cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
388
Views
0
Helpful
6
Replies

Deploy Certs with MDM for ISE device authenication

DAVID
Level 3
Level 3

We use Ivanti neurons to manage our Apple devices.  We would like to configure these devices so that they can use 802.1  EAP auth to authenticate to the network through ISE 3.3 acting as the RADIUS server.  My question is this?  Is the certificate CSR generated by the MDM and signed by DIGI then I import this cert into the ISE Trusted Certificates and the MDM will deploy the certs to the Apple devices so that the user does not have to "Trust" the certificate when connecting.  Or, is the CSR generated by ISE to be signed by CA and imported into Trusted Certs and deployed to devices by MDM??

6 Replies 6

@DAVID 

Create CSR on ISE, signed by Certificate authority, import the signed certificate in ISE.

   MDM is responsible for device management which include install the certificate you received from certificate authority  on the devices.

https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975-configure-eap-tls-authentication-with-is.html

 

Since MDM created the CSR and CA signed it, can cert be imported into ISE even though ISE did not create the original CSR?

Yes, but is ISE already trusting the CA that signed the MDM or client cert?  If so, you shouldn't need to import it.  Are you talking about setting up the communication between ISE and the MDM for compliance checks?  Or strictly client auth using EAP-TLS?

I have not imported the cert yet but MDM created the CSR which I have signed but DIGI.  My intent is to import the cert into ISE and configure for EAP client authentication.  The MDM would deploy the cert to the apple devices and configure the new WLAN on the device to eliminate any user intervention.  Just wanting to confirm that I am not missing anything or going to the wrong path  HTH

Nope, this sounds perfect to me

Dustin Anderson
VIP Alumni
VIP Alumni

The only thing will be the cert on ISE for EAP. If it is using the same public cert, you should be fine. If it is self signed, you would need to import it into the device's trust store otherwise the user will get prompted to trust the cert.