<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Changing ISE Certificate for EAP Auth Role in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4654122#M1092023</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;ISE v2.7&lt;/P&gt;&lt;P&gt;Currently, we are using a Certificate on ISE that is signed by our internal Windows CA server. This cert is used for &lt;EM&gt;&lt;STRONG&gt;"Admin, EAP Authentication, RADIUS DTLS, Portal"&lt;/STRONG&gt;&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;We also use a certificate from Digicert for our Guest Portal.&lt;/P&gt;&lt;P&gt;The issue I'm running into is for our BYOD network. Since Android 10, these devices can no longer connect to a WPA2-Enterprise Wi-Fi network where the cert is not publicly signed, or by installing certs directly onto the Android devices &lt;EM&gt;(*which we prefer not to do)&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;I'm wondering what fallout could occur by beginning to use the Digicert, instead of the internally signed cert from our Windows CA server for the Roles described above?&lt;/P&gt;&lt;P&gt;When we had originally setup ISE, I believe we were going to use the CA Certificates for authentication. All of our company owned laptops/desktops have certs on them from the CA server. But, I don't believe we are using those Certs for auth any longer. Is there a way to tell in ISE if those Certs are being checked during authentication?&lt;/P&gt;&lt;P&gt;I know on our ASA, under the AnyConnect Connection Profile, for the Authentication Method we just have that configured for "AAA" and it points to our ISE server.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AnyConnect_Connection_Profile.png" style="width: 587px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/157746i666D5718598EA327/image-size/large?v=v2&amp;amp;px=999" role="button" title="AnyConnect_Connection_Profile.png" alt="AnyConnect_Connection_Profile.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In ISE, would this be found in Policy Sets &amp;gt; Wired/Wireless &amp;gt; under the Conditions column? When looking at the Policy Sets, for Wired and Wireless. Our "Compliant" Policy Set just checks if the PC is in our AD, the location of the endpoint, and its Posture status.&lt;/P&gt;&lt;P&gt;Any help would be appreciated!&lt;/P&gt;&lt;P&gt;Thanks in Advance,&lt;BR /&gt;Matt&lt;/P&gt;</description>
    <pubDate>Wed, 20 Jul 2022 18:20:44 GMT</pubDate>
    <dc:creator>Matthew Martin</dc:creator>
    <dc:date>2022-07-20T18:20:44Z</dc:date>
    <item>
      <title>Changing ISE Certificate for EAP Auth Role</title>
      <link>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4654122#M1092023</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;ISE v2.7&lt;/P&gt;&lt;P&gt;Currently, we are using a Certificate on ISE that is signed by our internal Windows CA server. This cert is used for &lt;EM&gt;&lt;STRONG&gt;"Admin, EAP Authentication, RADIUS DTLS, Portal"&lt;/STRONG&gt;&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;We also use a certificate from Digicert for our Guest Portal.&lt;/P&gt;&lt;P&gt;The issue I'm running into is for our BYOD network. Since Android 10, these devices can no longer connect to a WPA2-Enterprise Wi-Fi network where the cert is not publicly signed, or by installing certs directly onto the Android devices &lt;EM&gt;(*which we prefer not to do)&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;I'm wondering what fallout could occur by beginning to use the Digicert, instead of the internally signed cert from our Windows CA server for the Roles described above?&lt;/P&gt;&lt;P&gt;When we had originally setup ISE, I believe we were going to use the CA Certificates for authentication. All of our company owned laptops/desktops have certs on them from the CA server. But, I don't believe we are using those Certs for auth any longer. Is there a way to tell in ISE if those Certs are being checked during authentication?&lt;/P&gt;&lt;P&gt;I know on our ASA, under the AnyConnect Connection Profile, for the Authentication Method we just have that configured for "AAA" and it points to our ISE server.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AnyConnect_Connection_Profile.png" style="width: 587px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/157746i666D5718598EA327/image-size/large?v=v2&amp;amp;px=999" role="button" title="AnyConnect_Connection_Profile.png" alt="AnyConnect_Connection_Profile.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In ISE, would this be found in Policy Sets &amp;gt; Wired/Wireless &amp;gt; under the Conditions column? When looking at the Policy Sets, for Wired and Wireless. Our "Compliant" Policy Set just checks if the PC is in our AD, the location of the endpoint, and its Posture status.&lt;/P&gt;&lt;P&gt;Any help would be appreciated!&lt;/P&gt;&lt;P&gt;Thanks in Advance,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 18:20:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4654122#M1092023</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2022-07-20T18:20:44Z</dc:date>
    </item>
    <item>
      <title>Re: Changing ISE Certificate for EAP Auth Role</title>
      <link>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4654127#M1092024</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325526"&gt;@Matthew Martin&lt;/a&gt; it's probably the EAP certifcate causing a problem with the Anrdoid devices, it's common to use a public CA to sign the EAP certificate nowadays.&lt;/P&gt;
&lt;P&gt;Refer to this Cisco ISE certificates guide for more information&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-implement-digital-certificates-in-ise/ta-p/3630897" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-implement-digital-certificates-in-ise/ta-p/3630897&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For the Wired/Wireless authentication, what protocol are you using EAP-TLS or PEAP/MSCHAPv2? If using PEAP/MSCHAPv2 then the client would just need to trust the CA signing the ISE EAP certificate.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 18:36:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4654127#M1092024</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-07-20T18:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: Changing ISE Certificate for EAP Auth Role</title>
      <link>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4654225#M1092029</link>
      <description>&lt;P&gt;Thanks for the reply Rob. I will check out that link.&lt;/P&gt;&lt;P&gt;We are using PEAP/MSCHAPv2. So if using a publicly signed Cert, like DigiCert, the clients should automatically trust this cert?&lt;/P&gt;&lt;P&gt;Thanks Again,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 21:54:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4654225#M1092029</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2022-07-20T21:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: Changing ISE Certificate for EAP Auth Role</title>
      <link>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4654227#M1092030</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325526"&gt;@Matthew Martin&lt;/a&gt; most devices will have the Digicert root certificate in their certificate store.&lt;/P&gt;
&lt;P&gt;In regard to Windows devices in particular, check the authentication settings in the GPO configuration, in case you are explictly trusting only your internal CA, tick the box for the Digicert certificate. &lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 21:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4654227#M1092030</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-07-20T21:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: Changing ISE Certificate for EAP Auth Role</title>
      <link>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4655050#M1092046</link>
      <description>&lt;P&gt;Thanks Rob!&lt;/P&gt;&lt;P&gt;I looked at my PC's Trusted Root Cert Authorities store and there is a couple of DigiCert root certificates in there.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DigiCert_Trusted_Root_Certs.png" style="width: 762px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/157823iB690C5E1A79AF80F/image-size/large?v=v2&amp;amp;px=999" role="button" title="DigiCert_Trusted_Root_Certs.png" alt="DigiCert_Trusted_Root_Certs.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I also looked in GPO Management for anything that would be only trusting our Windows CA cert. I found a few policies that are related to Certs and Authentication.&lt;/P&gt;&lt;P&gt;I found the following 3 GPOs &lt;EM&gt;(*I included screenshots below as well&lt;/EM&gt;&lt;EM&gt;) &lt;/EM&gt;:&lt;BR /&gt;&lt;STRONG&gt;1. 802.1x Authentication Enable&lt;/STRONG&gt; - This policy enables the Wired Autoconfig service, sets "Computer only" auth, and sets the Auth Method to PEAP.&lt;BR /&gt;&lt;STRONG&gt;2. &lt;/STRONG&gt;&lt;STRONG&gt;Machine Cert&lt;/STRONG&gt; - This policy appears to enroll the PC with the CA Server, and renews the cert when it expires...&lt;BR /&gt;&lt;STRONG&gt;3. &lt;/STRONG&gt;&lt;STRONG&gt;Root Cert&lt;/STRONG&gt; - This might be what we're looking for, see screenshot... The setting under "Public Key Policies/Trusted Root Certification Authorities" shows my company name in the Issued To and Issued by fields. So I went into the full properties of the Policy and found the following in the attached screenshot, &lt;EM&gt;Root Cert Properties&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="802.1x Auth Enable" style="width: 200px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/157829i769C7E3877A750CB/image-size/small?v=v2&amp;amp;px=200" role="button" title="GPO_8021x_Auth_Enable.png" alt="802.1x Auth Enable" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;802.1x Auth Enable&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Machine Cert" style="width: 200px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/157830i017F037963040B7A/image-size/small?v=v2&amp;amp;px=200" role="button" title="Machine_Cert.png" alt="Machine Cert" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Machine Cert&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Root Cert" style="width: 200px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/157831i3829B8F6089E0CBA/image-size/small?v=v2&amp;amp;px=200" role="button" title="Root_Cert_.png" alt="Root Cert" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Root Cert&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Root Cert Properties" style="width: 200px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/157832i7C860382F2A93A57/image-size/small?v=v2&amp;amp;px=200" role="button" title="Root_Cert_Properties.png" alt="Root Cert Properties" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Root Cert Properties&lt;/span&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Thanks Again for the help!&lt;BR /&gt;-Matt&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 18:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4655050#M1092046</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2022-07-21T18:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: Changing ISE Certificate for EAP Auth Role</title>
      <link>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4655056#M1092049</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325526"&gt;@Matthew Martin&lt;/a&gt; this is the section, if you are validating the certificate, then ensure you are trusting the new CA that is signing the certificate.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/157833iD4EF0341EACBDF2B/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 19:05:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4655056#M1092049</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-07-21T19:05:43Z</dc:date>
    </item>
    <item>
      <title>Re: Changing ISE Certificate for EAP Auth Role</title>
      <link>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4655077#M1092050</link>
      <description>&lt;P&gt;This is what my PC looks like for the Wired Adapter:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Wired_Adapter_Settings.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/157835i904E77750A3BA5AC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Wired_Adapter_Settings.png" alt="Wired_Adapter_Settings.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Since the Validate Server Certificate checkbox is not checked. Would it be safe to say that changing the Cert in ISE to the DigiCert for EAP Authentication shouldn't cause any auth issues? Do these settings also apply to the Wireless adapter?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 20:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4655077#M1092050</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2022-07-21T20:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: Changing ISE Certificate for EAP Auth Role</title>
      <link>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4655091#M1092051</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325526"&gt;@Matthew Martin&lt;/a&gt;&amp;nbsp;yes, any certificate present to the client would be trusted.&lt;/P&gt;
&lt;P&gt;Not secure though.&lt;/P&gt;
&lt;P&gt;Yes you'd apply the same to the wireless adapter.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 21:05:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-ise-certificate-for-eap-auth-role/m-p/4655091#M1092051</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-07-21T21:05:16Z</dc:date>
    </item>
  </channel>
</rss>

