<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE 2 node deployment - admin certificate not trusted in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5340987#M598664</link>
    <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;I have a two node ISE setup, running version&amp;nbsp;&lt;SPAN&gt;3.0.0.458. Both nodes have administration, monitoring and policy service personas. There are 2 certificates used:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- self signed for Admin, Portal&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- internal CA issued certificate for RADIUS DTLS, EAP Authentication&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The secondary node self signed certificate was expiring, I generated new self signed certificate and lost admin control over the node. The nodes are still connected, however I am not able to manage it via the primary node GUI and the only thing I can do on the secondary node is to promote it to the Standalone node.&lt;/P&gt;
&lt;P&gt;What is the correct approach to fix the situation? I was thinking of changing role of the secondary node to standalone to get admin access, deregister secondary node from the primary GUI, then register it again to trust its new self signed certificate.&lt;/P&gt;</description>
    <pubDate>Wed, 22 Oct 2025 10:02:30 GMT</pubDate>
    <dc:creator>dusansim</dc:creator>
    <dc:date>2025-10-22T10:02:30Z</dc:date>
    <item>
      <title>ISE 2 node deployment - admin certificate not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5340987#M598664</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;I have a two node ISE setup, running version&amp;nbsp;&lt;SPAN&gt;3.0.0.458. Both nodes have administration, monitoring and policy service personas. There are 2 certificates used:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- self signed for Admin, Portal&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- internal CA issued certificate for RADIUS DTLS, EAP Authentication&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The secondary node self signed certificate was expiring, I generated new self signed certificate and lost admin control over the node. The nodes are still connected, however I am not able to manage it via the primary node GUI and the only thing I can do on the secondary node is to promote it to the Standalone node.&lt;/P&gt;
&lt;P&gt;What is the correct approach to fix the situation? I was thinking of changing role of the secondary node to standalone to get admin access, deregister secondary node from the primary GUI, then register it again to trust its new self signed certificate.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2025 10:02:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5340987#M598664</guid>
      <dc:creator>dusansim</dc:creator>
      <dc:date>2025-10-22T10:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2 node deployment - admin certificate not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5341108#M598667</link>
      <description>&lt;P&gt;Why are you using self-signed certificates? Also why a two node deployment, and not three?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/identity-service-engine-software-3-0.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/identity-service-engine-software-3-0.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2025 17:06:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5341108#M598667</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-10-22T17:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2 node deployment - admin certificate not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5341165#M598670</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1589889"&gt;@dusansim&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Probably de-register and re-register is the way to go.&lt;/P&gt;
&lt;P&gt;In future, instead of regenerating an ISE self-signed cert, you should rather edit them and extend the lifespan. example below. This is possible because the cert simply gets it's valid from and valid to dates updated.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1761175545670.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/254049i9B98A4C96DAFC343/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ArneBier_0-1761175545670.png" alt="ArneBier_0-1761175545670.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for using self-signed for Admin - I agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;- it's ugly because of the browser warnings - at least use your company PKI to create those.&lt;/P&gt;
&lt;P&gt;I can also see from some organisation's point of view, that updating the ISE admin cert is a PAIN. Some organisations have a 1 year policy, and that causes a lot of work and disruption - take a large deployment and then you can spend some hours just with this task.&amp;nbsp; Using a public CA is also not the solution, because of cost, and the fact that those cert lifetimes are 1 year, and will decrease steadily over the coming years.&lt;/P&gt;
&lt;P&gt;Thus: Having self-signed certs for a very long time is an approach I have seen customers take, when they can't afford the downtime.&amp;nbsp; Seems reasonable to me.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2025 23:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5341165#M598670</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-10-22T23:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2 node deployment - admin certificate not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5341901#M598696</link>
      <description>&lt;P&gt;These are good questions and should be answered by the person who designed and implemented the solution. Thank you for pointing out the EOS date.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 11:21:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5341901#M598696</guid>
      <dc:creator>dusansim</dc:creator>
      <dc:date>2025-10-24T11:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2 node deployment - admin certificate not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5341903#M598698</link>
      <description>&lt;P&gt;Hi Arne.&lt;/P&gt;
&lt;P&gt;Thank you for the tip on prolonging the expiration TTL. Is it OK to use the same local CA signed certificate for all purposes, or should I sign one for Admin purpose and the other one for the rest?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 11:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5341903#M598698</guid>
      <dc:creator>dusansim</dc:creator>
      <dc:date>2025-10-24T11:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2 node deployment - admin certificate not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5342365#M598712</link>
      <description>&lt;P&gt;In your case, I would use the ISE self-signed cert for Admin, and leave the other fields unticked.&lt;/P&gt;
&lt;P&gt;In my deployments, I don't use self-signed certs for anything (I would use corp PKI signed for Admin, EAP and sponsor portals) and public CA for guest portals. And to avoid cert expiration warnings, I tend to extend all the remaining self-signed certs by 10 years or so, using the edit feature.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Oct 2025 20:21:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-node-deployment-admin-certificate-not-trusted/m-p/5342365#M598712</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-10-26T20:21:11Z</dc:date>
    </item>
  </channel>
</rss>

