02-03-2019 03:57 PM
ISE 2.3 patch 5
I am doing BYOD and currently the certificate that gets presents to BYOD users is the one issued by our internal PKI. So this presents an issue as the browser does not trust the CA by default (and will potentially cause issues with apple devices too). I want to change the presented certificate for byod from our internal PKI one to our public godaddy wildcard cert (currently used for portals), that will be automatically trusted by browsers / machines.
Does this mean that under System Certificates page, I need to move the "EAP Authentication" option usage to the godaddy cert? "EAP Authentication" option is currently selected under our internal PKI, but will this break internal corporate device EAP-TLS authentication if the option is now moved to the public cert?
How do I select the certificate to present just for BYOD?
Solved! Go to Solution.
02-03-2019 04:11 PM
02-03-2019 04:17 PM
02-03-2019 04:11 PM
02-03-2019 04:17 PM
02-03-2019 05:47 PM
Yes, this is the certificate presented at the start of the process, in my case the guest portal where the Network Setup Assistant is downloaded.
Will moving EAP Authentication option to the public CA break anything else that use the internal CA (such as corporate devices that use internal CA certificate for machine authentication)?
02-03-2019 05:55 PM
02-04-2019 05:08 AM
Okay so I added the eap authentication option to my public cert, but windows still doesn't seem to like it, even though the root is already included in it's trust store.
Our public cert was originally purposed for portals and it does have a wildcard in the CN (*.ise.company.com), I guess this is the reason for the above?? And I can't use a new public cert with CN ise.company.com if I have the same CN for internal wildcard cert right? So does this mean I need another public wildcard purely for eap authentication with say:
CN - byod.ise.company.com
SAN - *.ise.company.com, byod.ise.company.com
or could I just update the current public cert to CN public.ise.company.com (with SAN: *.ise.company.com, public.ise.company.com) then use it for portals and eap authentication?
02-12-2019 08:48 AM
The security warning pop-up window is normal if that is you meant by "... windows still doesn't seem to like it". As far as I know, EAP clients are not insisting the hostname to match exactly in the EAP server certificate.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide