08-16-2022 04:33 AM
Does anyone know why the iPhone's certificate is not trusted (see attached) image. There is no error in Cisco ISE's live log but did see a message in ISE under the certificate section saying that this certificate is NOT used to verify the authenticity of client certificate presented to ISE..(see attached image also) but that has been fixed and the certificate was pushed via Microsoft Intune.
Thanks in advance!
08-16-2022 05:43 AM
Is the Certificate Public CA signed or Local PKI ?
08-16-2022 07:46 AM
Thanks Balaji for the quick response.
It is an internal Microsoft CA server and you can see in the attached iphone snapshot provided that it has been installed in the iphone, just the intermediary cert that isn't taken. Does this need to be in FDQN?
thanks!
08-16-2022 08:23 AM
08-16-2022 09:09 AM - edited 08-16-2022 09:09 AM
if that is internal CA, that is expected. or you need to manually upload root certificate to devices. - so the device can trust your Local CA certs
08-16-2022 09:53 AM
I only see the iphone-2 photo showing the cert being presented is not trusted, assuming it is because it cannot be verified by the endpoint.
The only way I've had any success with getting my internal CA trusted on an iphone was by using an MDM to push the CA to the endpoint trust store before attempting to connect to our internal wireless.
Robert
08-16-2022 10:17 AM
Thanks for the reply Robert. Yes, we used Microsoft Intune to push the certificate to the iPhone and you can see the root certificate installed on the iPhone but not the internal CA certificate. The iPhone shows that it is not trusted and with over 1K, it should be trusted automatically (the internal CA certificate has bee installed on the in ISE and it can see it). Just wondering why the iPhone doesn't trust it automatically and had to hit the "Trust" option. It wouldn't be feasible to hit the trust button on every phone. thanks!
08-16-2022 12:11 PM
When you say root certificate, do you mean from ISE? Since you're specifying both I'm assuming the internal CA is your MS PKI and the root is from ISE. If that is the case, which one of them signed the certificate that is presented to the device by ISE? Look in Admin -> Certificates and look for the one being used for EAP authentication, make sure the issued by is indeed the certificate you are pushing with Intune into the trust store
08-19-2022 01:07 AM
08-18-2022 02:39 PM
hey @latenaite2011 - I'm curious if you were able to get to the bottom of this issue?
08-19-2022 12:46 AM
08-19-2022 01:07 AM
11-08-2022 09:44 AM
No Rsharp001 - still having the same issue.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide