<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Dot1.x Certificates and OCSP in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-dot1-x-certificates-and-ocsp/m-p/5072032#M588817</link>
    <description>&lt;P&gt;If its a distributed deployment of ISE. Is it just a case of literally importing the root ca to the Primary Admin node? Or do i need to do somehow get the cert onto all the PSNs too?&lt;/P&gt;</description>
    <pubDate>Wed, 17 Apr 2024 14:22:23 GMT</pubDate>
    <dc:creator>glsparks</dc:creator>
    <dc:date>2024-04-17T14:22:23Z</dc:date>
    <item>
      <title>ISE Dot1.x Certificates and OCSP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1-x-certificates-and-ocsp/m-p/5067351#M588707</link>
      <description>&lt;P&gt;So I'd like to use ISE to authenticate then authorise a device based on an external CA presented during 802.1x. I'd also like ISE to use an OCSP check for the validity of this cert.&lt;/P&gt;&lt;P&gt;What are the steps to get this to work? Do i need to import the root ca into ISE? How do i configure ISE to use OCSP?&lt;/P&gt;&lt;P&gt;What would the authentication match statement look like?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 14:59:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1-x-certificates-and-ocsp/m-p/5067351#M588707</guid>
      <dc:creator>netops4</dc:creator>
      <dc:date>2024-04-12T14:59:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Dot1.x Certificates and OCSP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1-x-certificates-and-ocsp/m-p/5067362#M588708</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/404421"&gt;@netops4&lt;/a&gt; you import the root certificate to ISE "trusted certificates" under that certificate you configure certificate status validation to use OCSP.&lt;/P&gt;
&lt;P&gt;For AuthC match you can match on EAP-TLS, for AuthZ you can match on an attribute from the certificate (certificate template, issuer etc).&lt;/P&gt;
&lt;P&gt;If you want to perform a lookup against AD you can also use a Certificate Authentication Profile (CAP).&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 15:10:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1-x-certificates-and-ocsp/m-p/5067362#M588708</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-04-12T15:10:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Dot1.x Certificates and OCSP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1-x-certificates-and-ocsp/m-p/5067369#M588709</link>
      <description>&lt;P&gt;&lt;A href="https://networkwizkid.com/working-with-certificate-revocation-lists-and-cisco-ise/" target="_blank"&gt;https://networkwizkid.com/working-with-certificate-revocation-lists-and-cisco-ise/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Check this&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 15:14:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1-x-certificates-and-ocsp/m-p/5067369#M588709</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-12T15:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Dot1.x Certificates and OCSP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1-x-certificates-and-ocsp/m-p/5072032#M588817</link>
      <description>&lt;P&gt;If its a distributed deployment of ISE. Is it just a case of literally importing the root ca to the Primary Admin node? Or do i need to do somehow get the cert onto all the PSNs too?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2024 14:22:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1-x-certificates-and-ocsp/m-p/5072032#M588817</guid>
      <dc:creator>glsparks</dc:creator>
      <dc:date>2024-04-17T14:22:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Dot1.x Certificates and OCSP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1-x-certificates-and-ocsp/m-p/5072082#M588820</link>
      <description>&lt;P&gt;You just need to do that on the PAN.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2024 14:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1-x-certificates-and-ocsp/m-p/5072082#M588820</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-17T14:56:44Z</dc:date>
    </item>
  </channel>
</rss>

