<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE Trusted Certificate Renewal in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-trusted-certificate-renewal/m-p/5371352#M599831</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1885457"&gt;@renzanjo-caparas&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Root CA is the CA that issues the intermediate CA(s). If it's only the intermediate CA(s) that is/are expiring, then you would not replace the Root CA - you would generate a new Intermediate CA from the existing Root CA.&amp;nbsp; Of course, if your Root CA is going to expire soon, then you would have to replace the entire thing (Root + Intermediates). Perhaps that is what they meant.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;You can export that Root CA from ISE Trusted Certificates section.&lt;/P&gt;
&lt;P&gt;I tend to use openssl or XCA to test cert chains.&amp;nbsp; If you only have a Windows PC, you can also import these certs (Root and Intermediate) on the PC and then click on them - the Windows cert viewer is quite handy to validate CA cert chains.&lt;/P&gt;</description>
    <pubDate>Thu, 19 Feb 2026 20:30:27 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2026-02-19T20:30:27Z</dc:date>
    <item>
      <title>Cisco ISE Trusted Certificate Renewal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-trusted-certificate-renewal/m-p/5371076#M599825</link>
      <description>&lt;P&gt;Hi everyone,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Good day and greetings!&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Our Intermediate CA will expire in 60 days. Somebody told me from the organization that I should renew the Root instead. But when I check the Hierarchy in Cisco ISE it is showing "Certificate is good"&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="renzanjocaparas_0-1771461705418.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/259889i0058C97B76A7EB52/image-size/medium?v=v2&amp;amp;px=400" role="button" title="renzanjocaparas_0-1771461705418.png" alt="renzanjocaparas_0-1771461705418.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;This Intermediate is the one we are really planning to renew&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="renzanjocaparas_1-1771461733694.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/259890iA88C5BCD9665C1A5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="renzanjocaparas_1-1771461733694.png" alt="renzanjocaparas_1-1771461733694.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Two questions I have:&lt;/P&gt;
&lt;P&gt;1. Is he correct?&lt;/P&gt;
&lt;P&gt;2. Where can i export that Root CA to verify this chain?&lt;/P&gt;
&lt;P&gt;Regards!&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 00:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-trusted-certificate-renewal/m-p/5371076#M599825</guid>
      <dc:creator>renzanjo-caparas</dc:creator>
      <dc:date>2026-02-19T00:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Trusted Certificate Renewal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-trusted-certificate-renewal/m-p/5371352#M599831</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1885457"&gt;@renzanjo-caparas&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Root CA is the CA that issues the intermediate CA(s). If it's only the intermediate CA(s) that is/are expiring, then you would not replace the Root CA - you would generate a new Intermediate CA from the existing Root CA.&amp;nbsp; Of course, if your Root CA is going to expire soon, then you would have to replace the entire thing (Root + Intermediates). Perhaps that is what they meant.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;You can export that Root CA from ISE Trusted Certificates section.&lt;/P&gt;
&lt;P&gt;I tend to use openssl or XCA to test cert chains.&amp;nbsp; If you only have a Windows PC, you can also import these certs (Root and Intermediate) on the PC and then click on them - the Windows cert viewer is quite handy to validate CA cert chains.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 20:30:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-trusted-certificate-renewal/m-p/5371352#M599831</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2026-02-19T20:30:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Trusted Certificate Renewal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-trusted-certificate-renewal/m-p/5371384#M599832</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Thank you very much for your feedback. Is this what you meant for exporting? Will this also export the root CA? When exported, it is a PEM file. Sorry I am not much good on certificates.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="renzanjocaparas_0-1771546134221.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/259951iC8EB13675568DB27/image-size/medium?v=v2&amp;amp;px=400" role="button" title="renzanjocaparas_0-1771546134221.png" alt="renzanjocaparas_0-1771546134221.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2026 00:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-trusted-certificate-renewal/m-p/5371384#M599832</guid>
      <dc:creator>renzanjo-caparas</dc:creator>
      <dc:date>2026-02-20T00:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Trusted Certificate Renewal</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-trusted-certificate-renewal/m-p/5371404#M599833</link>
      <description>&lt;P&gt;Yep - that's the one. It will export the trusted certificate (which is a public cert - no private key involved etc.) - you can rename that file to .crt in Windows and then click on it - it will display the cert details.&amp;nbsp; Or you can also install it in your Windows profile.&lt;/P&gt;
&lt;P&gt;I tend to use openssl mostly for this.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2026 03:43:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-trusted-certificate-renewal/m-p/5371404#M599833</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2026-02-20T03:43:39Z</dc:date>
    </item>
  </channel>
</rss>

