Posture Script Condition–Fails to Connect When SHA-256 Fingerprint Add
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-13-2025 11:14 AM
We’re implementing a script-based posture condition in Cisco ISE to check domain join status on endpoints.
As part of this setup, we’ve added the SHA-256 fingerprint of the ISE PSN's portal certificate into the AnyConnectLocalPolicy.xml file on the endpoint, under the <TrustedISECertFingerprints> section.We followed documents:
However, when the Secure Client attempts to contact the policy server, we receive the following error:
"Failed to connect to the policy server. Contact your administrator."
Interestingly, when we remove the fingerprint from the XML file, the client is able to connect to the policy server, but the script condition fails .
AnnyconnectLocalPolicy.xml:
We’ve verified:
The SHA-256 fingerprint is correct and copied directly from the ISE portal certificate (used by the PSN).
The fingerprint is in the correct format
- The AnyConnectLocalPolicy.xml file is saved correctly in C:\ProgramData\Cisco\Cisco Secure Client\
Has anyone else faced this behavior? Why is the fingerprint causing the agent not be able to contact the policy server ?Could there be any additional certificate trust validation steps we are missing? Or is there a known issue with script condition trust enforcement in ISE 3.x?
Note: We do not want to install certificates on Client.
Appreciate any insights or troubleshooting suggestions!
Thanks,
Vishnu
- Labels:
-
Identity Services Engine (ISE)
