01-12-2022 01:57 AM
On ISE I have deleted SAML and PxGrid certs because I don't need them, I'm left with an externally signed certificate for portal / admin and EAP, on it's chain I don't see any certificate from "deployment > System > Certificate > Certificate authority > Certificate authority certificates", can I delete them?
I see root CA, OCSP responder CA, endpoint sub CA, I don't understand the reason for them, if they are not needed, can I disable internal CA?
Solved! Go to Solution.
01-12-2022 01:40 PM - edited 08-04-2022 01:13 PM
The internal CA is used for the BYOD function in ISE in the use-case where ISE is the CA issuing the client certificates. Internal CA is also used to issue certificates for purposes like ISE/DNAC integration. It's advisable to leave the Internal CA enabled even if you don't actively use it for BYOD etc.
01-22-2022 09:42 AM
You may delete any and all public CAs that you want - at your own risk.
You may always [re-]import a public CA Cert manually from their website.
You may want to Disable them first and make sure things continue to work for a few days/weeks before deleting permanently.
01-12-2022 02:46 AM
Personal i leave them as it is, as i take this is Public CA.
if the Private CA you can delete - but no harm keeping it..make sure there is no assiciation with that before you delete or clean up.
01-12-2022 01:40 PM - edited 08-04-2022 01:13 PM
The internal CA is used for the BYOD function in ISE in the use-case where ISE is the CA issuing the client certificates. Internal CA is also used to issue certificates for purposes like ISE/DNAC integration. It's advisable to leave the Internal CA enabled even if you don't actively use it for BYOD etc.
01-22-2022 09:42 AM
You may delete any and all public CAs that you want - at your own risk.
You may always [re-]import a public CA Cert manually from their website.
You may want to Disable them first and make sure things continue to work for a few days/weeks before deleting permanently.
08-04-2022 12:07 AM
Starting from ISE 2.6, ISE Messaging is used for inter-node communications. The certificates are apparently used even even if is disabled. You need proper ISE messaging certificate and its CA chain is always verified up to the the internal CA root. So you need the internal CA certificates and even the internal CA service because the messaging certificate must be renewed after 5 years.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide