<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You seem to have the wildcard in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082950#M433437</link>
    <description>&lt;P&gt;You seem to have the wildcard certificate in the trusted store. Chain name "&lt;STRONG&gt;Company NEW Chain&lt;/STRONG&gt;"&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;STRONG&gt;Company NEW Chain&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Enabled&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Infrastructure&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;E5 6E 68 0A A4 1E 93 74&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;*.paytel.com&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Go Daddy Secure Certificate Authority - G2&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Tue, 29 Nov 2016&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Mon, 2 Dec 2019&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;June_6_2016_ISE-CERT&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Enabled&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Infrastructure&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;60 E1 CD 12 8B 0A CA 71&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;*.paytel.com&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Go Daddy Secure Certificate Authority - G2&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Wed, 18 May 2016&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Fri, 18 May 2018&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;These certs should not be in the trusted certificate&amp;nbsp;section, but only in the system cert section. Delete any non-CA certificates from the trusted certificate section. You can recognize these certs by the "Issued to" name.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 21 Jun 2017 21:59:19 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-06-21T21:59:19Z</dc:date>
    <item>
      <title>Where can I go to ask about Certificates and ISE?</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082946#M433410</link>
      <description>&lt;P&gt;My 3rd party cert expired on my ISE and I got another. I am just having a terrible time figuring out how to get it in and if I even have the correct type of cert&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082946#M433410</guid>
      <dc:creator>scottcummins</dc:creator>
      <dc:date>2020-02-21T14:11:14Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082947#M433419</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;What ise version are you using? You could start by looking at the following docs:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/installation_guide/ise_ig/ise_app_e_man_cert.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-0/admin_guide/b_ise_admin_guide_20/b_ise_admin_guide_20_chapter_0111.html&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 17:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082947#M433419</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2017-06-20T17:22:13Z</dc:date>
    </item>
    <item>
      <title>If you have generated the</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082948#M433430</link>
      <description>&lt;P&gt;If you have generated the certificate signing request (CSR) from the ISE and obtained the new certificate from a public CA (like GoDaddy), then all you need to do is go back to the CSR section on ISE and bind the new certificate with the cert generated. You can then change you Admin, EAP, portal certificate to the new one. You only need to do this on the Primary Admin.&lt;/P&gt;
&lt;P&gt;If you have received the cert from elsewhere, it is a little more complicated. You need to have the certificate (.pem, .cer or .crt format) and also the private key. Sometimes, these 2 are combined into a single file format called pkcs12 (.p12 or .pfx). If you have it in this format, you need to use openssl to separate the certificate and key from the pkcs12 file. &amp;nbsp;You can use the pkcs12 commands as below:&lt;/P&gt;
&lt;P&gt;To get cert&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;openssl pkcs12 -in combined&lt;SPAN&gt;.pfx&lt;/SPAN&gt; -out cert&lt;SPAN&gt;.pem&lt;/SPAN&gt; -nodes -nokeys&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To get key&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;openssl pkcs12 -in combined&lt;SPAN&gt;.pfx&lt;/SPAN&gt; -out key&lt;SPAN&gt;.pem&lt;/SPAN&gt; -nodes -nocerts&lt;/PRE&gt;
&lt;P&gt;Reference:&lt;/P&gt;
&lt;P&gt;https://www.sslshopper.com/article-most-common-openssl-commands.html&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 17:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082948#M433430</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-06-20T17:32:54Z</dc:date>
    </item>
    <item>
      <title>gentlemen</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082949#M433433</link>
      <description>&lt;P&gt;gentlemen&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14pt;"&gt;I renewed the Cert with Go daddy, so I went to bind it with the CSR I get&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV wairole="presentation" dojoattachpoint="containerNode" class="dijitDialogPaneContent" role="presentation" style="width: auto; height: auto;"&gt;
&lt;DIV class="xwtAlert-critical"&gt;
&lt;DIV id="dijit_layout_ContentPane_8" widgetid="dijit_layout_ContentPane_8" title="" role="group" class="dijitContentPane"&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;There is one or more trusted certificate(s) with the same subject name and issuer but having a different serial number. Binding was aborted. For successful binding, you need to remove the other certificate(s) first.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="font-size: 14pt;"&gt;When I try to delete out the old cert, I get&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Could not delete the certificate because it is used by Admin, EAP, Portal.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;For EAP, Admin and pxGrid certificate(s), assign those role(s) to different certificate(s) and try again.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;For Portal certificate(s), change the portal configuration or assign the tag to a different certificate, and try again.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="font-size: 14pt;"&gt;These are the certs listed under TRUSTED&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="font-size: 14pt;"&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;STRONG&gt;VeriSign Class 3 Secure Server CA - G3&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Cisco Services&lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;6E CC 7A A5 A7 03 20 09 B8 CE BC F4 E9 52 D4 91&lt;BR /&gt; &lt;BR /&gt;VeriSign Class 3 Secure Server CA - G3&lt;BR /&gt; &lt;BR /&gt;VeriSign Class 3 Public Primary Certification Authority - G5&lt;BR /&gt; &lt;BR /&gt;Sun, 7 Feb 2010&lt;BR /&gt; &lt;BR /&gt;Fri, 7 Feb 2020&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;VeriSign Class 3 Public Primary Certification Authority - G5#&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;STRONG&gt;VeriSign Class 3 Public Primary Certification Authority - G5#00001&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Cisco Services&lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A&lt;BR /&gt; &lt;BR /&gt;VeriSign Class 3 Public Primary Certification Authority - G5&lt;BR /&gt; &lt;BR /&gt;VeriSign Class 3 Public Primary Certification Authority - G5&lt;BR /&gt; &lt;BR /&gt;Tue, 7 Nov 2006&lt;BR /&gt; &lt;BR /&gt;Wed, 16 Jul 2036&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;Thawte Primary Root CA&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Cisco Services&lt;BR /&gt; &lt;BR /&gt;34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D&lt;BR /&gt; &lt;BR /&gt;thawte Primary Root CA&lt;BR /&gt; &lt;BR /&gt;thawte Primary Root CA&lt;BR /&gt; &lt;BR /&gt;Thu, 16 Nov 2006&lt;BR /&gt; &lt;BR /&gt;Wed, 16 Jul 2036&lt;BR /&gt; &lt;BR /&gt; &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;STRONG&gt;Company NEW Chain&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;E5 6E 68 0A A4 1E 93 74&lt;BR /&gt; &lt;BR /&gt;*.paytel.com&lt;BR /&gt; &lt;BR /&gt;Go Daddy Secure Certificate Authority - G2&lt;BR /&gt; &lt;BR /&gt;Tue, 29 Nov 2016&lt;BR /&gt; &lt;BR /&gt;Mon, 2 Dec 2019&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;June_6_2016_ISE-CERT&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;60 E1 CD 12 8B 0A CA 71&lt;BR /&gt; &lt;BR /&gt;*.paytel.com&lt;BR /&gt; &lt;BR /&gt;Go Daddy Secure Certificate Authority - G2&lt;BR /&gt; &lt;BR /&gt;Wed, 18 May 2016&lt;BR /&gt; &lt;BR /&gt;Fri, 18 May 2018&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;Cisco Root CA M2&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Endpoints&lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;01&lt;BR /&gt; &lt;BR /&gt;Cisco Root CA M2&lt;BR /&gt; &lt;BR /&gt;Cisco Root CA M2&lt;BR /&gt; &lt;BR /&gt;Mon, 12 Nov 2012&lt;BR /&gt; &lt;BR /&gt;Thu, 12 Nov 2037&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;Cisco Root CA 2048&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Disabled&lt;BR /&gt; &lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;5F F8 7B 28 2B 54 DC 8D 42 A3 15 B5 68 C9 AD FF&lt;BR /&gt; &lt;BR /&gt;Cisco Root CA 2048&lt;BR /&gt; &lt;BR /&gt;Cisco Root CA 2048&lt;BR /&gt; &lt;BR /&gt;Fri, 14 May 2004&lt;BR /&gt; &lt;BR /&gt;Mon, 14 May 2029&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;Cisco Manufacturing CA SHA2&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Endpoints&lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;02&lt;BR /&gt; &lt;BR /&gt;Cisco Manufacturing CA SHA2&lt;BR /&gt; &lt;BR /&gt;Cisco Root CA M2&lt;BR /&gt; &lt;BR /&gt;Mon, 12 Nov 2012&lt;BR /&gt; &lt;BR /&gt;Thu, 12 Nov 2037&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;Cisco CA Manufacturing&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Disabled&lt;BR /&gt; &lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;6A 69 67 B3 00 00 00 00 00 03&lt;BR /&gt; &lt;BR /&gt;Cisco Manufacturing CA&lt;BR /&gt; &lt;BR /&gt;Cisco Root CA 2048&lt;BR /&gt; &lt;BR /&gt;Fri, 10 Jun 2005&lt;BR /&gt; &lt;BR /&gt;Mon, 14 May 2029&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;Certificate Services Root CA - ise01#00005&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Infrastructure&lt;BR /&gt;Endpoints&lt;BR /&gt; &lt;BR /&gt;20 ED 48 C4 8D 43 40 8A 99 05 C2 4D 85 59 24 DE&lt;BR /&gt; &lt;BR /&gt;Certificate Services Root CA - ise01&lt;BR /&gt; &lt;BR /&gt;Certificate Services Root CA - ise01&lt;BR /&gt; &lt;BR /&gt;Thu, 21 May 2015&lt;BR /&gt; &lt;BR /&gt;Thu, 22 May 2025&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;Certificate Services OCSP Responder - ise01#00006&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;70 43 D6 C9 35 7C 45 3E AA 4F 74 D8 48 11 D0 14&lt;BR /&gt; &lt;BR /&gt;Certificate Services OCSP Responder - ise01&lt;BR /&gt; &lt;BR /&gt;Certificate Services Root CA - ise01&lt;BR /&gt; &lt;BR /&gt;Thu, 21 May 2015&lt;BR /&gt; &lt;BR /&gt;Fri, 22 May 2020&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;Certificate Services Endpoint Sub CA - ise01#00004&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Infrastructure&lt;BR /&gt;Endpoints&lt;BR /&gt; &lt;BR /&gt;7B 07 01 A4 1A 70 45 EC B9 83 FB 13 AE 56 E9 D7&lt;BR /&gt; &lt;BR /&gt;Certificate Services Endpoint Sub CA - ise01&lt;BR /&gt; &lt;BR /&gt;Certificate Services Root CA - ise01&lt;BR /&gt; &lt;BR /&gt;Thu, 21 May 2015&lt;BR /&gt; &lt;BR /&gt;Fri, 22 May 2020&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;Baltimore CyberTrust Root#Baltimore CyberTrust Root#00003&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Cisco Services&lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;02 00 00 B9&lt;BR /&gt; &lt;BR /&gt;Baltimore CyberTrust Root&lt;BR /&gt; &lt;BR /&gt;Baltimore CyberTrust Root&lt;BR /&gt; &lt;BR /&gt;Fri, 12 May 2000&lt;BR /&gt; &lt;BR /&gt;Mon, 12 May 2025&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;3#NEW Company Trusted Chain&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;00&lt;BR /&gt; &lt;BR /&gt;Go Daddy Class 2 Certification Authority&lt;BR /&gt; &lt;BR /&gt;Go Daddy Class 2 Certification Authority&lt;BR /&gt; &lt;BR /&gt;Tue, 29 Jun 2004&lt;BR /&gt; &lt;BR /&gt;Thu, 29 Jun 2034&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;1#GoDaddy Cert Chain&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; Enabled&lt;BR /&gt; &lt;BR /&gt;Infrastructure&lt;BR /&gt; &lt;BR /&gt;03 01&lt;BR /&gt; &lt;BR /&gt;Go Daddy Secure Certification Authority&lt;BR /&gt; &lt;BR /&gt;Go Daddy Class 2 Certification Authority&lt;BR /&gt; &lt;BR /&gt;Wed, 15 Nov 2006&lt;BR /&gt; &lt;BR /&gt;Sun, 15 Nov 2026&lt;BR /&gt; &lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV wairole="presentation" class="buttonPane" dojoattachpoint="buttonPane" role="presentation"&gt;
&lt;DIV class="dijit dijitToolbar xwtTextButtonGroup" wairole="toolbar" dojoattachpoint="containerNode" role="toolbar" id="xwt_widget_form_TextButtonGroup_10" widgetid="xwt_widget_form_TextButtonGroup_10" tabindex="0"&gt;&lt;SPAN class="dijit dijitReset dijitLeft dijitInline xwtButtonBorder defaultButton" dojoattachevent="ondijitclick:_onButtonClick,onmouseenter:_onMouse,onmouseleave:_onMouse,onmousedown:_onMouse " dojoattachpoint="styleEventNode" widgetid="xwt_widget_form_TextButton_23" style="font-size: 8pt;"&gt;&lt;SPAN class="dijitReset xwt-TextRight dijitInline"&gt;&lt;SPAN class="dijitReset dijitInline xwt-TextButtonNode"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 21 Jun 2017 20:19:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082949#M433433</guid>
      <dc:creator>scottcummins</dc:creator>
      <dc:date>2017-06-21T20:19:55Z</dc:date>
    </item>
    <item>
      <title>You seem to have the wildcard</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082950#M433437</link>
      <description>&lt;P&gt;You seem to have the wildcard certificate in the trusted store. Chain name "&lt;STRONG&gt;Company NEW Chain&lt;/STRONG&gt;"&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;STRONG&gt;Company NEW Chain&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Enabled&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Infrastructure&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;E5 6E 68 0A A4 1E 93 74&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;*.paytel.com&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Go Daddy Secure Certificate Authority - G2&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Tue, 29 Nov 2016&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Mon, 2 Dec 2019&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;June_6_2016_ISE-CERT&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Enabled&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Infrastructure&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;60 E1 CD 12 8B 0A CA 71&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;*.paytel.com&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Go Daddy Secure Certificate Authority - G2&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Wed, 18 May 2016&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Fri, 18 May 2018&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;These certs should not be in the trusted certificate&amp;nbsp;section, but only in the system cert section. Delete any non-CA certificates from the trusted certificate section. You can recognize these certs by the "Issued to" name.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 21:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082950#M433437</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-06-21T21:59:19Z</dc:date>
    </item>
    <item>
      <title>Rahul</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082951#M433441</link>
      <description>&lt;P&gt;Rahul&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I removed those certs from the Trusted and I am trying to load it but apparently I did not get a Private Key, So I need one&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 17:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082951#M433441</guid>
      <dc:creator>scottcummins</dc:creator>
      <dc:date>2017-06-22T17:29:18Z</dc:date>
    </item>
    <item>
      <title>Hi @scottcummins,</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082952#M433447</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://supportforums.cisco.com/users/scottcummins"&gt;scottcummins&lt;/A&gt;,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you generated the CSR from ISE, you do not need the Private Key. The ISE should already have the key. CSR generation involves the generation of the RSA keypair (private+public). The public key and other attributes is what constitutes&amp;nbsp;the CSR that you send to the&amp;nbsp;CA. Once signed by the CA, you have to bind that signed certificate in the CSR section on ISE.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Did you try binding the certificate after deleting the certificate from the trusted store?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 17:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082952#M433447</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-06-22T17:51:40Z</dc:date>
    </item>
    <item>
      <title>Rahul</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082953#M433449</link>
      <description>&lt;P&gt;Rahul&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I tired to Bind it and the first warning I got was:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;Only one system certificate can be used for EAP. Assigning EAP to this certificate will remove the assignment from another certificate.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;Note: Make sure required Certificate Chain is imported under Trusted Certificates&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;I answered&amp;nbsp; "Yes" and got&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;The certificate you are importing or generating matches an existing certificate. (Both certificates have the same subject.) If you proceed, the existing certificate will be replaced, and the new certificate will be given the same roles and Portal tag, if applicable, as the existing certificate.&lt;BR /&gt;&lt;BR /&gt;Do you wish to replace the existing certificate?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;I answered&amp;nbsp; "Yes" and got&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;Certificate/Private Key validation failed.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;I appreciate all your help, But I have no idea how to get the Cert loaded&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 19:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082953#M433449</guid>
      <dc:creator>scottcummins</dc:creator>
      <dc:date>2017-06-22T19:45:24Z</dc:date>
    </item>
    <item>
      <title>Looks like you have gotten</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082954#M433452</link>
      <description>&lt;P&gt;Looks like you have gotten further in the process. The key error here is "&lt;STRONG&gt;Certificate/Private Key validation failed."&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This means that the CSR that you used does not link to the certificate that you tried to associate. You can&amp;nbsp;create a new CSR on ISE and rekey the certificate that you had received from Godaddy (no cost associated). Godaddy will issue new certificates for you. If I recall correctly, you should receive 2 files:&lt;/P&gt;
&lt;P&gt;1) gd-bundle-**** [This is the Godaddy Ca cert chain]&lt;/P&gt;
&lt;P&gt;2) ISE cert, random name [ This is the certificate that you need to bind with CSR]&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The process for renewing a certificate on Godady with a new CSR is documented in the link below. The link is written for an ASA, but once certificate renewal process on Godaddy is the same:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html#anc20&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 19:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082954#M433452</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-06-22T19:53:23Z</dc:date>
    </item>
    <item>
      <title>Thanks Rahul</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082955#M433453</link>
      <description>&lt;P&gt;Thanks Rahul&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I really appreciate your help. I will do that first thing tomorrow morning&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 22:28:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082955#M433453</guid>
      <dc:creator>scottcummins</dc:creator>
      <dc:date>2017-06-22T22:28:50Z</dc:date>
    </item>
    <item>
      <title>Good day rahul</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082956#M433454</link>
      <description>&lt;P&gt;Good day rahul&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I tried to bind the CSR to the new re-keyed Certificate and select "admin" under "usage" and received this error.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; color: #ff0000; font-size: 8pt;"&gt;&lt;STRONG&gt; Enabling Admin role for this certificate will cause an application server restart on the selected node.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: underline; color: #ff0000; font-size: 8pt;"&gt;&lt;STRONG&gt;Note: Make sure required Certificate Chain is imported under Trusted Certificates&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; color: #ff0000; font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 12pt;"&gt;I selected "OK" to continue and selected "EAP Authentication" and "Portal" and then receive this error.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #ff0000; text-decoration: underline;"&gt;Only one system certificate can be used for EAP. Assigning EAP to this certificate will remove the assignment from another certificate.&lt;BR /&gt;&lt;BR /&gt;Note: Make sure required Certificate Chain is imported under Trusted Certificates&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #ff0000; text-decoration: underline;"&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; color: #000000;"&gt;I again hit "OK" to bypass the error and select "Portal" and when I hit "Submit" &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;SPAN&gt;Certificate contains wildcard values in CN or SubjectAltName extension. Please confirm this is intended by clicking Yes.&lt;BR /&gt;&lt;BR /&gt;Note: Enabling Admin role for this certificate will cause an application server restart on all deployment nodes. This will result in significant downtime for the system.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; color: #000000;"&gt;then I get the following:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV wairole="presentation" dojoattachpoint="containerNode" class="dijitDialogPaneContent" role="presentation" style="width: auto; height: auto;"&gt;
&lt;DIV class="xwtAlert-critical"&gt;
&lt;DIV id="dijit_layout_ContentPane_5" widgetid="dijit_layout_ContentPane_5" title="" role="group" class="dijitContentPane"&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="text-decoration: underline; color: #ff0000; font-size: 8pt;"&gt;&lt;STRONG&gt;You are attempting to import or generate a certificate whose subject matches the subject of an existing certificate on the same node. This is only permitted when you are replacing a certificate of the same role. Note that the subject is the concatenation of several fields (for example, CN, O, OU, etc.) You can create a unique subject by varying the values in these fields.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="text-decoration: underline; color: #ff0000; font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="padding-top: 9px; font-family: tahoma; font-size: 12px;"&gt;&lt;SPAN style="text-decoration: underline; color: #000000; font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV wairole="presentation" class="buttonPane" dojoattachpoint="buttonPane" role="presentation"&gt;
&lt;DIV class="dijit dijitToolbar xwtTextButtonGroup" wairole="toolbar" dojoattachpoint="containerNode" role="toolbar" id="xwt_widget_form_TextButtonGroup_9" widgetid="xwt_widget_form_TextButtonGroup_9" tabindex="0"&gt;&lt;SPAN class="dijit dijitReset dijitLeft dijitInline xwtButtonBorder defaultButton" dojoattachevent="ondijitclick:_onButtonClick,onmouseenter:_onMouse,onmouseleave:_onMouse,onmousedown:_onMouse " dojoattachpoint="styleEventNode" widgetid="xwt_widget_form_TextButton_22"&gt;&lt;SPAN class="dijitReset xwt-TextRight dijitInline"&gt;&lt;SPAN class="dijitReset dijitInline xwt-TextButtonNode"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #ff0000; text-decoration: underline;"&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 8pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #ff0000; text-decoration: underline;"&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2017 14:21:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3082956#M433454</guid>
      <dc:creator>scottcummins</dc:creator>
      <dc:date>2017-06-26T14:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: Good day rahul</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3185789#M433456</link>
      <description>&lt;P&gt;Pls import the certificate without usage and once it is installed then enable usage field.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 01:39:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/3185789#M433456</guid>
      <dc:creator>ranjeet.khileri</dc:creator>
      <dc:date>2017-09-19T01:39:19Z</dc:date>
    </item>
    <item>
      <title>Re: If you have generated the</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/4289813#M1078384</link>
      <description>&lt;P&gt;Hi Rahul,&lt;/P&gt;&lt;P&gt;Need clarification on your statement about obtaining the certificate from elsewhere.&amp;nbsp; Does that apply to certificates obtained from a Microsoft Enterprise CA as well.&amp;nbsp; I am trying to replace expiring certificates, used only for EAP Authentication.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have got root and intermediate CA certs for the Microsoft Enterprise CA already in the Trusted Certificates on ISE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I generated individual CSR's for multiple ISE nodes (2x policy and 2 x admin).&amp;nbsp; The system admin generated the Certs (PKCS #7 Certificates (.p7b)).&amp;nbsp; Binding the cert works fine on first policy and admin nodes.&amp;nbsp; However, when I try to bind the other policy and/or admin nodes, I see the same message that the original post mentioned, i.e.:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The certificate you are importing or generating matches an existing certificate. (Both certificates have the same subject.) If you proceed, the existing certificate will be replaced, and the new certificate will be given the same roles and Portal tag, if applicable, as the existing certificate.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I am not sure what the impact of this would be so I am hesitant to go through with this on the 2nd set of nodes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;mag&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 04:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/4289813#M1078384</guid>
      <dc:creator>magurwara</dc:creator>
      <dc:date>2021-02-11T04:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: If you have generated the</title>
      <link>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/4290675#M1078423</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Just wanted to update for information.&lt;/P&gt;&lt;P&gt;My issue is resolved.&amp;nbsp; In the end I proceeded with clicking YES on the alert message and it replaced the expiring certificate, as intended.&amp;nbsp; The message is correct, as the new certificate was intended to replace the expiring one and had the same subject.&lt;/P&gt;&lt;P&gt;However, I am still not sure why the same message did not pop up when performing the same operation on the first two nodes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2021 10:24:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/where-can-i-go-to-ask-about-certificates-and-ise/m-p/4290675#M1078423</guid>
      <dc:creator>magurwara</dc:creator>
      <dc:date>2021-02-12T10:24:06Z</dc:date>
    </item>
  </channel>
</rss>

