Showing results for 
Search instead for 
Did you mean: 

This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC! We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.


Trust Store error in ISE Intune Integration even after having ITL cert

Hi all,

We run a distributed deployment we have 2 X PAN 2 X PSN 2 X MNT.
I am trying to add MDM integration of Intune to ISE, Following are the steps done for it., bail more, ITL 1-5 cert are kept inside the ISE trust store. Ise app registration in done in Intune and ISE PAN certificate is uploaded in there and the base 64 value of PAN has been added in Manifest,API permission are given as per document.

But I am getting this trust store error as in attachment. Please tell me what I am missing here?
Do I need to upload all ITL & Portal certificate in each PSN node trust store?
Do I need to upload the PSN node certificate in Azure Manifest?

According to document, only PAN cert is needed to upload in Azure app registration. and PAN primary nod only requires Trust store cert of ITL.

Please help me on this, Refer to attachment.


First time seeing a post with 0 replies from the community!! 

Cisco Employee

This occurs when ISE is trying to access the Token Issuing URL and it is returning a certificate that the ISE is not trusting. Make sure the full CA chain is in ISE truststore. If the issue still persists after confirming that, perform packet captures and test connectivity to see what is being sent.

Thanks but this is really outdated ;)

Poongarg , All documents are very old even the setup azure has been changed and no longer the same menu options.
The thing is I was able to do MDM Check via ISE till July half then suddenly I started getting the Trust store error!!

I wonder did any cert got changed recently and that is creating a trust store error.

Cisco Employee

The have below certificates in the certificate chain:
1. Baltimore CyberTrust Root
2. Microsoft IT TLS CA 2

We need to import the Baltimore CyberTrust Root certificate in the ISE Trusted Certificates Store as well.
If it is also imported then packet capture on PAN node is the next step for troubleshooting.

What Poonam recommended make sense. If all the required certificates are already there, then TCPdump would help us to understand ISE connections with the destination URL. To avoid any issue, export the cert's from PCAP and import in ISE trusted cert store.

This is true but upon inspection, we saw this url called:

We added his certificate even tough it's the same trust chain (msub05.jpg).


Also, we did a capture and got a "Fatal, certificate unknown" (pcap.jpg). After adding the whole new chain in the trust store, it finally worked (stamp2.login.jpg).


Hope this help!

Take care,



mchsmn, Can you  please tell me that do you have anything extra than the below cert in your trust store?

ITL 1-5

And are you puting in PAN primary trust store or in each PSN node?



I'm having the same problem here. Followed those:

I'm currently trying to capture traffic to see if there's any clue but so far, we had no success.

Did you get any luck finding a solution?

Recognize Your Peers
Content for Community-Ad

ISE Webinars

Miss a previous ISE webinar?
Never miss one again!

CiscoISE on YouTube