I have found that EAP clients will receive a message asking if they trust a certificate (wildcard or single server) if an SSL certificate from a 3rd party provider is created by an intermediate CA server. This never happens if the certificate is received from a root CA server. I have tried:
- Opening up the IP addresses for the SSL provider CRL/OCSP servers to the limited access ACL.
- Verifying the server certificate is enabled as a trusted root/intermediate CA (Windows) and/or the client has the root and intermediate certificate in the trust store/keychain.
Nothing has worked. Once the client acknowledges that it does trust the certificate, they are usually not prompted again (may be prompted several months later). The same certificate can be used on a web portal and there is no error in the browser.
Has anyone else ran into this issue?