<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Identity Certificate. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450489#M88055</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Stephen, Thanks for that insight. Gives me another avenue to try. Appreciate it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Feb 2014 08:14:24 GMT</pubDate>
    <dc:creator>graham.harper</dc:creator>
    <dc:date>2014-02-14T08:14:24Z</dc:date>
    <item>
      <title>ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450487#M88053</link>
      <description>&lt;P&gt;Hi there, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any experience with Publicly signed ID certificates for ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are going to be deploying Guest Services via CWA. When a user connects to the portal they get a certificate error as the current ID certificates are only signed by our internal CA and nobody but internal users will have that CA installed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went to an external provider (Geotrust) and wanted to get a Public CA signed Certificate with the CN = guestportal.company.com and SAN fields of internalserver.company.local.lcl, Private IP of BOX and External IP of Box. I get this Error from Geotrust. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="color: red; margin-top: px; margin-bottom: px;"&gt;&lt;STRONG&gt;Certificates that expire&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; after November 1st, 2015 may not contain an internal server IP address or&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; server name. Please modify SAN entry to continue.&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Researching further into this it seems that all Certificates being issued by Public CA’s need to abide by the following new rules. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;“What is an Internal Name?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An internal name is a domain or IP address that is part of a private network. Common examples of internal names are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Any server name with a non-public domain name suffix. For example, &lt;A href="http://www.contoso.local" target="_blank" rel="nofollow noopener noreferrer"&gt;www.contoso.local&lt;/A&gt; or server1.contoso.internal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NetBIOS names or short hostnames, anything without a public domain. For example, Web1, ExchCAS1, or Frodo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Any IPv4 address in the RFC 1918 range.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Any IPv6 address in the RFC 4193 range.”&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone got around this? Or will the guests just have to put up with the Certificate error? Also I'll have to change the PSN's hostname to the CN which has implications for it joining our internal active directory so not keen on that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've ready that LDAP might be my only solution which I am not really keen on see below. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/document/12012726/ise11-guest-captive-portal-certificate-error-solution-lwa-reverse-proxy" target="_blank"&gt;https://supportforums.cisco.com/docs/DOC-37562&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2022 07:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450487#M88053</guid>
      <dc:creator>graham.harper</dc:creator>
      <dc:date>2022-03-10T07:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450488#M88054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This requirement by public providers is a pain but a reality I suppose. In terms of your concerns I have deployed this many times without drama (ISE 1.2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal name refers to a private domain name eg internaldomain.local whereas public is your publicdomain.com.au&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Joining AD - Never had a problem with the PSN been on a "different" domain ie public FQDN vs internal FQDN. Just join the box to AD as you would normally. For intents and purposes the FQDN of the policy node is pretty much portal related. If there is an internal standards issue then you could always use the host alias functionality on another NIC so you can leave the primary hostname of the PSN alone and make a specific interface serve up a portal on a host-alias:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/installation_guide/ise_ig/ise_app_e_man_cert.html#wp1183032" rel="nofollow"&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/installation_guide/ise_ig/ise_app_e_man_cert.html#wp1183032&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The biggest issue I encounter with all of this is my clients having to resolve an "internal" host to a public FQDN. The issue is not technical generally but people generally seem to hate the idea of an internal ip inside the network resolving to a public name (I might add it does not need to resolve externally).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In summary the solution will work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Feb 2014 22:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450488#M88054</guid>
      <dc:creator>Stephen McBride</dc:creator>
      <dc:date>2014-02-13T22:16:02Z</dc:date>
    </item>
    <item>
      <title>ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450489#M88055</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Stephen, Thanks for that insight. Gives me another avenue to try. Appreciate it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Feb 2014 08:14:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450489#M88055</guid>
      <dc:creator>graham.harper</dc:creator>
      <dc:date>2014-02-14T08:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450490#M88056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've changed my deployment to company.com instead of company.local now because of this. We have split DNS setup and haven't encountered a problem as yet although my lab is not in production as yet.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Feb 2014 21:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450490#M88056</guid>
      <dc:creator>switched switch</dc:creator>
      <dc:date>2014-02-14T21:47:04Z</dc:date>
    </item>
    <item>
      <title>ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450491#M88057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi graham,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI, please check these possible conditions, due to these condition this issue can occur:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check if the Active Directory configuration in the Admin portal is correct. &lt;/P&gt;&lt;P&gt;The supplicant or client machine is not accepting the certificate from Cisco ISE. &lt;/P&gt;&lt;P&gt;The client machine is configured to validate the server certificate, but is not configured to trust the Cisco ISE certificate. &lt;/P&gt;&lt;P&gt;The client machine must accept the Cisco ISE certificate to enable authentication. &lt;/P&gt;&lt;P&gt;This issue can apply to any expired certificates on Cisco ISE. &lt;/P&gt;&lt;P&gt;Your Cisco ISE certificate is about to expire or has expired.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Feb 2014 12:17:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450491#M88057</guid>
      <dc:creator>Muhammad Munir</dc:creator>
      <dc:date>2014-02-18T12:17:44Z</dc:date>
    </item>
    <item>
      <title>ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450492#M88058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've already started rolling this out in deployments. Here's what I have been doing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Deploy ISE nodes with the external domain - company.com.&lt;/LI&gt;&lt;LI&gt;Setup split DNS internally to resolve psn.company.com and ise.company.com to the internal IP addresses.&lt;/LI&gt;&lt;LI&gt;Purchase a wildcard certificate for *.company.com and apply to ISE nodes for HTTPS only.&lt;/LI&gt;&lt;LI&gt;Use an internal CA signed certificate for EAP authentications still so your domain computers don't freak out about not having a trusted certificate (by default, Microsoft does not support 3rd party certificates for EAP authentications, but you can import them into the NTAuth store)&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With that solution, clients accessing the HTTPS portals for guest authentication, sponsor portal, or CWA do not receive a certificate warning and your internal domain computers to not receive a certificate warning for PEAP or EAP-TLS authentications.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Feb 2014 15:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450492#M88058</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2014-02-18T15:47:06Z</dc:date>
    </item>
    <item>
      <title>ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450493#M88059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp; OCSP but sending ISE certificate to identity ISE via HTTPS.&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp; LDAP but sending a user/pass to identify ISE. Can we add a user/pass on the LDAP URL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as we know none of the above is currently supported in ISE, is this something that we are working on for future ISE releases?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Feb 2014 13:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450493#M88059</guid>
      <dc:creator>blenka</dc:creator>
      <dc:date>2014-02-20T13:09:15Z</dc:date>
    </item>
    <item>
      <title>I have run into he same</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450494#M88060</link>
      <description>&lt;P&gt;&lt;FONT face="Arial, Helvetica"&gt;&lt;SPAN style="font-size: 12px; line-height: normal;"&gt;I have run&amp;nbsp;into he same situation with public CAs. I need two separate certs, a public https one and an internal EAP one, each on a different domain. Is this possible? if so how do you generate the certs for two different domains? The public one is&amp;nbsp;straight&amp;nbsp;ford as it will have the correct domain on configure on the ISE node. However for the EAP cert how will an internal PKI react to a CSR generated by a box on a different domain?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="Arial, Helvetica"&gt;&lt;SPAN style="font-size: 12px; line-height: normal;"&gt;Recently I had a conversation with the TAC engineer. And the outcome seemed positive. The outcome from that conversation was the following:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR style="-webkit-user-select: text; font-family: Arial, Helvetica; font-size: 12px; line-height: normal;" /&gt;&lt;BR style="-webkit-user-select: text; font-family: Arial, Helvetica; font-size: 12px; line-height: normal;" /&gt;&lt;SPAN style="font-family: Arial, Helvetica; font-size: 12px; line-height: normal;"&gt;- Https wild card certificate from Public issuer with example.org.au&amp;nbsp;&lt;/SPAN&gt;&lt;BR style="-webkit-user-select: text; font-family: Arial, Helvetica; font-size: 12px; line-height: normal;" /&gt;&lt;SPAN style="font-family: Arial, Helvetica; font-size: 12px; line-height: normal;"&gt;- CLI change on ISE nodes to change their domain to org.au&lt;/SPAN&gt;&lt;BR style="-webkit-user-select: text; font-family: Arial, Helvetica; font-size: 12px; line-height: normal;" /&gt;&lt;SPAN style="font-family: Arial, Helvetica; font-size: 12px; line-height: normal;"&gt;- The company DNS must be able to resolve the ISE FQDN node names with example.org.au. For example - ISE01.example.org.au.&amp;nbsp;&lt;/SPAN&gt;&lt;BR style="-webkit-user-select: text; font-family: Arial, Helvetica; font-size: 12px; line-height: normal;" /&gt;&lt;SPAN style="font-family: Arial, Helvetica; font-size: 12px; line-height: normal;"&gt;- The EAP certificate can be issued from the legacy Corporate PKI with a domain of example.local&lt;/SPAN&gt;&lt;BR style="-webkit-user-select: text; font-family: Arial, Helvetica; font-size: 12px; line-height: normal;" /&gt;&lt;BR style="-webkit-user-select: text; font-family: Arial, Helvetica; font-size: 12px; line-height: normal;" /&gt;&lt;SPAN style="font-family: Arial, Helvetica; font-size: 12px; line-height: normal;"&gt;However in a response to the same question the account team have said:&lt;/SPAN&gt;&lt;BR style="-webkit-user-select: text; font-family: Arial, Helvetica; font-size: 12px; line-height: normal;" /&gt;&lt;BR style="-webkit-user-select: text; font-family: Arial, Helvetica; font-size: 12px; line-height: normal;" /&gt;&lt;SPAN style="font-family: Arial, Helvetica; font-size: 12px; line-height: normal;"&gt;In response to checking if ISE can deployed with multiple domain certificates such as for http management on example.org and EAP on example.internal.org&lt;/SPAN&gt;&lt;BR style="-webkit-user-select: text; font-family: Arial, Helvetica; font-size: 12px; line-height: normal;" /&gt;&lt;BR style="-webkit-user-select: text; font-family: Arial, Helvetica; font-size: 12px; line-height: normal;" /&gt;&lt;SPAN style="font-family: Arial, Helvetica; font-size: 12px; line-height: normal;"&gt;The reason why this is not possible is because for installing a certificate in ISE you need to pass few conditions -&amp;nbsp;&lt;/SPAN&gt;&lt;BR style="-webkit-user-select: text;" /&gt;&lt;BR style="-webkit-user-select: text;" /&gt;&lt;SPAN style="font-size:12px;"&gt;"Cisco ISE checks for a matching subject name as follows:&lt;BR style="-webkit-user-select: text;" /&gt;&lt;BR style="-webkit-user-select: text;" /&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;1.Cisco ISE looks at the subject alternative name (SAN) extension of the certificate. If the SAN contains one or more DNS names, then one of the DNS names must match the FQDN of the Cisco ISE node. If a wildcard certificate is used, then the wildcard domain name must match the domain in the Cisco ISE node’s FQDN.&lt;/SPAN&gt;&lt;BR style="-webkit-user-select: text;" /&gt;&lt;BR style="-webkit-user-select: text;" /&gt;2.If there are no DNS names in the SAN, or if the SAN is missing entirely, then the Common Name (CN) in the Subject field of the certificate or the wildcard domain in the Subject field of the certificate must match the FQDN of the node.&lt;BR style="-webkit-user-select: text;" /&gt;&lt;BR style="-webkit-user-select: text;" /&gt;3.If no match is found, the certificate is rejected."&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 May 2014 01:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450494#M88060</guid>
      <dc:creator>danhosking</dc:creator>
      <dc:date>2014-05-15T01:32:35Z</dc:date>
    </item>
    <item>
      <title>It sounds like you are trying</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450495#M88061</link>
      <description>&lt;P&gt;It sounds like you are trying to put two certs on the one box is that correct? 1 for HTTPs and one for EAP? If so I don't think you need too. Basically the server certificate can be used for both HTTPS (management portals etc) and for EAP. When the tick box for EAP is ticked you have to realise this isn't been used for the AAA component but to secure the tunnel for the AAA stuff. In terms of authenticating the actual user certificates you basically need to have the issuing roots and subs in the cert store with trust for EAP enabled.&lt;/P&gt;</description>
      <pubDate>Thu, 15 May 2014 01:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450495#M88061</guid>
      <dc:creator>Stephen McBride</dc:creator>
      <dc:date>2014-05-15T01:50:41Z</dc:date>
    </item>
    <item>
      <title>Correct two certs. The reason</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450496#M88062</link>
      <description>&lt;P&gt;Correct two certs. The reason is the public CA's won't sign a wildcard .local cert anymore. Our client has a .local internal domain for users, AD etc. so I need a eap cert for .local generated from their PKI and separate public signed cert example.org domain for http cert.&lt;/P&gt;&lt;P&gt;If this combination is not possible I will use a cert with lots of SAN entries as the public CA's will still do these.&lt;/P&gt;</description>
      <pubDate>Thu, 15 May 2014 02:26:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450496#M88062</guid>
      <dc:creator>danhosking</dc:creator>
      <dc:date>2014-05-15T02:26:13Z</dc:date>
    </item>
    <item>
      <title>Is this a distributed</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450497#M88063</link>
      <description>&lt;P&gt;Is this a distributed deployment? In all my deployments I am using either a wildcard/SAN public certificate for my PSNs and using internal PKI for the admin and monitoring. Bascially the PSNs have a public domain name and the admin and monitoring have an internal domain name.&lt;/P&gt;&lt;P&gt;Bascially what I am getting at is there is no requirement for an internal server certificate on the PSN to support EAP connections from an internal domain - the public server cert will do the job just fine - all you have to do is make sure the issuing servers are selected if you are validating the server certificate on the clinet machine. The server certificate itself is utilised to create a tunnel and does not impact the ability of a client to authenticate.&lt;/P&gt;&lt;P&gt;If I am not understanding your concern my apologies.&lt;/P&gt;</description>
      <pubDate>Thu, 15 May 2014 02:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/2450497#M88063</guid>
      <dc:creator>Stephen McBride</dc:creator>
      <dc:date>2014-05-15T02:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/3771153#M88064</link>
      <description>For step #4 - What do you use for the CN and SAN fields when generating the CSR?</description>
      <pubDate>Wed, 02 Jan 2019 05:34:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/3771153#M88064</guid>
      <dc:creator>Brickbr</dc:creator>
      <dc:date>2019-01-02T05:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/3771160#M88065</link>
      <description>I don't feel that the warning in step 4 is accurate, I almost exclusively use a third party issued cert for EAP in customer ISE deployments.   They have the root CA/Intermediate chain pushed to the machines. The only time I have had an issue with this is when I tried *.domain.com as the CN, we now know many microsoft workstations do not like wildcard CN's. &lt;BR /&gt;&lt;BR /&gt;For the CN you can use anything you want so long as it also appears in the SAN field.  For most deployments this is usually the hostname of the primary admin node, but that is by no means a requirement. For example, you can have a cert like this (ise.mydomain.com doest exist);&lt;BR /&gt;&lt;BR /&gt;CN=ise.mydomain.com&lt;BR /&gt;SAN=ise.mydomain.com&lt;BR /&gt;SAN=node1.mydomain.com&lt;BR /&gt;SAN=node2.mydomain.com&lt;BR /&gt;SAN=guestportal.mydomain.com&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If you wish to use a wildcard cert for a deployment then it should look like this.  I have used a sub domain in this example since most companies do not want to wildcard their entire domain. &lt;BR /&gt;&lt;BR /&gt;CN=ise.mydomain.com&lt;BR /&gt;SAN=*.sub.mydomain.com&lt;BR /&gt;SAN=guest.mydomain.com&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;In either case, you need to account for all the nodes in the dpeloyment, either by entering each hostname in the SAN fields, or using a wildcard.</description>
      <pubDate>Wed, 02 Jan 2019 05:59:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/3771160#M88065</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-01-02T05:59:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/3771382#M88066</link>
      <description>&lt;P&gt;I am more so thinking of a case where the ISE deployment was deployed with a public domain (ex: mydomain.com), but the customer wants to use their internal CA for EAP. So i would be requesting EAP certificates with a CN of PSN1.mydomain.com but on a CA in the domain.local domain.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 14:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/3771382#M88066</guid>
      <dc:creator>Brickbr</dc:creator>
      <dc:date>2019-01-02T14:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4010511#M88067</link>
      <description>&lt;P&gt;Hi Damien, is it ok to use ISE private IP in the SAN and if so which public CA can do this for us?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 14:44:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4010511#M88067</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2020-01-13T14:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4010555#M88068</link>
      <description>It is technically possible to add IP addresses to the SAN field, however no reputable public CA will sign a cert with a private IP in the SANs. If you owned a public IP, then they might sign the csr assuming you can prove ownership.</description>
      <pubDate>Mon, 13 Jan 2020 15:34:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4010555#M88068</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2020-01-13T15:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4123696#M561848</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CN=ise.mydomain.com&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;SAN=ise.mydomain.com&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;SAN=node1.mydomain.com&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;SAN=node2.mydomain.com&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;SAN=guestportal.mydomain.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on the example you gave above, can the CN=&lt;SPAN&gt;ise.mydomain.com be a DNS Alias for PSN1 and PSN2 instead of an A record?&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;Does it even need to exist in DNS?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2020 17:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4123696#M561848</guid>
      <dc:creator>grabonlee</dc:creator>
      <dc:date>2020-07-22T17:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4123884#M561857</link>
      <description>&lt;P&gt;The CN, in this example ise.domain.com, can exist in DNS or not. It's flexible and up to you, it can be a real node, it can just be an alias, it could be a guest portal, the option is yours there.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;In most cases I have seen, the CN doesn't have a DNS record anymore because it is just an old legacy fqdn from a radius servers in the past. Nothing stopping a person from defining it though.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2020 23:35:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4123884#M561857</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2020-07-22T23:35:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4123935#M561859</link>
      <description>&lt;P&gt;Thanks for responding, given that the post is old. Based on what you said, I guess that the CN would be relevant if a public cert with no SAN is used, which I’ve mostly seen used for guest portal,&amp;nbsp;&lt;SPAN&gt;but for private domain, a DNS for a “generic” CN isn’t relevant.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 02:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4123935#M561859</guid>
      <dc:creator>grabonlee</dc:creator>
      <dc:date>2020-07-23T02:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4123940#M561860</link>
      <description>Either or, you could structure a both public ca cert or internal pki cert the same way, really up to how one want's to use it within the deployment.</description>
      <pubDate>Thu, 23 Jul 2020 03:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-certificate/m-p/4123940#M561860</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2020-07-23T03:10:43Z</dc:date>
    </item>
  </channel>
</rss>

