03-10-2021 04:00 AM - edited 03-10-2021 04:20 AM
I have the Internal certificates settings disabled, if I enabled them, do I need to regenerate new self-signed certs for the CA certificates?
I can't find anything in the documentation.
Solved! Go to Solution.
03-10-2021 05:17 AM
Hello,
do you mean when you enable Certification Authority in your ISE environment?
If yes, then all your self-signed certificates remain usable and valid.
But at the moment you will start using the ISE Certification Authority it's recommended to generated new certificates and use them in your environment (Admin, Portals, EAP, BYOD, etc.).
My recommendation is for Admin and portal use internal AD CA, if possible. Than all your secured services will be accessible and valid from AD infrastructure even without importing an ISE root CA certificate.
03-10-2021 04:02 AM
If the Cert is Valid it should work as expected, so check the Validity - before enabling.
03-10-2021 04:57 AM
Thank you for your reply, I meant Internal certificates settings not the Internal certificates themselves
03-10-2021 05:17 AM
Hello,
do you mean when you enable Certification Authority in your ISE environment?
If yes, then all your self-signed certificates remain usable and valid.
But at the moment you will start using the ISE Certification Authority it's recommended to generated new certificates and use them in your environment (Admin, Portals, EAP, BYOD, etc.).
My recommendation is for Admin and portal use internal AD CA, if possible. Than all your secured services will be accessible and valid from AD infrastructure even without importing an ISE root CA certificate.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide