Hi Ivan
How many PSN's do you have that are running the Session Services (i.e. Radius&WebAuth) ?
Can you double check the public cert you received? You can run it through openssl
openssl x509 -in yourcertfile.pem -text
And then look at the Subject and SAN fields. If you have more than one PSN, you can do one of two things
1) if you don't have a load balancer and you can expect two or more PSN's will reply to the web auth request, then put the server's FQDN hostname into the SAN field as a DNS entry. e.g.
DNS: psn1.mydomain.com
DNS: psn2.mydomain.com
And then the Subject CN is actually ignored and irrelevant. Browsers will always look at the SAN if present, and then ignore the Subject CN.
2) If you have a load balancer, then you can configure ISE to hard code the FQDN that is returned during the Authorization Profile web redirection. There is a checkbox called "Static IP/Hostname/FQDN" You will enter portalguest.mydomain.com
And now, every PSN will return the same FQDN in the redirection string. And now also, your cert only needs to contain the portalguest.mydomain.com in the Subject/SAN field. It is also cheaper, because CA's charge extra to append the SAN entries (in most cases).
But the load balancer approach is more complex. For a complete deep dive on this see Craig Hyps CiscoLive session called BRKSEC-3699 - it's an amazing treasure trove of facts. Get the large PDF versin (500 pages or more)