, please note that BYOD in ISE could be configured with a single or dual SSIDs. If you have guest users that would need to use the same portal, then dual SSIDs would be the best option. Although both guests and BYOD users would start with the same SSID, the BYOD users will be taken to a different SSID once they complete the onboarding. However, if there are no guests that would need to leverage this service, then a single SSID would do the trick.&lt;/P&gt;
&lt;P&gt;As you can see from the link provided by&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286810"&gt;@Ruben Cocheno&lt;/a&gt;, this is one of the biggest topics in ISE and requires bunch of configuration to be done before the flow is ready to serve the users. However, here are the four videos provided by labminutes.com (one of my favourites study/upskilling sources) that should cover everything for you:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.labminutes.com/sec0339_ise_30_byod_wireless_onboarding_single_ssid_dual_ssid_1" target="_blank"&gt;How to Configure ISE 3.0 BYOD Wireless Onboarding (Single SSID Dual SSID) (Part 1) (labminutes.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.labminutes.com/sec0339_ise_30_byod_wireless_onboarding_single_ssid_dual_ssid_2" target="_blank"&gt;How to Configure ISE 3.0 BYOD Wireless Onboarding (Single SSID Dual SSID) (Part 2) (labminutes.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.labminutes.com/sec0339_ise_30_byod_wireless_onboarding_single_ssid_dual_ssid_3" target="_blank"&gt;How to Configure ISE 3.0 BYOD Wireless Onboarding (Single SSID Dual SSID) (Part 3) (labminutes.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.labminutes.com/sec0339_ise_30_byod_wireless_onboarding_single_ssid_dual_ssid_4" target="_blank"&gt;How to Configure ISE 3.0 BYOD Wireless Onboarding (Single SSID Dual SSID) (Part 4) (labminutes.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Also, Cisco U (u.cisco.com) also provides an excellent ISE training that also covers BYOD flow alongside all the other ISE portals and flows types. The course is called "Implementing and Configuring Cisco Identity Services Engine".&lt;/P&gt;</description>
      <pubDate>Sat, 03 Feb 2024 17:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012444#M587056</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-03T17:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: Smartphone Authentication via EAP-TLS on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012531#M587062</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Thank you very much for the tips, they were very helpful.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;I'm trying to generate the certificate, using ISE as the internal CA, however, I'm getting this error when I create a certificate.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Do you have any idea what the problem could be?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Log-ise.PNG" style="width: 757px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209543i794A5C083CAA5693/image-size/large?v=v2&amp;amp;px=999" role="button" title="Log-ise.PNG" alt="Log-ise.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Feb 2024 04:30:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012531#M587062</guid>
      <dc:creator>rafaelsalvinos</dc:creator>
      <dc:date>2024-02-04T04:30:49Z</dc:date>
    </item>
    <item>
      <title>Re: Smartphone Authentication via EAP-TLS on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012580#M587063</link>
      <description>&lt;P&gt;You're welcome. How did you go to this portal page? did you click on the test portal link from within the portal settings or via its FQDN?, if you'd done it via the test portal link it wouldn't work I think. However, if you'd done via its FQDN then please check if the internal CA services are showing green under Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Certificate Authority &amp;gt; Internal CA Settings. If they are up and running as expected, please share the "Certificate_Endpoint_Test_2024" certificate template for review.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Feb 2024 11:52:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012580#M587063</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-04T11:52:44Z</dc:date>
    </item>
    <item>
      <title>Re: Smartphone Authentication via EAP-TLS on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012655#M587065</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;The internal CA services were showing as running (green) when I checked in Internal CA Settings, however, I noticed that in "Certificate Authority Certificates", it was not showing any certificates, so I generated a new root certificate chain, following these steps in this document:&lt;/P&gt;&lt;P&gt;Choose Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Certificate Management &amp;gt; Certificate Signing Requests.&lt;/P&gt;&lt;P&gt;Click Generate Certificate Signing Requests (CSR).&lt;/P&gt;&lt;P&gt;Select ISE Root CA from the Certificate(s) will be used for drop-down list&lt;/P&gt;&lt;P&gt;Click Replace ISE Root CA Certificate Chain.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/pt_br/support/docs/security/identity-services-engine-30/217161-ca-service-and-est-service-on-ise.html" target="_blank"&gt;https://www.cisco.com/c/pt_br/support/docs/security/identity-services-engine-30/217161-ca-service-and-est-service-on-ise.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;After this procedure, I was able to generate the certificate. I have already installed the certificate generated on my smartphone and tomorrow when I am at the company I will take the EAP-TLS authentication test to join the BYOD wireless network.&lt;/P&gt;&lt;P&gt;Thank you very much for your support, it was essential for the resolution.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Feb 2024 19:06:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012655#M587065</guid>
      <dc:creator>rafaelsalvinos</dc:creator>
      <dc:date>2024-02-04T19:06:37Z</dc:date>
    </item>
    <item>
      <title>Re: Smartphone Authentication via EAP-TLS on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012843#M587081</link>
      <description>&lt;P&gt;Hi Rafael, glad I could help, and thanks for sharing your findings.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2024 09:47:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5012843#M587081</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-05T09:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: Smartphone Authentication via EAP-TLS on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5013323#M587101</link>
      <description>&lt;P&gt;HI&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I generated an endpoint certificate provisioned through the ISE portal and installed it on the Android 11 smartphone with the same MAC as the generated certificate.&lt;/P&gt;&lt;P&gt;I also installed the CA ISE certificates on the smartphone:&lt;BR /&gt;- Certificate Services Root CA&lt;BR /&gt;- Certificates Node CA&lt;BR /&gt;- Certificates Services Endpoint Sub CA.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_0-1707185306485.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209669iF1EA255CB6C86099/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_0-1707185306485.png" alt="rafaelsalvinos_0-1707185306485.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured the wireless network on the smartphone:&lt;BR /&gt;Security: WPA/WPA2/WPA3-Enterprise&lt;BR /&gt;EAP Method: TLS&lt;BR /&gt;Identity: &amp;lt;I entered the same user used on the ISE certificate portal&amp;gt;&lt;BR /&gt;CA Certificate: Certificate Services Root CA&lt;BR /&gt;Note: I also did a test pointing to Certificates Services Endpoint Sub CA.&lt;BR /&gt;User certificate: &amp;lt;Endpoint certificate generated in the ISE certificate provisioning portal&amp;gt;&lt;/P&gt;&lt;P&gt;I selected the option to use the device's MAC instead of Random MAC.&lt;/P&gt;&lt;P&gt;Still, I was unsuccessful in authentication, I got the following errors, according to the ISE log:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_1-1707185395754.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209670iB08399339F40704A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_1-1707185395754.png" alt="rafaelsalvinos_1-1707185395754.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_2-1707185500217.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209671i00321B6DD85E05A8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_2-1707185500217.png" alt="rafaelsalvinos_2-1707185500217.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_4-1707185577816.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209673i304CAE4784858C57/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_4-1707185577816.png" alt="rafaelsalvinos_4-1707185577816.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_6-1707185634095.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209675i6BD9029DF28CE1D7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_6-1707185634095.png" alt="rafaelsalvinos_6-1707185634095.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2024 02:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5013323#M587101</guid>
      <dc:creator>rafaelsalvinos</dc:creator>
      <dc:date>2024-02-06T02:15:05Z</dc:date>
    </item>
    <item>
      <title>Re: Smartphone Authentication via EAP-TLS on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5013437#M587104</link>
      <description>&lt;P&gt;Hello Rafael,&lt;/P&gt;
&lt;P&gt;I'm not an Android guys (smiley face) so please bear with me. The error is clearly stating that the client can't trust ISE local cert. Who is the issuer of the certificate installed in ISE for EAP services?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2024 09:40:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5013437#M587104</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-06T09:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: Smartphone Authentication via EAP-TLS on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5013508#M587106</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No problem my friend, you've helped me a lot so far.&lt;BR /&gt;The certificate issuer installed in ISE for EAP services is Thawte, an external CA.&lt;BR /&gt;I understand that in this case I need to install Thawte's Root CA and Intermediate CA certificate on the smartphone, so that it is possible to authenticate via EAP-TLS, correct?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2024 12:11:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5013508#M587106</guid>
      <dc:creator>rafaelsalvinos</dc:creator>
      <dc:date>2024-02-06T12:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: Smartphone Authentication via EAP-TLS on Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5013527#M587107</link>
      <description>&lt;P&gt;Yes, that's correct, otherwise when ISE presents its certificate which has been issued by Thawte, the smart phone won't trust it unless you import its issuer and you associate it to the SSID profile. Best practice to import the whole chain, however, I think it would be enough to import Thawte root CA cert into the smart phone, also because I think in Android you can select only a single CA certificate in the SSID profile.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2024 12:41:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/smartphone-authentication-via-eap-tls-on-cisco-ise/m-p/5013527#M587107</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-06T12:41:34Z</dc:date>
    </item>
  </channel>
</rss>

