cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2786
Views
2
Helpful
15
Replies

Azure ID Error No trusted certificate found

lupingyao
Level 1
Level 1

I have tried to connect Azure and ISE(Version 3.1 patch 6) using ROPC, but I got the following Error:

Connection to ID Store failed with error: javax.net.ssl.SSLHandshakeException: No trusted certificate found and status: 400 BAD_REQUEST

I have checked the Certificate, following Certificate are already installed and using for cisco services:

DigiCert Global Root CA

DigiCert Global Root G2 CA

Microsoft Azure TLS Issuing CA 01

Microsoft Azure TLS Issuing CA 02

Microsoft Azure TLS Issuing CA 05

Microsoft Azure TLS Issuing CA 06

do I forget any Cert or config? 

I am following this documentation:

Configure ISE 3.0 REST ID with Azure Active Directory - Cisco

Best Regards

Robin

 

2 Accepted Solutions

Accepted Solutions

Yes, you need a signed cert like digicert

View solution in original post

You don't need a certificate signed by a public CA, but I'm not sure if Azure will accept a self-signed certificate. I have ROPC working in my lab with ISE using an Admin certificate signed by my internal ADCS.

The error you've posted references 'NotAfter: Fri Aug 05 2022' which would seem to indicate an expired certificate is being used. I would suggest checking for any expired certificates in the System and Trusted stores.

These are the Microsoft related certificates (Trusted Certificates) I have installed in my lab that is working with ROPC.

Screenshot 2023-05-10 at 8.40.03 am.png

View solution in original post

15 Replies 15

You are missing Baltimore CyberTrust Root CA cert. Here is the list of
certs used by azure. Make sure they are imported to ISE.

https://learn.microsoft.com/en-us/azure/security/fundamentals/azure-ca-details?tabs=root-and-subordinate-cas-list

**** please remember to rate useful posts

Hi Mohammed,

thanks for you answer, the Baltimore CyberTrust Root CA was also installed in the ISE as Cisco Services...

Just make the certificate usage for admin portal as well.

you mean:

chose: Trust for certificate based admin authentication ?

lupingyao_0-1683114148012.png

 

lupingyao_0-1683115666007.png

this is the new ISE, just installed. so I am using the default self Cert...

Yes, I meant this one 'admin authentication'. also, you need to use CA signed certificate to communicate with Azure. otherwise, it won't trust your ISE. 

Here is the list of certs which I used. 

MohammedalBaqari_0-1683117790474.png

 

lupingyao_1-1683119045723.png

for me the same, that is why I dön't unterstand...

but you have selfsigned cert. You need signed one for admin portal. That is
the one used to communicate with azure.

It won't work with self signed one

you mean, that I need a public certifcate for admin Portal? from DigiCert Global Roort G2 CA?

or can I upload my self signed Cert to Azure, let Azure trust my Cert?

Yes, you need a signed cert like digicert

you mean, that I need a public cert? 

I have tried using one private cert, I got this error:

lupingyao_0-1683622701378.png

 

You don't need a certificate signed by a public CA, but I'm not sure if Azure will accept a self-signed certificate. I have ROPC working in my lab with ISE using an Admin certificate signed by my internal ADCS.

The error you've posted references 'NotAfter: Fri Aug 05 2022' which would seem to indicate an expired certificate is being used. I would suggest checking for any expired certificates in the System and Trusted stores.

These are the Microsoft related certificates (Trusted Certificates) I have installed in my lab that is working with ROPC.

Screenshot 2023-05-10 at 8.40.03 am.png