<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ISE Root CA in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/cisco-ise-root-ca/m-p/2445971#M17959</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have a query on onboarding iOS, Android and windows devices through Cisco ISE.&lt;/P&gt;&lt;P&gt;I understood that we are going to provision and onboard above devices issuing certificates.&lt;/P&gt;&lt;P&gt;Do ISE has Certificate authority where it can generate its own Root CA and Intermediate CA signed by root CA and device certificates signed by intermediate CA i mean profile signing CA???&lt;/P&gt;&lt;P&gt;Or else we need to create CSR and send it to CA to get it signed . then we have to import root, intermediate CA's to ISE. CA's like godaddy ,verisign...when we send CSR .. do they send &amp;nbsp;root certificate, intermediate certificate and signed certificate??&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Srikanth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 07:33:04 GMT</pubDate>
    <dc:creator>srikanth.soogoor</dc:creator>
    <dc:date>2021-07-05T07:33:04Z</dc:date>
    <item>
      <title>Cisco ISE Root CA</title>
      <link>https://community.cisco.com/t5/wireless/cisco-ise-root-ca/m-p/2445971#M17959</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have a query on onboarding iOS, Android and windows devices through Cisco ISE.&lt;/P&gt;&lt;P&gt;I understood that we are going to provision and onboard above devices issuing certificates.&lt;/P&gt;&lt;P&gt;Do ISE has Certificate authority where it can generate its own Root CA and Intermediate CA signed by root CA and device certificates signed by intermediate CA i mean profile signing CA???&lt;/P&gt;&lt;P&gt;Or else we need to create CSR and send it to CA to get it signed . then we have to import root, intermediate CA's to ISE. CA's like godaddy ,verisign...when we send CSR .. do they send &amp;nbsp;root certificate, intermediate certificate and signed certificate??&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Srikanth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 07:33:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-ise-root-ca/m-p/2445971#M17959</guid>
      <dc:creator>srikanth.soogoor</dc:creator>
      <dc:date>2021-07-05T07:33:04Z</dc:date>
    </item>
    <item>
      <title>HI,After installation, ISE</title>
      <link>https://community.cisco.com/t5/wireless/cisco-ise-root-ca/m-p/2445972#M17960</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;After installation, ISE generates, by default, a self-signed local certificate and private key, and stores them on the server. &amp;nbsp;ISE authenticates itself to clients using the default self-signed certificate that is created at the time of installation. This self-signed certificate is used for both HTTPS and EAP protocols to authenticate clients. This self-signed certificate is valid for one year and its key length is set to 1024 bits. At the time of generation, this certificate is used for both EAP and HTTPS protocols.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco strongly recommends installing a CA-signed certificate.(Dont use self generated certificare from ISE).&lt;/P&gt;&lt;P&gt;Process for certificate deployment:see the link:&lt;/P&gt;&lt;P&gt;https://www.youtube.com/watch?v=d-ro6P2Azl8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2014 16:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-ise-root-ca/m-p/2445972#M17960</guid>
      <dc:creator>Sandeep Choudhary</dc:creator>
      <dc:date>2014-03-26T16:59:32Z</dc:date>
    </item>
    <item>
      <title>Yes, Sandeep is correct. You</title>
      <link>https://community.cisco.com/t5/wireless/cisco-ise-root-ca/m-p/2445973#M17961</link>
      <description>&lt;P&gt;Yes, Sandeep is correct. You may also check the below link,&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/installation_guide/ise_ig/ise_app_e_man_cert.html&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 23:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-ise-root-ca/m-p/2445973#M17961</guid>
      <dc:creator>Anas Naqvi</dc:creator>
      <dc:date>2014-03-31T23:10:07Z</dc:date>
    </item>
    <item>
      <title>Hi Sandeep,Yes i understood</title>
      <link>https://community.cisco.com/t5/wireless/cisco-ise-root-ca/m-p/2445974#M17962</link>
      <description>&lt;P&gt;Hi Sandeep,&lt;/P&gt;&lt;P&gt;Yes i understood that. yes i do agree that Self-signed certificate is used l3 authentication and EAp-methods&lt;/P&gt;&lt;P&gt;During provisiong of BYOD's , i understood that client certificate is pushed to perform EAP-TLS(iOS) and credentials for Android (PEAP-MsCHAPV2). As there is no CA capability for ISE how it will issue certificates to client devices???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2014 07:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-ise-root-ca/m-p/2445974#M17962</guid>
      <dc:creator>srikanth.soogoor</dc:creator>
      <dc:date>2014-04-01T07:35:06Z</dc:date>
    </item>
  </channel>
</rss>

