<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Failed to send Certificate Auth request to rest ID store: Azure_En in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5356108#M599328</link>
    <description>&lt;P&gt;Thank you for your replay&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What are the exact Device Query settings you have configured?&amp;nbsp; &amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Entra Device Name&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What regex string are you using to match the desired identity?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I am using the predefined regex for &lt;STRONG&gt;SAN-DNS&lt;/STRONG&gt;: ^[a-zA-Z0-9-]+(\.[a-zA-Z0-9-]+)+$&lt;/P&gt;&lt;P&gt;In the value field, I configured:&lt;/P&gt;&lt;P&gt;netz.tuev-nord.de&lt;/P&gt;&lt;P&gt;The certificate contains the following &lt;STRONG&gt;SAN-DNS name&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;DeviceName.netz.tuev-nord.de&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&amp;nbsp;What are the exact values you have in the Device certificate (CN, SAN)?&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The certificate contains the following &lt;STRONG&gt;SAN-DNS name&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;DeviceName.netz.tuev-nord.de&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What are the settings you have defined for the Certificate Authentication Profile?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Certificate Attribute SAN - DNS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 18 Dec 2025 08:58:42 GMT</pubDate>
    <dc:creator>mzarli</dc:creator>
    <dc:date>2025-12-18T08:58:42Z</dc:date>
    <item>
      <title>Failed to send Certificate Auth request to rest ID store: Azure_EntraI</title>
      <link>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5355531#M599307</link>
      <description>&lt;P&gt;I am currently working on &lt;STRONG&gt;device-based authentication and authorization&lt;/STRONG&gt; against &lt;STRONG&gt;Microsoft Entra ID–joined devices&lt;/STRONG&gt; using &lt;STRONG&gt;Cisco ISE 3.4 Patch 4&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;I followed the official Cisco documentation to configure the &lt;STRONG&gt;REST ID Store integration with Entra ID&lt;/STRONG&gt; (including app registration, permissions, and policy configuration). Authentication using &lt;STRONG&gt;EAP-TLS&lt;/STRONG&gt; succeeds, however &lt;STRONG&gt;device-based authorization using Entra ID device groups does not work&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;The authentication and authorization policies are built as described in the documentation&lt;/P&gt;&lt;P&gt;On the &lt;STRONG&gt;Policy Services Node (PSN)&lt;/STRONG&gt;, I consistently see the following error during authorization:&lt;/P&gt;&lt;P&gt;cisco.cpm.restidstore.auth.RestAuthenticator - Failed to send Certificate Auth request to REST ID store: Azure_EntraID_ProDevice for user: DE-N81298.netz.tuev-nord.de&lt;/P&gt;&lt;P&gt;There are &lt;STRONG&gt;no corresponding errors in the RADIUS live logs&lt;/STRONG&gt;, which makes troubleshooting difficult.&lt;/P&gt;&lt;P&gt;Any guidance or troubleshooting suggestions would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2025 12:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5355531#M599307</guid>
      <dc:creator>mzarli</dc:creator>
      <dc:date>2025-12-16T12:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to send Certificate Auth request to rest ID store: Azure_En</title>
      <link>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5355684#M599316</link>
      <description>&lt;P&gt;This is likely indicating that the parser does not find the expected identity or pattern in the certificate to trigger the Graph API lookup for the device.&lt;/P&gt;
&lt;P&gt;To troubleshoot, we would need much more detailed information:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;What are the exact Device Query settings you have configured?&lt;/LI&gt;
&lt;LI&gt;What regex string are you using to match the desired identity?&lt;/LI&gt;
&lt;LI&gt;What are the exact values you have in the Device certificate (CN, SAN)?&lt;/LI&gt;
&lt;LI&gt;What are the settings you have defined for the Certificate Authentication Profile?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;You can see an example of this use case in my blog here to compare against your environment:&lt;BR /&gt;&lt;A href="https://cs.co/ise-entraid#DeviceQuery" target="_blank"&gt;https://cs.co/ise-entraid#DeviceQuery&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you cannot share this information on this forum or this issue is urgent, please open a TAC case to investigate.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2025 21:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5355684#M599316</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-12-16T21:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to send Certificate Auth request to rest ID store: Azure_En</title>
      <link>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5356108#M599328</link>
      <description>&lt;P&gt;Thank you for your replay&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What are the exact Device Query settings you have configured?&amp;nbsp; &amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Entra Device Name&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What regex string are you using to match the desired identity?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I am using the predefined regex for &lt;STRONG&gt;SAN-DNS&lt;/STRONG&gt;: ^[a-zA-Z0-9-]+(\.[a-zA-Z0-9-]+)+$&lt;/P&gt;&lt;P&gt;In the value field, I configured:&lt;/P&gt;&lt;P&gt;netz.tuev-nord.de&lt;/P&gt;&lt;P&gt;The certificate contains the following &lt;STRONG&gt;SAN-DNS name&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;DeviceName.netz.tuev-nord.de&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&amp;nbsp;What are the exact values you have in the Device certificate (CN, SAN)?&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The certificate contains the following &lt;STRONG&gt;SAN-DNS name&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;DeviceName.netz.tuev-nord.de&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What are the settings you have defined for the Certificate Authentication Profile?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Certificate Attribute SAN - DNS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 08:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5356108#M599328</guid>
      <dc:creator>mzarli</dc:creator>
      <dc:date>2025-12-18T08:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to send Certificate Auth request to rest ID store: Azure_En</title>
      <link>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5356119#M599329</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; There could be several reasons. First, can you closely follow this implementation guide, as well as the troubleshooting area and paste the associated logs from the performed investigation?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216182-configure-ise-3-0-rest-id-with-azure-act.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Additionally, ensure you meet the requirements specified in this document, for your ISE version and patch level, look for "&lt;FONT size="3"&gt;Authentication/Authorization of an Entra Joined Device using EAP-TLS (ISE 3.4p4 or 3.5 and later)"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635/show-comments/true#toc-hId-76840754" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635/show-comments/true#toc-hId-76840754&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Afterwards, we'll have more relevant data to look into.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 09:29:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5356119#M599329</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2025-12-18T09:29:09Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to send Certificate Auth request to rest ID store: Azure_En</title>
      <link>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5356312#M599335</link>
      <description>&lt;P&gt;If the certificate value in the SAN field is "DNS Name=&lt;SPAN&gt;DeviceName.netz.tuev-nord.de", then your regex does not match that value.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You would need to use a regex like the one in my blog post that has been linked in both responses:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;^DNS Name=([a-zA-Z0-9-]+).netz.tuev-nord.de&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You need to use the validation to test the &lt;STRONG&gt;exact&lt;/STRONG&gt; match of what is in the certificate field for one of your certificates with the regex string you are configuring. &lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;If you update the regex, successfully test the validation with the real value in your certificate, but it is still not working, you'll need to open a TAC case to investigate. Keep in mind this is a very new and complex feature (code-wise), so there could still be some bugs in the parsing that need to be ironed out. I tested a number of permutations myself, but I couldn't cover everything.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 21:25:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5356312#M599335</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-12-18T21:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to send Certificate Auth request to rest ID store: Azure_En</title>
      <link>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5356450#M599338</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the detailed explanation and for sharing your blog post — it was very helpful.&lt;/P&gt;&lt;P&gt;I understand your point about matching the &lt;STRONG&gt;exact value present in the certificate&lt;/STRONG&gt;, including the full DNS Name= string, and using a regex such as:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;^DNS &lt;SPAN class=""&gt;Name&lt;/SPAN&gt;=([a-zA-Z0&lt;SPAN class=""&gt;-9&lt;/SPAN&gt;-]+).netz.tuev-nord.de&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;After updating the regex accordingly, I can confirm that the &lt;STRONG&gt;validation succeeds and the previous errors are gone&lt;/STRONG&gt;. So from a matching perspective, the regex itself is now working as expected.&lt;/P&gt;&lt;P&gt;However, in my case the remaining challenge is that the &lt;STRONG&gt;device name in Entra ID is stored without the FQDN&lt;/STRONG&gt; (for example, DeviceName), while the certificate SAN contains the full FQDN (DeviceName.netz.tuev-nord.de). Even though the regex matches successfully, ISE still forwards the &lt;STRONG&gt;full FQDN&lt;/STRONG&gt; to Entra ID, which results in &lt;STRONG&gt;no device match&lt;/STRONG&gt; on the Entra side.&lt;/P&gt;&lt;P&gt;From my testing, it appears that the current Azure / Entra Device Query implementation in ISE uses regex only for &lt;STRONG&gt;validation/matching&lt;/STRONG&gt;, and does not support extracting or using a capture group (such as just the hostname) as the device identity.&lt;/P&gt;&lt;P&gt;Do you know if &lt;STRONG&gt;using capture groups to retrieve only the device name&lt;/STRONG&gt; is something that is planned or being considered for a future ISE release? This would be very helpful in environments where certificate identities and Entra device naming conventions don’t fully align.&lt;/P&gt;&lt;P&gt;Thanks again for your time and for the insights you’ve already shared.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Dec 2025 09:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5356450#M599338</guid>
      <dc:creator>mzarli</dc:creator>
      <dc:date>2025-12-19T09:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Failed to send Certificate Auth request to rest ID store: Azure_En</title>
      <link>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5359413#M599468</link>
      <description>&lt;P&gt;No, I'm not aware of any such plans to support that function. The regex is intended to exactly match the attribute in Entra ID, so that ISE can determine a device identity versus a user identity. The fix here would be ensuring that your certificate profiles are defined such that the identity ISE is using in the certificate exactly matches the identity attribute in Entra ID.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2026 21:55:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failed-to-send-certificate-auth-request-to-rest-id-store-azure/m-p/5359413#M599468</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2026-01-06T21:55:07Z</dc:date>
    </item>
  </channel>
</rss>

