cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5101
Views
0
Helpful
4
Replies

ISE CA (Trusted) certificates and "trusted for" setting

Johannes Luther
Level 4
Level 4

Hi ISE folks,

another annoying ISE question from my side.

Within ISE we have multiple options to set the trust status of a CA:

  • "Infrastructure" (Trust for authentication within ISE)
  • "Endpoint" (Trust for client authentication and Syslog)
  • "Cisco Services" (Trust for external services like feed service)

So far so good.

Let's assume we create a CSR for a sponsoren guest portal within ISE and give it to a public CA provider (let's say comodo just for the sake of our example). The public CA signs our certificate and sends it back along with all CA certificates in the chain.

The ISE documentation states:

Import the root and any other intermediate certificates of the CA that signed your
certificate in to the Trusted Certificates store.

So I import the root (if it is not there) and the intermediate certificates to the trusted certificates.

Why do we need this? Because the client typically only trusts the root CA. If the ISE doesn't have all the intermediate certificates, then the client will eventually get a SSL error message that the certificate is not trusted. If the ISE has all the intermediate CA ceriticates it will provide these CA certificates to the client in the SSL server hello message (sorry I'm drifting away ...)

The one million dollar question is:

What "trust for" checkbox do I tick for the public CA ceritifcates of the guest portal?

None of the available options are suitable.

  • Infrastructure: Hell no - I don't want to trust a public CA for the trust state of my internal ISE deployment
  • Endpoint: No way ... like everybody can do EAP-TLS in my campus ... *woohoo*

Is it supported to import a CA certificate and untick all "trusted for" checkboxes? So the certificate is displayed as trusted for "unknown" in the trusted certificate summary?

How did you guys solve it?

1 Accepted Solution

Accepted Solutions

nspasov
Cisco Employee
Cisco Employee

Hello again Johannes :) I believe that you are correct that you don't have to have any of those boxes checked if you are to only use that certificate and CA for web/guest services.

Thank you for rating helpful posts!

View solution in original post

4 Replies 4

nspasov
Cisco Employee
Cisco Employee

Hello again Johannes :) I believe that you are correct that you don't have to have any of those boxes checked if you are to only use that certificate and CA for web/guest services.

Thank you for rating helpful posts!

i was going through your post and just want to know.. in my EAP-TLS connection, how do i enable endpoint trust as well for root certificate , as of now it is showing trusting only for infrastructure (Trust) enabled..

 

It will make any sense.

The settings here are in ISE for each trusted certificate. In the editing certificate page for each trusted certificate, the options are shown as check boxes and you should be able to enable them accordingly.

Screen Shot 2021-11-03 at 6.20.51 PM.png

If you still have a problem, please start your own thread and add the screen shots, etc.

anilkumar.cisco
Level 4
Level 4

Just want to understand.. without enabling Trust for client authentication and syslog option in Root CA certificate..

my Client EAP-TLS certificate based authentication  in CAP will work with ISE (System Certificate ) which is properly signed by my  CA and which is used for EAP authentication.


if yes then what is the use of this option in ROOT certificate..