01-16-2020 07:05 PM
Hi,
We are testing ISE and so far we've successfully tried authentication using username and password but now we want to test certificate based authentication. Will self signed certificates be ok for dot1x authentication between a windows client and ISE.
The version of ISE i'm using is 2.4, any suggestion or documentation in this regard will help a lot.
Thanks,
Solved! Go to Solution.
01-17-2020 07:32 AM
Self-signed certificates would work just fine as long as each side trusts each other. If you are using self-signed certificates on ISE for EAP Authentication, then you would need to ensure that the ISE certificate is loaded on the client side in the certificate trust list. Just import the ISE certificate into the Root or Intermediate CA certificates list.
If the client's certificate will be self-signed, then you would need to install that certificate into the ISE certificate trust list and make sure to check the option "Trust for client authentication".
But this is only for testing! I do not recommend self-signed certificates for production.
01-16-2020 07:42 PM
01-17-2020 07:32 AM
Self-signed certificates would work just fine as long as each side trusts each other. If you are using self-signed certificates on ISE for EAP Authentication, then you would need to ensure that the ISE certificate is loaded on the client side in the certificate trust list. Just import the ISE certificate into the Root or Intermediate CA certificates list.
If the client's certificate will be self-signed, then you would need to install that certificate into the ISE certificate trust list and make sure to check the option "Trust for client authentication".
But this is only for testing! I do not recommend self-signed certificates for production.
01-19-2020 05:49 PM
05-04-2020 09:18 AM
Why are self-signed certificates for production not recommended?
05-04-2020 01:09 PM
A certificate is like an ID card. It proves that you are who you say you are. Some places check IDs and some places don't. Some have strict requirements for ID's like in the US now where TSA at the airport won't accept a driver's license unless it has a gold star on it (Federal REAL ID Act). Some places like bar may just want you to flash it in front of them but don't really verify the authenticity of the ID. That is the same with server certificates.
The burden is on the client side to verify that the server is trusted and that it has a certificate (ID card) that was issued by a trusted third party such as Verisign. If the client side detects a problem with the certificate, it presents a warning to the user but the user can choose to continue. So for lab testing or internal-only systems, a self-signed certificate will work. It would work in production as well but the user would be prompted each time saying the server is potentially unsafe. So that is an impact to your organization's reputation or brand.
The other concern is that if you use self-signed certificates, you are conditioning your users to just click accept/continue when presented with a warning. So when they actually do hit a rogue server, they will likely just click accept/continue and be compromised. I personally don't want to condition any users to do that. Users are already vulnerable enough.
05-05-2020 07:00 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide