cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
12730
Views
20
Helpful
10
Replies

iOS Wireless Users Being Prompted to Trust Public Certificate

Tim Glen
Cisco Employee
Cisco Employee

Hi,

 

I'm using ISE 2.3 P5 and a Cisco WLC 5508 8.5.140.0.

 

I have two ISE PSNs.  Both PSNs have a wildcard cert with *.ise.mydomain.com in the CN field. This certificate was issued by Globalsign.  I've installed the Globalsign Root CA Cert & the Globalsign Intermediate Cert into my Trusted Certificate Store in ISE. 

I recognize Wildcard certificates are an issue while performing EAP on Windows clients.  That is a separate issue and I will be obtaining a new cert to fix that issue, I would like to make sure the new cert fixes this other issue too.  

 

To my issue....

The wildcard certificate is a Globalsign cert.  My iPhone iOS 12.1.4 has Globalsign's Root CA in the Trust Store. I've verified this by reviewing the Serial Number of the Root CA cert on Globalsign's website, then looking at Apples list of available trusted root certificates webpage. The serial numbers match up. 

https://support.apple.com/en-us/HT209501

 

My assumptions and reading... 

Being that Globalsigns Root CA cert is preinstalled on my iPhone, my iPhone should accept identity certificates issued by the Globalsign Intermediate CA.   However, the document How to Implement Cisco ISE Server Side Certificates on page 17, it states "When an iOS client first communicates to a PSN it will not explicitly trust the PSN certificate, even though a trusted Certificate Authority has signed the certificate."

 

My question is how to get around the iOS device not trusting the PSN certificate?   I don’t believe end users should have to trust an already trusted certificate.

 

Thanks for any tips.

 

Tim 

1 Accepted Solution

Accepted Solutions

I believe this is the answer to the question "Why do Apple iOS devices force a user to Click Trust on a trusted certificate".

 

Note 28 of this document it states:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/compatibility/ise_sdt.html#pgfId-141382

 

When Apple iOS devices use Protected Extensible Authentication Protocol (PEAP) with Cisco ISE or 802.1x, certificate warnings might be displayed even for publicly trusted certificates. This usually occurs when the public certificate includes a Certificate Revocation List (CRL) distribution point that the iOS device needs to verify. The iOS device cannot verify the CRL without network access. Click Confirm or Accept in the iOS device to authenticate to the network.

View solution in original post

10 Replies 10

Peter Koltl
Level 7
Level 7

Sometimes the ISE node does not send the intermediate certificate along with its certificate during TLS handshake. It causes a warning on mobile devices. After a node reboot, the behavior may change and the browsers do not complain any more.

Except iPhones...

Damien Miller
VIP Alumni
VIP Alumni

First things first, there are known issues with Windows clients when the wildcard is in the CN of a certificate.  The recommended approach to this that we know works fine is to nest the wildcard in the SAN fields.  Aaron Woland covers this in the Cisco Live session BRKSEC-3697, Advanced ISE Services, Tips and Tricks.  I would recommend reviewing it and cutting a new cert to avoid issues. 

 

Now your iPhone issue sounds like one we ran in to with the Digicert High Assurance EV signing authority.  Since certificate trust relies on a chain of issue, missing the intermediate that issued the certificate should always result in a prompt to trust. This is by design from a security stand point, and also a pain in the butt.  The phone trusts the root, but it still doesn't trust the intermediate signing CA.  We were able to push the intermediate cert down inline with the MDM wifi profile to managed iphones, and got rid of the prompt.  

Thank you,  I understand the issue on the Windows computers and can deal with that.

 

I’ve installed the Root CA and the Intermediate CA Certificate into the ISE trusted store.

ISE Trusted Certs.jpg

 

Is there any way to configure ISE to send both of these certificates while preforming PEAP, the same way that a web server can, if configured?  I don’t have an MDM and most of these devices are personal devices so pushing the Intermediate cert is impossible.

 

 

As I have a public certificate installed on the PSN, I’m hoping there is a way for end users to connect to 802.1x Enterprise networks without having to click Trust in order to ‘trust’ an already publicly trusted certificate. 

 

Thank you,

Thank you for this article , it is very helpful. I have the same issue where we have ipads introduced on our network and keep. New devices could not connect as the certificate would not issue to the devices. It is believed or assumed to be the issue with issuing certificate related to the SCEP service.

 

How do you install GlobalSign OrganisationalSSL.

 

Your help is greatly appreciated.

You can visit the website of the GlobalSign website and then download their CA certificates.

 

The trick is to know WHICH ONE to download. 

 

In ISE you simply install them under Administration > System > Certificates > Trusted Certificates

Click the Import button and then make sure you tick Trust for Authentication within ISE and Trust for client authentication and SYSLOG.  Just for good measure, also tick the Validate Cert box.  Enter friendly name etc.

paul
Level 10
Level 10

The only way I know of to get phones to stop prompting to trust certs the first time they client connects is install the WLAN settings via an MDM.  If you are having the users manually connect to the SSID they will always have to trust the certificate the first time.  That is the nature of mobile devices.

Tim Glen
Cisco Employee
Cisco Employee

@paul ,

 

Thanks for the tip. 

 

Can you help me understand the technical reason behind this.  I've been reading about PEAP auth and cannot find an answer. 

Specifically,  I wonder if the certificate exchange over PEAP works differently than the certificate exchange over HTTPS. 

 

The ID cert installed on the ISE node looks like this. 

ise-cert.jpg

 

I've checked the serial numbers on all 3 of the certificates in this certificate chain.  My iPhone has the GlobalSign Root CA R1 certificate in its Trusted Store. My iPhone does not have the GlobalSign Organizational Validation certificate in the Trusted Store and obviously, it doesn't have the wildcard in the Trusted Store.

 

So when I go to the ISE Admin Portal page I get to it and I do not receive any errors. My iPhone trusts the wildcard certificate because it Trusts the Root.  When I connect to the wireless SSID and attempt PEAP I get the prompt to Trust the cert. 

 

I'd like to understand the technical details about why, when using PEAP, the certificate chain isn't trusted.

 

Thanks very much, I appreciate any insight. 

 

 

 

 

I believe this is the answer to the question "Why do Apple iOS devices force a user to Click Trust on a trusted certificate".

 

Note 28 of this document it states:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/compatibility/ise_sdt.html#pgfId-141382

 

When Apple iOS devices use Protected Extensible Authentication Protocol (PEAP) with Cisco ISE or 802.1x, certificate warnings might be displayed even for publicly trusted certificates. This usually occurs when the public certificate includes a Certificate Revocation List (CRL) distribution point that the iOS device needs to verify. The iOS device cannot verify the CRL without network access. Click Confirm or Accept in the iOS device to authenticate to the network.

Looks like the latest android versions are having the same behavior.

Can anyone confirm?

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: