03-13-2018 05:14 PM - edited 02-21-2020 10:48 AM
Implementing ISE 2.3. Is the best practice for certificates to create a certificate for each service or is it best to just use the Multi-Use and assign it to the various services?
admin
eap auth
pxGrid
SAML
Portal (probably use a public CA for this one)
The reason I ask is when I created a cert request for each service, had each request signed by our enterprise CA and tried to bind them, I got this error after binding the first one (admin) successfully:
Solved! Go to Solution.
03-13-2018 05:55 PM
I tend to use the multi-use certificate for Admin/EAP because in all likelihood it will only be corporate users who need to access the Web GUI from their corp devices (who have the corp PKI cert chain). I don't want browser cert warnings, and of course I want the EAP authentications to work.
I use a common public CA cert for all of the portals (e.g. same cert for Guest/Sponsor/MyDevices/Blacklist portals) because these portals are public facing.
For Admin/EAP, the Subject CN can literally be anything and has no bearing on the real server's hostname. We put the real FQDN's into the certificate SAN field. This is where the browser looks to validate the hostname. In your case you could avoid that error if you used the same cert for Admin&EAP. But if you wanted to separate those two out, then just make the Subject CN unique for each cert.
03-13-2018 05:55 PM
I tend to use the multi-use certificate for Admin/EAP because in all likelihood it will only be corporate users who need to access the Web GUI from their corp devices (who have the corp PKI cert chain). I don't want browser cert warnings, and of course I want the EAP authentications to work.
I use a common public CA cert for all of the portals (e.g. same cert for Guest/Sponsor/MyDevices/Blacklist portals) because these portals are public facing.
For Admin/EAP, the Subject CN can literally be anything and has no bearing on the real server's hostname. We put the real FQDN's into the certificate SAN field. This is where the browser looks to validate the hostname. In your case you could avoid that error if you used the same cert for Admin&EAP. But if you wanted to separate those two out, then just make the Subject CN unique for each cert.
03-14-2018 10:29 AM
That honestly makes perfect sense. I think part of my issue is perhaps not understanding the use case of each service (yet).
Thank you very much for your insight!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide