This document describes the best practices and proactive procedures to renew certificates on Cisco Identity Services Engine (ISE).
Cisco recommends that you have knowledge of these topics:
The information in this document is based on these software and hardware versions:
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
This document describes the best practices and proactive procedures to renew certificates on the Cisco Identity Services Engine (ISE). It also reviews how to set up alarms and notifications so administrators are warned of imminent events such as certificate expiration. As an ISE administrator, you eventually encounter the fact that ISE certificates expire. If your ISE server has an expired certificate, serious problems can arise unless you replace the expired certificate with a new, valid certificate.
The ISE administrator must install a new, valid certificate on the ISE before the old certificate expires. This proactive approach prevents or minimizes downtime and avoids an impact on your end-users. Once the time period of the newly installed certificate begins, you can enable the EAP/Admin or any other role on the new certificate.
You can configure the ISE so that it generates alarms and notifies the administrator to install new certificates before the old certificates expire.
When the ISE is installed, it generates a self-signed certificate. The self-signed certificate is used for administrative access and for communication within the distributed deployment (HTTPS) as well as for user authentication (EAP). In a live system, use a CA certificate instead of a self-signed certificate.
The format for an ISE certificate must be Privacy Enhanced Mail (PEM) or Distinguished Encoding Rules (DER).
In order to view the initial self-signed certificate, navigate to Administration > System> Certificates > System Certificates in the ISE GUI, as shown in this image.

If you install a server certificate on the ISE via a Certificate Signing Request (CSR) and change the certificate for the Admin or EAP protocol, the self-signed server certificate is still present but is in a Not in-Use status.
Assume that the installed certificate expires soon. Is it better to let the certificate expire before you renew it or to change the certificate before expiration? You must change the certificate before expiration so that you have time to plan the certificate swap and to manage any downtime caused by the swap.
When must you change the certificate? Obtain a new certificate with a start date that precedes the expiration date of the old certificate. The time period between those two dates is the change window.
This image depicts the information for a certificate that expires soon:

This procedure describes how to renew the certificate through a CSR:
Once you receive the final certificate from your CA, you must add the certificate to the ISE:
The Cisco ISE notifies you when the expiration date of a local certificate is within 90 days. Such advance notification helps you avoid expired certificates, plan the certificate change, and prevent or minimize downtime.
The notification appears in several ways:
Configure the ISE for email notification of expiration alarms. In the ISE console, navigate to Administration > System > Settings > SMTP Server, identify the Simple Mail Transfer Protocol (SMTP) server, and define the other server settings so that email notifications are sent for the alarms:

There are two ways that you can set up notifications:
Use this section in order to confirm that your configuration works properly.
Verify that the alerting system works correctly. In this example, a configuration change generates an alert with a severity level of Information. (An Information alarm is the lowest severity, while certificate expirations generate a higher severity level of Warning.)

This is an example of the email alarm that is sent by the ISE:

This procedure describes how to verify that the certificate is installed correctly and how to change EAP and/or Admin roles:
CLI:> show application status ise
If you want to check the certificate externally, you can use the embedded Microsoft Windows tools or the OpenSSL toolkit.
OpenSSL is an open-source implementation of the Secure Sockets Layer (SSL) protocol. If the certificates use your own private CA, you must place your root CA certificate on a local machine and use the OpenSSL option -CApath. If you have an intermediate CA, you must place it into the same directory as well.
In order to obtain general information about the certificate and verify it, use:
openssl x509 -in certificate.pem -noout -text
openssl verify certificate.pem
It can also be useful to convert the certificates with the OpenSSL toolkit:
openssl x509 -in certificate.der -inform DER -outform PEM -out certificate.pem
There is currently no specific diagnostic information available for this configuration.
As you can install a new certificate on the ISE before it is active, Cisco recommends that you install the new certificate before the old certificate expires. This overlap period between the old certificate expiration date and the new certificate start date gives you time to renew certificates and plan their installation with little or no downtime. Once the new certificate enters its valid date range, enable the EAP and/or Admin. Remember, if you enable Admin usage, there is a service restart.
| Revision | Publish Date | Comments |
|---|---|---|
5.0 |
22-Apr-2026
|
Updated SEO. |
4.0 |
10-Oct-2024
|
Added Legal Disclaimer, and Alt Text.
Updated Style Requirements, and Formatting. |
3.0 |
07-Sep-2023
|
Recertification |
2.0 |
04-Aug-2022
|
Initial Release |
1.0 |
16-Jun-2021
|
Initial Release |