<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Client Certificate for 802.1x and Microsoft CA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/client-certificate-for-802-1x-and-microsoft-ca/m-p/5260828#M1119584</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/547823"&gt;@imanv&lt;/a&gt; yes you can configure ISE as a subordinate of the external CA. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_basic_setup.html#task_E458E69FA39941BBAA9799AAD7FDC644" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_basic_setup.html#task_E458E69FA39941BBAA9799AAD7FDC644&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Some guides on the certificate provisioning portal.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200534-ISE-2-0-Certificate-Provisioning-Portal.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200534-ISE-2-0-Certificate-Provisioning-Portal.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://labminutes.com/sec0212_ise_20_certificate_privisioning_portal_1" target="_blank"&gt;http://labminutes.com/sec0212_ise_20_certificate_privisioning_portal_1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 15 Feb 2025 10:43:57 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2025-02-15T10:43:57Z</dc:date>
    <item>
      <title>Client Certificate for 802.1x and Microsoft CA</title>
      <link>https://community.cisco.com/t5/network-security/client-certificate-for-802-1x-and-microsoft-ca/m-p/5260784#M1119578</link>
      <description>&lt;P&gt;I need your valuable hints to find a solution to my problem. The clients must request a certificate to be able to use the network with dot1x using ISE.&lt;BR /&gt;I have a Certificate Authority (CA) server on Windows 2019 (will upgrade soon to 2022). The Certificate Web Enrollment is unsuitable because it's based on ActiveX and has not been updated for many years. I have clients with macOS and Linux. I am looking for a on-premise solution to provide a feasible certification request for them.&lt;/P&gt;&lt;P&gt;Would you please tell me what your suggested solution is ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Feb 2025 04:59:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-certificate-for-802-1x-and-microsoft-ca/m-p/5260784#M1119578</guid>
      <dc:creator>imanv</dc:creator>
      <dc:date>2025-02-15T04:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: Client Certificate for 802.1x and Microsoft CA</title>
      <link>https://community.cisco.com/t5/network-security/client-certificate-for-802-1x-and-microsoft-ca/m-p/5260807#M1119580</link>
      <description>&lt;P&gt;If you have any Windows clients, they can be issued certificates automatically via AD Group Policy. macOS clients are best managed with an enterprise management tools like Jamf or Kanji. &lt;/P&gt;
&lt;P&gt;I have not used it, but you may be able to use a third party solution like SCEPman (&lt;A href="https://docs.scepman.com/" target="_blank"&gt;https://docs.scepman.com/&lt;/A&gt;) to manage all three client types.&lt;/P&gt;</description>
      <pubDate>Sat, 15 Feb 2025 07:46:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-certificate-for-802-1x-and-microsoft-ca/m-p/5260807#M1119580</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-02-15T07:46:31Z</dc:date>
    </item>
    <item>
      <title>Re: Client Certificate for 802.1x and Microsoft CA</title>
      <link>https://community.cisco.com/t5/network-security/client-certificate-for-802-1x-and-microsoft-ca/m-p/5260820#M1119582</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/547823"&gt;@imanv&lt;/a&gt; to add to what &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt; has already mentioned, if you require an on-premise solution to distribute certificates to the MacOS/Linux devices, you could use the bulit-in ISE CA, this allows the user to login to a portal to request the certificate to use for authentication. An MDM would be the better solution though.&lt;/P&gt;</description>
      <pubDate>Sat, 15 Feb 2025 09:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-certificate-for-802-1x-and-microsoft-ca/m-p/5260820#M1119582</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-15T09:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: Client Certificate for 802.1x and Microsoft CA</title>
      <link>https://community.cisco.com/t5/network-security/client-certificate-for-802-1x-and-microsoft-ca/m-p/5260826#M1119583</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;Thank you very much.&lt;/P&gt;&lt;P&gt;In fact I have separate domain for non-corporate users. The users are not joined to the domain. I use it just for VPN polices.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;Thanks for your hint. I think it is possible to configure ISE as subordinate Certificate server with Microsoft CA.&lt;/P&gt;&lt;P&gt;Would please describe a little bit more about the MDM application you may be used for on-premise deployment ?&lt;/P&gt;</description>
      <pubDate>Sat, 15 Feb 2025 10:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-certificate-for-802-1x-and-microsoft-ca/m-p/5260826#M1119583</guid>
      <dc:creator>imanv</dc:creator>
      <dc:date>2025-02-15T10:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: Client Certificate for 802.1x and Microsoft CA</title>
      <link>https://community.cisco.com/t5/network-security/client-certificate-for-802-1x-and-microsoft-ca/m-p/5260828#M1119584</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/547823"&gt;@imanv&lt;/a&gt; yes you can configure ISE as a subordinate of the external CA. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_basic_setup.html#task_E458E69FA39941BBAA9799AAD7FDC644" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_basic_setup.html#task_E458E69FA39941BBAA9799AAD7FDC644&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Some guides on the certificate provisioning portal.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200534-ISE-2-0-Certificate-Provisioning-Portal.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200534-ISE-2-0-Certificate-Provisioning-Portal.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://labminutes.com/sec0212_ise_20_certificate_privisioning_portal_1" target="_blank"&gt;http://labminutes.com/sec0212_ise_20_certificate_privisioning_portal_1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Feb 2025 10:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-certificate-for-802-1x-and-microsoft-ca/m-p/5260828#M1119584</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-15T10:43:57Z</dc:date>
    </item>
  </channel>
</rss>

