<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remove EAP from ISE Server Certificate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/remove-eap-from-ise-server-certificate/m-p/2289842#M97028</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Explain the issue in more detail. Are you trying to use Guest or 802.1x. THere are many authentication protocols that you could use for EAP. TLS and PEAP require the use the the cert. What you trying to accomplish and what are the issues?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jim Thomas &lt;BR /&gt;Cisco Security Course Director &lt;BR /&gt;Global Knowledge &lt;BR /&gt;CCIE Security #16674&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Oct 2013 19:25:56 GMT</pubDate>
    <dc:creator>Jim Thomas</dc:creator>
    <dc:date>2013-10-17T19:25:56Z</dc:date>
    <item>
      <title>Remove EAP from ISE Server Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/remove-eap-from-ise-server-certificate/m-p/2289840#M97017</link>
      <description>&lt;P&gt;I've installed GoDaddy server certificates on all my ISE 1.1.1 nodes, but clients are still getting error and accepting certificates.&amp;nbsp; I would like to just remove EAP from the certificate and not use any certificate for EAP.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:00:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remove-eap-from-ise-server-certificate/m-p/2289840#M97017</guid>
      <dc:creator>rdotson</dc:creator>
      <dc:date>2019-03-11T04:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: Remove EAP from ISE Server Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/remove-eap-from-ise-server-certificate/m-p/2289841#M97023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm pretty sure that you have to use a certificate for EAP whether it is a self-signed one or an internal CA or 3rd party certificate, but I could be wrong.&amp;nbsp; To remove using EAP from your GoDaddy Certificate simply edit another certificate and check the box for EAP.&amp;nbsp; The application server will restart and the new certificate will now be used for EAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you get an error on Microsoft PCs saying somthing about the server not being a trusted NPS server then you can try adding the GoDaddy root certificate to your internal PKI NTAuth store. See this article:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://support.microsoft.com/kb/2518158?wa=wsignin1.0" rel="nofollow"&gt;http://support.microsoft.com/kb/2518158?wa=wsignin1.0&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2013 19:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remove-eap-from-ise-server-certificate/m-p/2289841#M97023</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2013-10-17T19:23:59Z</dc:date>
    </item>
    <item>
      <title>Remove EAP from ISE Server Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/remove-eap-from-ise-server-certificate/m-p/2289842#M97028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Explain the issue in more detail. Are you trying to use Guest or 802.1x. THere are many authentication protocols that you could use for EAP. TLS and PEAP require the use the the cert. What you trying to accomplish and what are the issues?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jim Thomas &lt;BR /&gt;Cisco Security Course Director &lt;BR /&gt;Global Knowledge &lt;BR /&gt;CCIE Security #16674&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2013 19:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remove-eap-from-ise-server-certificate/m-p/2289842#M97028</guid>
      <dc:creator>Jim Thomas</dc:creator>
      <dc:date>2013-10-17T19:25:56Z</dc:date>
    </item>
    <item>
      <title>Remove EAP from ISE Server Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/remove-eap-from-ise-server-certificate/m-p/2289843#M97038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thank you for your answers.&amp;nbsp; The issue was caused more by not having the root certificate from GoDaddy in the Certificate Store.&amp;nbsp; I was able to move EAP to another self signed certificate like you suggested though.&amp;nbsp;&amp;nbsp; A call to TAC confirmed it all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2013 20:44:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remove-eap-from-ise-server-certificate/m-p/2289843#M97038</guid>
      <dc:creator>rdotson</dc:creator>
      <dc:date>2013-10-17T20:44:48Z</dc:date>
    </item>
    <item>
      <title>Remove EAP from ISE Server Certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/remove-eap-from-ise-server-certificate/m-p/2289844#M97078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so yes if you have "validate server certificate" option checked on your end clients then in order to authenticate with peap you should have the complete certificate chain installed on the end client under certificate store. With this option unchecked you can still authenticate without root/intermediate but that would not be a secure connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Certificate requirements when you use EAP-TLS or PEAP with EAP-TLS&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://support.microsoft.com/kb/814394"&gt;http://support.microsoft.com/kb/814394&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My 2 cents &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2013 09:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remove-eap-from-ise-server-certificate/m-p/2289844#M97078</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-10-18T09:05:28Z</dc:date>
    </item>
  </channel>
</rss>

