<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE pxGrid client/server certificate creation and renewal in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-pxgrid-client-server-certificate-creation-and-renewal/m-p/5309782#M597287</link>
    <description>&lt;P&gt;Thanks, that's clear.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Jul 2025 22:57:38 GMT</pubDate>
    <dc:creator>JaseNL</dc:creator>
    <dc:date>2025-07-15T22:57:38Z</dc:date>
    <item>
      <title>ISE pxGrid client/server certificate creation and renewal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pxgrid-client-server-certificate-creation-and-renewal/m-p/5309526#M597267</link>
      <description>&lt;P&gt;I am setting up a number of servers as pxGrid clients and I have a couple of questions about what's possible and what's best practice.&lt;/P&gt;&lt;P&gt;1. Is it possible to generate a client/server certificate using a private key generated locally on the server?&lt;/P&gt;&lt;P&gt;2. All the documentation I've seen up till now describes renewing the client/server certificate from the GUI. Are there any facilities for automating this?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 11:48:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pxgrid-client-server-certificate-creation-and-renewal/m-p/5309526#M597267</guid>
      <dc:creator>JaseNL</dc:creator>
      <dc:date>2025-07-15T11:48:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE pxGrid client/server certificate creation and renewal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pxgrid-client-server-certificate-creation-and-renewal/m-p/5309768#M597284</link>
      <description>&lt;P&gt;1. If you're talking about a private key generated on an external server, then yes. You can generate a private key and CSR on an external server, have it signed by your CA (using a template with both the Client and Server Auth EKUs), then import the key and signed certificate into ISE for the pxGrid usage.&lt;BR /&gt;On ISE directly, you can only generate the CSR (which generates the private key stored internally). Only after binding the signed certificate to the CSR in ISE are you able to export the private key (with the certificate).&lt;/P&gt;
&lt;P&gt;2. Yes, there are APIs and IaC tools (Ansible, Terraform) for performing the same Certificate operations as in the GUI.&lt;BR /&gt;&lt;A href="https://developer.cisco.com/docs/identity-services-engine/latest/certificate-openapi/" target="_blank"&gt;https://developer.cisco.com/docs/identity-services-engine/latest/certificate-openapi/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 22:08:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pxgrid-client-server-certificate-creation-and-renewal/m-p/5309768#M597284</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-07-15T22:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE pxGrid client/server certificate creation and renewal</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-pxgrid-client-server-certificate-creation-and-renewal/m-p/5309782#M597287</link>
      <description>&lt;P&gt;Thanks, that's clear.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 22:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-pxgrid-client-server-certificate-creation-and-renewal/m-p/5309782#M597287</guid>
      <dc:creator>JaseNL</dc:creator>
      <dc:date>2025-07-15T22:57:38Z</dc:date>
    </item>
  </channel>
</rss>

