Certificate Management in Cisco ISE
A certificate is an electronic document that identifies an individual, a server, a company, or another entity, and associates that entity with a public key. A self-signed certificate is signed by its creator. Certificates can be self-signed or digitally signed by an external CA. A CA-signed digital certificate is considered an industry standard and more secure than a self-signed certificate.
Certificates are used in a network to provide secure access. Certificates identify a Cisco ISE node to an endpoint and secure the communication between that endpoint and the Cisco ISE node.
Cisco ISE uses certificates for:
-
Communication between Cisco ISE nodes.
-
Communication between Cisco ISE and external servers such as the syslog and feed servers.
-
Communication between Cisco ISE and end user portals such as guest, sponsor and BYOD portals.
Manage certificates for all the nodes in your deployment through the Cisco ISE administration portal.
Configure Certificates in Cisco ISE to Enable Secure Access
Cisco ISE relies on public key infrastructure (PKI) to provide secure communication with both endpoints and administrators and between Cisco ISE nodes in a multinode deployment. PKI relies on X.509 digital certificates to transfer public keys for encryption and decryption of messages, and to verify the authenticity of other certificates representing users and devices. Through the Cisco ISE administration portal, you can manage two categories of X.509 certificates:
-
System Certificates: These are server certificates that identify a Cisco ISE node to client applications. Every Cisco ISE node has its own system certificates that are stored on the node along with the corresponding private keys.
Note
Cisco ISE cannot import more than one certificate with the same private key. If the certificate is renewed and imported without changing the private key, then the existing certificate is replaced with the imported certificate.
-
Trusted Certificates: These are CA certificates that are used to establish trust for the public keys that are received from users and devices. The Trusted Certificates store also contains certificates that are distributed by the Simple Certificate Enrollment Protocol (SCEP), which enables the registration of mobile devices into the enterprise network. Trusted certificates are managed on the primary PAN, and are automatically replicated to all the other nodes in a Cisco ISE deployment.
In a distributed deployment, you must import the certificate only into the Certificate Trust List (CTL) of the PAN. The certificate gets replicated to the secondary nodes.
To ensure certificate authentication in Cisco ISE is not impacted by minor differences in certificate-driven verification functions, use lowercase hostnames for all Cisco ISE nodes that are deployed in a network.
Certificate Usage
When you import a certificate into Cisco ISE, specify the purpose for which the certificate is to be used. Choose , and click Import.
Choose one or more of the following uses:
-
Admin: For internode communication and authenticating the administration portal.
-
EAP Authentication: For TLS-based EAP authentication.
-
RADIUS DTLS: For RADIUS DTLS server authentication.
-
Portal: For communicating with all Cisco ISE end-user portals.
-
SAML: For verifying that the SAML responses are being received from the correct identity provider.
-
pxGrid: For communicating with the pxGrid controller.
Associate different certificates from each node for communicating with the administration portal (Admin usage), the pxGrid controller (pxGrid usage), and for TLS-based EAP authentication (EAP Authentication usage). However, you can associate only one certificate from each node for each of these purposes.
With multiple PSNs in a deployment that can service a web portal request, Cisco ISE needs a unique identifier to identify the certificate that must be used for portal communication. When you add or import certificates that are designated for portal use, define a certificate group tag and associate it with the corresponding certificate on each node in your deployment. Associate this certificate group tag to the corresponding end-user portals (guest, sponsor, and personal devices portals). This certificate group tag is the unique identifier that helps Cisco ISE identify the certificate that must be used when communicating with each of these portals. You can only designate one certificate from each node for each of the portals.
![]() Note |
An EAP-TLS client certificate should have KeyUsage=Key Agreement and ExtendedKeyUsage=Client Authentication for the following ciphers:
An EAP-TLS client certificate should have KeyUsage=Key Encipherment and ExtendedKeyUsage=Client Authentication for the following ciphers:
To bypass this requirement, choose Administration > System > Settings > Security Settings and check the Accept certificates without validating purpose checkbox. |
Certificate Matching in Cisco ISE
When you set up Cisco ISE nodes in a deployment, the nodes communicate with each other. The system checks the FQDN of each Cisco ISE node to ensure that they match (for example ise1.cisco.com and ise2.cisco.com or if you use wildcard certificates then *.cisco.com). In addition, when an external machine presents a certificate to a Cisco ISE server, the external certificate that is presented for authentication is checked (or matched) against the certificate in the Cisco ISE server. If the two certificates match, the authentication succeeds.
For Cisco , matching is performed between the nodes (if there are two), and between Cisco and pxGrid.
Cisco ISE checks for a matching subject name as follows:
-
Cisco ISE looks at the subject alternative name extension of the certificate. If the subject alternative name contains one or more DNS names, then one of the DNS names must match the FQDN of the Cisco ISE node. If a wildcard certificate is used, then the wildcard domain name must match the domain in the Cisco ISE node’s FQDN.
-
If there are no DNS names in the subject alternative name, or if the subject alternative name is missing entirely, then the common name in the Subject field of the certificate or the wildcard domain in the Subject field of the certificate must match the FQDN of the node.
-
If no match is found, the certificate is rejected.
Note
X.509 certificates that are imported into Cisco ISE must be in privacy-enhanced mail (PEM) or distinguished encoding rule format. Files containing a certificate chain (a system certificate along with the sequence of trust certificates that sign it) can be imported, subject to certain restrictions.
Validity of X.509 Certificates
X.509 certificates are valid until a specific date. When a system certificate expires, the Cisco ISE functionality that depends on the certificate is impacted. Cisco ISE notifies you about the pending expiration of a system certificate when the expiration date is within 90 days. This notification appears in several ways:
-
Colored expiration status icons appear in the System Certificates window. The navigation path is .
-
Expiration messages appear in the Cisco ISE System Diagnostic report. The navigation path is .
-
Expiration alarms are generated 90 days, 60 days, and 30 days before expiration. Expiration alarms are generated every day in the final 30 days before expiration.
If the expiring certificate is a self-signed certificate, you can extend its expiration date by editing the certificate. For a certificate authority-signed certificate, you must allow sufficient time to acquire the replacement certificate from your certificate authority.
Enable Public Key Infrastructure in Cisco ISE
PKI is a cryptographic technique that enables secure communication and verifies the identity of a user using digital signatures.
Procedure
Step 1 |
Configure system certificates on each node in your deployment for the following:
By default, a Cisco ISE node is preinstalled with a self-signed certificate that is used for EAP authentication, and for access to administration portal, end user portals, and pxGrid controller. In a typical enterprise environment, this self-signed certificate is replaced with server certificates that are signed by a trusted CA. |
||
Step 2 |
Populate the Trusted Certificates store with the CA-signed certificates that are used to establish trust with the user, and device certificates that will be presented to Cisco ISE. To validate the authenticity of a user or device certificate with a certificate chain that consists of a root CA certificate and one or more intermediate CA certificates:
For inter-node communications, you must populate the Trusted Certificates store with the trust certificates that validate the Admin system certificate of each node in the Cisco ISE deployment. To use the default self-signed certificate for internode communication, export this certificate from the System Certificates window of each Cisco ISE node and import it into the Trusted Certificates store. If you replace the self-signed certificates with CA-signed certificates, it is only necessary to populate the Trusted Certificates store with the appropriate root CA and intermediate CA certificates. You cannot register a node in a Cisco ISE deployment until you complete this step. If you use self-signed certificates to secure communication between a client and a PSN in a deployment, when BYOD users move from one location to another, EAP-TLS user authentication fails. For such authentication requests that have to be serviced between a few PSNs, you must secure communication between the client and the PSN with an externally-signed CA certificate or use wildcard certificates that are signed by an external CA. If you intend to get a publicly signed certificate or if the Cisco ISE deployment is to be operated in FIPS mode, you must ensure that all system and trusted certificates are FIPS-compliant. This means that each certificate must have a minimum key size of 2048 bytes, and use SHA-1 or SHA-256 encryption.
|
Wildcard Certificates
A wildcard certificate uses a wildcard notation (an asterisk and period before the domain name) and the certificate can be shared across multiple hosts in an organization. For example, the CN value for the certificate subject would be a generic hostname such as aaa.ise.local and the SAN field would include the same generic hostname and a wildcard notation such as DNS.1=aaa.ise.local and DNS.2=*.ise.local.
If you configure a wildcard certificate to use *.ise.local, you can use the same certificate to secure any other host whose DNS name ends with “.ise.local,” such as :
-
aaa.ise.local
-
psn.ise.local
-
mydevices.ise.local
-
sponsor.ise.local
Wildcard certificates secure communication in the same way as a regular certificate, and requests are processed using the same validation methods.
The following figure is an example of a wildcard certificate that is used to secure a website.

Wildcard Certificate Support in Cisco ISE
In earlier releases, Cisco ISE used that common name value to replace the variable in the url-redirect A-V pair string. For all centralized web authentication, onboarding, posture redirection, and so on, the common name value was used.
Cisco ISE uses the hostname of the ISE node as the common name.
Wildcard Certificates for HTTPS and Extensible Authentication Protocol Communication
You can use wildcard server certificates in Cisco ISE for administration (web-based services) and EAP protocols that use SSL or TLS tunneling. When you use wildcard certificates, you do not need to generate a unique certificate for each Cisco ISE node. Also, you no longer have to populate the SAN field with multiple FQDN values to prevent certificate warnings. Use an asterisk (*) in the SAN field to share a single certificate across multiple nodes in a deployment and prevent certificate name mismatch warnings. However, the use of wildcard certificates is considered less secure than assigning a unique server certificate to each Cisco ISE node.
When assigning public wildcard certificates to the guest portal and importing sub-CA with root-CA certificates, the certificate chain is not sent until Cisco ISE services are restarted.
![]() Note |
If you use wildcard certificates, we recommend that you partition your domain space for greater security. For example, instead of *.example.com, you can partition it as *.amer.example.com. If you do not partition your domain, it could lead to serious security issues. |
Wildcard certificates use an asterisk (*) and a period before the domain name. For example, the common name value for a certificate’s Subject Name would be a generic hostname such as aaa.ise.local and the SAN field would have the wildcard character such as *.ise.local. Cisco ISE supports wildcard certifications in which the wildcard character (*) is the left-most character in the presented identifier. For example, *.example.com or *.ind.example.com. Cisco ISE does not support certificates in which the presented identifier contains other characters along with the wildcard character. For example, abc*.example.com, or a*b.example.com, or *abc.example.com.
Fully Qualified Domain Name in URL Redirection
url-redirect=https://ip:port/guestportal/gateway?sessionId=SessionIdValue&action=cwa
When processing this request, Cisco ISE substitutes actual values for some keywords in this string. For example, SessionIdValue is replaced with the actual session ID of the request. For an eth0 interface, Cisco ISE replaces the IP in the URL with the FQDN of the Cisco ISE node. For non-eth0 interfaces, Cisco ISE uses the IP address in the URL. You can assign a host alias (name) for interfaces eth1 through eth3, which Cisco ISE can then substitute in place of IP address during URL redirection.
To do this, use the ip host command in the configuration mode from the Cisco ISE CLI ISE /admin(config)# prompt:
ip host IP_address host-alias FQDN-string
Where IP_address is the IP address of the network interface (eth1 or eth2 or eth3) and host-alias is the name that you assign to the network interface. FQDN-string is the fully qualified domain name of the network interface. Using this command, you can assign a host-alias or an FQDN-string or both to a network interface.
Here is an example using the ip host command: ip host a.b.c.d sales sales.amerxyz.comAfter you assign a host alias to the non-eth0 interface, restart the application services on Cisco ISE using the application start ise command.
Use the no form of this command to remove the association of the host alias with the network interface.
no ip host IP_address host-alias FQDN-string
Use the show running-config command to view the host alias definitions.
If you provide the FQDN-string, Cisco ISE replaces the IP address in the URL with the FQDN. If you provide only the host alias, Cisco ISE combines the host alias with the configured IP domain name to form a complete FQDN and replaces the IP address in the URL with the FQDN. If you do not map a network interface to a host alias, then Cisco ISE uses the IP address of the network interface in the URL.
When you use non-eth0 interfaces for client provisioning or native supplicant or guest flows, ensure that the IP address or host alias for non-eth0 interfaces are configured appropriately in the PSN certificate's SAN fields.
Advantages of Using Wildcard Certificates
-
Cost savings: Certificates that are signed by third-party CAs are expensive, especially as the number of servers increases. Wildcard certificates can be used on multiple nodes in the Cisco ISE deployment.
-
Operational efficiency: Wildcard certificates allow all PSNs to share the same certificate for EAP and web services. In addition to significant cost savings, certificate administration is also simplified by creating the certificate once and applying it on all the PSNs.
-
Reduced authentication errors: Wildcard certificates address issues seen with Apple iOS devices when the client stores trusted certificates within the profile and does not follow the iOS keychain where the signing root is trusted. When an iOS client first communicates with a PSN, it does not explicitly trust the PSN certificate, although a trusted CA has signed the certificate. Using a wildcard certificate, the certificate is the same across all PSNs, so the user only has to accept the certificate once and successive authentications to different PSNs proceed without errors or prompts.
-
Simplified supplicant configuration: For example, a Microsoft Windows supplicant with PEAP-MSCHAPv2 and a trusted server certificate requires that you specify each of the server certificate to trust, or the user may be prompted to trust each PSN certificate when the client connects using a different PSN. With wildcard certificates, a single server certificate can be trusted rather than individual certificates from each PSN.
-
Wildcard certificates result in an improved user experience with less prompting and more seamless connectivity.
Disadvantages of Using Wildcard Certificates
-
Loss of auditability and nonrepudiation.
-
Increased exposure of the private key.
-
Not common or understood by administrators.
Wildcard certificates are considered less secure than using a unique server certificate in each Cisco ISE node. But cost and other operational factors outweigh the security risk.
Security devices such as Cisco Adaptive Security Appliance also support wildcard certificates.
You must be careful when deploying wildcard certificates. For example, if you create a certificate with *.company.local and an attacker is able to recover the private key, that attacker can spoof any server in the company.local domain. Therefore, it is considered a best practice to partition the domain space to avoid this type of compromise.
To address this possible issue and to limit the scope of use, wildcard certificates may also be used to secure a specific subdomain of your organization. Add an asterisk (*) in the subdomain area of the common name where you want to specify the wildcard.
For example, if you configure a wildcard certificate for *.ise.company.local, that certificate may be used to secure any host whose DNS name ends in “.ise.company.local”, such as:
-
psn.ise.company.local
-
mydevices.ise.company.local
-
sponsor.ise.company.local
Wildcard Certificate Compatibility
Wildcard certificates are usually created with the wildcard listed as the common name of the certificate subject. Cisco ISE supports this type of construction. However, not all endpoint supplicants support the wildcard character in the certificate subject.
All the Microsoft native supplicants that were tested (including Windows Mobile which is now discontinued) do not support wildcard character in the certificate subject.
You can use another supplicant, such as Cisco AnyConnect Network Access Manager that might allow the use of wildcard characters in the Subject field.
You can also use special wildcard certificates such as DigiCert's Wildcard Plus that is designed to work with incompatible devices by including specific subdomains in the Subject Alternative Name of the certificate.
Although the Microsoft supplicant limitation appears to be a deterrent to using wildcard certificates, there are alternative ways to create the wildcard certificate that allow it to work with all the devices tested for secure access, including the Microsoft native supplicants.
To do this, instead of using the wildcard character in the Subject, you must use the wildcard character in the Subject Alternative Name field instead. The Subject Alternative Name field maintains an extension that is designed for checking the domain name (DNS name). See RFC 6125 and RFC 2128 for more information.
Certificate Hierarchy
In the administration portal, view the certificate hierarchy or the certificate trust chain of all endpoint, system, and trusted certificates. The certificate hierarchy includes the certificate, all the intermediate CA certificates, and the root certificate. For example, when you choose to view a system certificate from the the administration portal, the details of the corresponding system certificate are displayed. The certificate hierarchy is displayed at the top of the certificate. Click a certificate in the hierarchy to view its details. The self-signed certificate does not have any hierarchy or trust chain.
In the certificate listing windows, you will see one of the following icons in the Status column:
-
Green icon: Indicates a valid certificate (valid trust chain).
-
Red icon: Indicates an error (for example, trust certificate missing or expired).
-
Yellow icon: Warns that a certificate is about to expire and prompts renewal.
System Certificates
Cisco ISE system certificates are server certificates that identify a Cisco ISE node to other nodes in the deployment and to client applications. System certificates are:
-
Used for inter-node communication in a Cisco ISE deployment. Check the Admin check box in the Usage area of these certificates.
-
Used by browser and REST clients who connect to Cisco ISE web portals. Check the Portal check box in the Usage area of these certificates.
-
Used to form the outer TLS tunnel with PEAP and EAP-FAST. Check the EAP Authentication check box in the Usage area for mutual authentication with EAP-TLS, PEAP, and EAP-FAST.
-
Used for RADIUS DTLS server authentication.
-
Used to communicate with SAML identity providers. Check the SAML check box in the Usage area of this certificate. If you choose the SAML option, you cannot use this certificate for any other service.
-
Used to communicate with the pxGrid controller. Check the pxGrid check box in the Usage area of these certificates.
Install valid system certificates on each node in your Cisco ISE deployment. By default, two self-signed certificates and one signed by the internal Cisco ISE CA are created on a Cisco ISE node during installation time:
-
A self-signed server certificate designated for EAP, Admin, Portal, and RADIUS DTLS (it has a key size of 2048 and is valid for one year).
-
A self-signed SAML server certificate that can be used to secure communication with a SAML identity provider (it has a key size of 2048 and is valid for one year).
-
An internal Cisco ISE CA-signed server certificate that can be used to secure communication with pxGrid clients (it has a key size of 4096 and is valid for one year).
When you set up a deployment and register a secondary node, the certificate that is designated for pxGrid controller is automatically replaced with a certificate that is signed by the primary node's CA. Thus, all pxGrid certificates become part of the same PKI trust hierarchy.
![]() Note |
|
For supported key and cipher information for your release, see the appropriate version of the Cisco Identity Services Engine Network Component Compatibility guide.
We recommend that you replace the self-signed certificate with a CA-signed certificate for greater security. To obtain a CA-signed certificate, you must:
-
Create a Certificate-Signing Request and Submit it to a Certificate Authority
-
Bind a CA-Signed Certificate to a Certificate Signing Request
How To: Implement ISE Server-Side Certificates Certificate Renewal on Cisco Identity Services Engine Configuration Guide |
View System Certificates
The System Certificate window lists all the system certificates added to Cisco ISE.
Before you begin
To perform the following task, you must be a Super Admin or System Admin.
Procedure
Step 1 |
Choose . |
Step 2 |
The following columns are displayed in the System Certificates window:
|
Import a System Certificate
You can import a system certificate for any Cisco ISE node from the administration portal.
![]() Note |
Changing the certificate of the admin role certificate on a primary PAN node restarts services on all other nodes. The system restarts one node at a time, after the primary PAN restart has complete. |
Before you begin
-
Ensure that you have the system certificate and the private key file on the system that is running on the client browser.
-
If the system certificate that you import is signed by an external CA, import the relevant root CA and intermediate CA certificates into the Trusted Certificates store (. )
-
If the system certificate that you import contains basic constraints extension with the CA flag set to true, ensure that the key usage extension is present, and the keyEncipherment bit or the keyAgreement bit or both are set.
-
To perform the following task, you must be a Super Admin or System Admin.
Procedure
Step 1 |
Choose . |
Step 2 |
Click Import. |
Step 3 |
Enter the values for the certificate that you are going to import. |
Step 4 |
Click Submit. |
Generate a Self-Signed Certificate
Add a new local certificate by generating a self-signed certificate. Cisco recommends that you only employ self-signed certificates for your internal testing and evaluation needs. If you plan to deploy Cisco ISE in a production environment, use CA-signed certificates whenever possible to ensure more uniform acceptance around a production network.
![]() Note |
If you use a self-signed certificate and you want to change the hostname of your Cisco ISE node, log in to the administration portal of the Cisco ISE node, delete the self-signed certificate that has the old hostname, and generate a new self-signed certificate. Otherwise, Cisco ISE continues to use the self-signed certificate with the old hostname. |
Before you begin
To perform the following task, you must be a Super Admin or System Admin.
Edit a System Certificate
Use this window to edit a system certificate and to renew a self-signed certificate. When you edit a wildcard certificate, the changes are replicated to all the nodes in the deployment. If you delete a wildcard certificate, that wildcard certificate is removed from all the nodes in the deployment.
Before you begin
To perform the following task, you must be a Super Admin or System Admin.
Procedure
Step 1 |
Choose . |
Step 2 |
Check the check box next to the certificate that you want to edit, and click Edit. |
Step 3 |
To renew a self-signed certificate, check the Renewal Period check box and enter the expiration Time to Live (TTL) in days, weeks, months, or years. Choose the required value from the drop-down lists. |
Step 4 |
Click Save. If the Admin check box is checked, then the application server on the Cisco ISE node restarts. In addition, if the Cisco ISE node is the PAN in a deployment, then the application server on all the other nodes in the deployment also restart. The system restarts one node at a time, after the primary PAN restart has completed. |
![]() Note |
Using Chrome 65 and above to launch Cisco ISE can cause BYOD portal or Guest portal to fail to launch in the browser although URL is redirected successfully. This is because of a new security feature introduced by Google that requires all certificates to have a Subject Alternative Name field. For Cisco ISE Release 2.4 and later, you must fill the Subject Alternative Name field. To launch with Chrome 65 and above, follow the steps below: 1. Generate a new self-signed certificate from the Cisco ISE GUI by filling the Subject Alternative Name field. Both DNS and IP Address must be filled. 2. Cisco ISE services restart. 3. Redirect the portal in Chrome browser. 4. From browser View Certificate>Details>Copy the certificate by selecting base-64 encoded. 5. Install the certificate in Trusted path. 6. Close the Chrome browser and try to redirect the portal. |
![]() Note |
When configuring wireless BYOD setup for the browser Firefox 64 and later releases, with operating systems Win RS4 or RS5, you may not be able to add Certificate Exception. This behaviour is expected in case of fresh installs of Firefox 64 and later releases, and does not occur in case of upgrading to Firefox 64 and above from a previous version. The following steps allow you to add certificate exception in this case:
As a workaround, add the certificate manually for Firefox 64. In the Firefox 64 browser, choose . |
Delete a System Certificate
You can delete the system certificates that you no longer use.
Although you can delete multiple certificates from the System Certificates store at a time, you must have at least one certificate to use for Admin and EAP authentication. Also, you cannot delete any certificate that is in use for Admin, EAP Authentication, Portals, or pxGrid controller. However, you can delete the pxGrid certificate when the service is disabled.
If you choose to delete a wildcard certificate, the certificate is removed from all the Cisco ISE nodes in the deployment.
Procedure
Step 1 |
. |
Step 2 |
Check the check boxes next to the certificates that you want to delete, and click Delete. A warning message is displayed. |
Step 3 |
Click Yes to delete the certificate. |
Export a System Certificate
You can export a system certificate or a certificate and its associated private key. If you export a certificate and its private key for backup purposes, you can reimport them later if needed.
Before you begin
To perform the following task, you must be a Super Admin or System Admin.
Procedure
Step 1 |
. |
||
Step 2 |
Check the check box next to the certificate that you want to export and click Export. |
||
Step 3 |
Choose whether to export only the certificate, or the certificate and its associated private key.
|
||
Step 4 |
Enter the password if you have chosen to export the private key. The password should be at least eight characters long. |
||
Step 5 |
Click Export to save the certificate to the file system that is running your client browser. If you export only the certificate, the certificate is stored in the PEM format. If you export both the certificate and private key, the certificate is exported as a .zip file that contains the certificate in the PEM format and the encrypted private key file. |
Trusted Certificates Store
The Trusted Certificates store contains X.509 certificates that are used for trust and for Simple Certificate Enrollment Protocol (SCEP).
The certificates in the Trusted Certificate store are managed on the primary PAN, and are replicated to every node in the Cisco ISE deployment. Cisco ISE supports wildcard certificates.
Cisco ISE uses the trusted certificates for the following purposes:
-
To verify client certificates used for authentication by endpoints, and by Cisco ISE administrators accessing ISE-PICthe administration portal using certificate-based administrator authentication.
-
To enable secure communication between Cisco ISE nodes in a deployment. The Trusted Certificates store must contain the chain of CA certificates needed to establish trust with the system certificate on each node in a deployment.
-
If a self-signed certificate is used for the system certificate, the self-signed certificate from each node must be placed in the Trusted Certificates store of the PAN.
-
If a CA-signed certificate is used for the system certificate, the CA root certificate, and any intermediate certificates in the trust chain, must be placed in the Trusted Certificates store of the PAN.
-
-
To enable Secure LDAP authentication, a certificate from the certificate store must be selected when defining an LDAP identity source that will be accessed over SSL.
-
To distribute to personal devices preparing to register in the network using the personal devices portals. Cisco ISE implements the SCEP on PSNs to support personal device registration. A registering device uses the SCEP protocol to request a client certificate from a PSN. The PSN contains a registration authority (RA) that acts as an intermediary. The RA receives and validates the request from the registering device and then forwards the request to an external CA or the internal Cisco ISE CA, which issues the client certificate. The CA sends the certificate back to the RA, which returns it to the device.
Each SCEP CA used by Cisco ISE is defined by a SCEP RA profile. When a SCEP RA profile is created, two certificates are automatically added to the Trusted Certificates store:
-
A CA certificate (a self-signed certificate)
-
An RA certificate (a Certificate Request Agent certificate), which is signed by the CA.
The SCEP protocol requires that these two certificates be provided by the RA to a registering device. By placing these two certificates in the Trusted Certificates store, they are replicated to all PSN nodes for use by the RA on those nodes.
Note
When a SCEP RA profile is removed, the associated CA chain is also removed from the Trusted Certificates store. However, if the same certificates are referenced by secure syslog, LDAP, system, or trust certificates, only the SCEP profile is deleted.
-
![]() Note |
|
Certificates in Trusted Certificates Store
The Trusted Certificate store is prepopulated with trusted certificates: manufacturing certificate, root certificate, and other trusted certificates. The Root certificate (Cisco Root CA) signs the Manufacturing (Cisco CA Manufacturing) certificate. These certificates are disabled by default. If you have Cisco IP phones as endpoints in your deployment, enable the root and manufacturing certificates so the Cisco-signed client certificates for the phones are authenticated.
Trusted Certificate Naming Constraints
A trusted certificate in CTL may contain a name constraint extension. This extension defines a namespace for values of all subject name and subject alternative name fields of subsequent certificates in a certificate chain. Cisco ISE does not check constraints that are specified in a root certificate.
Cisco ISE supports the following name constraints:
-
Directory name
The directory name constraint should be a prefix of the directory name in the subject or subject alternative name field. For example:
-
Correct subject prefix:
CA certificate name constraint: Permitted: O=Cisco
Client certificate subject: O=Cisco,CN=Salomon
-
Incorrect subject prefix:
CA certificate name constraint: Permitted: O=Cisco
Client certificate subject: CN=Salomon,O=Cisco
-
-
DNS
-
Email
-
URI (The URI constraint must start with a URI prefix such as http://, https://, ftp://, or ldap://).
Cisco ISE does not support the following name constraints:
-
IP Address
-
OtherName
When a trusted certificate contains a constraint that is not supported and the certificate that is being verified does not contain the appropriate field, Cisco ISE rejects the certificate because it cannot verify unsupported constraints.
The following is an example of the name constraints definition within the trusted certificate:
X509v3 Name Constraints: critical
Permitted:
othername:<unsupported>
email:.abcde.at
email:.abcde.be
email:.abcde.bg
email:.abcde.by
DNS:.dir
DirName: DC = dir, DC = emea
DirName: C = AT, ST = EMEA, L = AT, O = ABCDE Group, OU = Domestic
DirName: C = BG, ST = EMEA, L = BG, O = ABCDE Group, OU = Domestic
DirName: C = BE, ST = EMEA, L = BN, O = ABCDE Group, OU = Domestic
DirName: C = CH, ST = EMEA, L = CH, O = ABCDE Group, OU = Service Z100
URI:.dir
IP:172.23.0.171/255.255.255.255
Excluded:
DNS:.dir
URI:.dir
An acceptable client certificate subject that matches the above definition is as follows:
Subject: DC=dir, DC=emea, OU=+DE, OU=OU-Administration, OU=Users, OU=X1, CN=cwinwell
View Trusted Certificates
The Trusted Certificates window lists all the trusted certificates that are available in Cisco ISE. To view the trusted certificates, you must be a Super Admin or System Admin.
Before you begin
To perform the following task, you must be a Super Admin or System Admin.
Procedure
Step 1 |
To view all the certificates, choose . The Trusted Certificates window displayed, listing all the trusted certificates. |
Step 2 |
Check the check box of the trusted certificate and click Edit, View, Export, or Delete to perform the required task. |
Change the Status of a Certificate in Trusted Certificates Store
The status of a certificate must be enabled so that Cisco ISE can use the certificate for establishing trust. When a certificate is imported into the Trusted Certificates store, it is automatically enabled.
Add a Certificate to Trusted Certificates Store
The Trusted Certificate store window allows you to add CA certificates to Cisco ISE.
Before you begin
-
To perform the following task, you must be a Super Admin or System Admin.
-
The certificate that you want to add must be in the file system of the computer where your browser is running. The certificate must be in PEM or DER format.
-
To use the certificate for Admin or EAP authentication, define the basic constraints in the certificate and set the CA flag to true.
Edit a Trusted Certificate
After you add a certificate to the Trusted Certificates store, you can further edit it by using the Edit options.
Before you begin
To perform the following task, you must be a Super Admin or System Admin.
Procedure
Step 1 |
. |
Step 2 |
Check the check box next to the certificate that you want to edit, and click Edit. |
Step 3 |
(Optional) Enter a name for the certificate in the Friendly Name field. If you do not specify a friendly name, a default name is generated in the following format: common-name#issuer#nnnnn |
Step 4 |
Define the usage of the certificate by checking the necessary check boxes in the Trusted For area. |
Step 5 |
(Optional) Enter a description for the certificate in the Description field. |
Step 6 |
Click Save. |
Delete a Trusted Certificate
You can delete trusted certificates that you no longer need. However, you must not delete Cisco ISE internal CA certificates. Cisco ISE internal CA certificates can be deleted only when you replace the Cisco ISE root certificate chain for the entire deployment.
Procedure
Step 1 |
Choose . |
Step 2 |
Check the check boxes next to the certificates that you want to delete, and click Delete. A warning message is displayed. To delete the Cisco ISE Internal CA certificates, click one of the following options:
|
Step 3 |
Click Yes to delete the certificate. |
Export a Certificate from Trusted Certificates Store
Before you begin
To perform the following task, you must be a Super Admin or System Admin.
![]() Note |
If you export certificates from the internal CA and plan to use the exported certificates to restore from backup, use the CLI command application configure ise. See Export Cisco ISE CA Certificates and Keys. |
Procedure
Step 1 |
Choose . |
Step 2 |
Check the check box next to the certificate that you want to export, and click Export. You can export only one certificate at a time. |
Step 3 |
Save the PEM file to the file system that is running your client browser. |
Import a Root Certificate to Trusted Certificate Store
While importing the root CA and intermediate CA certificates, specify the services for which the trusted CA certificates are to be used.
Before you begin
You must have the root certificate and other intermediate certificates from the CA that signed your certificate signing requests and returned the digitally signed CA certificates.
Procedure
Step 1 |
Choose . |
Step 2 |
Click Import. |
Step 3 |
In the Import a new Certificate into the Certificate Store window that is displayed, click Choose File to select the root CA certificate signed and returned by your CA. |
Step 4 |
Enter a Friendly Name. |
Step 5 |
Check the check boxes next to the services for which you want to use this trusted certificate. |
Step 6 |
(Optional) In the Description field, enter a description for your certificate. |
Step 7 |
Click Submit. |
What to do next
Import the intermediate CA certificates into the Trusted Certificates store (if applicable).
Trusted Certificate Import Settings
Field Name |
Description |
---|---|
Certificate File |
Click Browse to choose the certificate file from the computer that is running the browser. |
Friendly Name |
Enter a friendly name for the certificate. If you do not specify a name, Cisco ISE automatically creates a name in the format <common name># <issuer># <nnnnn>, where <nnnnn> is a unique five-digit number. |
Trust for authentication within ISE |
Check the check box if you want this certificate to be used to verify server certificates (from other ISE nodes or LDAP servers). |
Trust for client authentication and Syslog |
(Applicable only if you check the Trust for authentication within ISE check box) Check the check box if you want this certificate to be used to:
|
Trust for authentication of Cisco Services |
Check this check box if you want this certificate to be used to trust external Cisco services such as the feed service. |
Validate Certificate Extensions |
(Only if you check both the Trust for client authentication and Enable Validation of Certificate Extensions options) Ensure that the “keyUsage” extension is present and the “keyCertSign” bit is set, and that the basic constraints extension is present with the CA flag set to true. |
Description |
Enter an optional description. |
Certificate Chain Import
You can import multiple certificates from a single file that contains a certificate chain received from a Certificate store. All certificates in the file must be in the PEM format, and the certificates must be arranged in the following order:
-
The last certificate in the file must be the client or server certificate issued by the CA.
-
All preceding certificates must be the root CA certificate plus any intermediate CA certificates in the signing chain for the issued certificate.
Importing a certificate chain is a two-step process:
-
Import the certificate chain file into the Trusted Certificate store in the Cisco ISE administration portal. This operation imports all certificates from the file except the last one into the Trusted Certificates store.
-
Import the certificate chain file using the Bind a CA-Signed Certificate operation. This operation imports the last certificate from the file as a local certificate.
Certificate-Signing Requests
For a CA to issue a signed certificate, you must create a certificate signing request and submit it to the CA.
The list of certificate-signing requests that you have created is available in the Certificate-Signing Requests window. Choose . To obtain signatures from a CA, you must export the certificate-signing request and then send the certificates to the CA. The CA signs and returns your certificates.
You can manage the certificates centrally from the Cisco ISE administration portal. You can create certificate-signing requests for all the nodes in your deployment and export them. Then, you should submit the certificate-signing requests to a CA, obtain the signed certificates from the CA, import the root and intermediary CA certificates given by the CA into the Trusted Certificates store, and bind the CA-signed certificates to the certificate-signing requests.
Create a Certificate-Signing Request and Submit it to a Certificate Authority
You can generate a certificate-signing request to obtain a CA-signed certificate for the nodes in your deployment. You can generate the certificate-signing request for a specific node in the deployment or for all the nodes in your deployment.
Procedure
Step 1 |
Choose . |
Step 2 |
Click Generate Certificate-Signing Requests (CSR) to generate the certificate-signing request. |
Step 3 |
Enter the values for generating a certificate-signing request. See Trusted Certificate Settings for information on each of the fields in the window displayed. |
Step 4 |
(Optional) Check the check box of the signing request that you want to download and and click Export to download the request. |
Step 5 |
Copy all the text from “-----BEGIN CERTIFICATE REQUEST-----” through “-----END CERTIFICATE REQUEST-----.” and paste the contents of the request in the certificate request of the chosen CA. |
Step 6 |
Download the signed certificate. Some CAs might email the signed certificate to you. The signed certificate is in the form of a .zip file that contains the newly issued certificate and the public signing certificates of the CA that you must add to the Cisco ISE trusted certificates store. The digitally-signed CA certificate, root CA certificate, and other intermediate CA certificate (if applicable) can be downloaded to the local system running your client browser. |
Bind a CA-Signed Certificate to a Certificate Signing Request
After the CA returns the digitally signed certificate, you must bind it to the certificate-signing request. You can perform the bind operation for all the nodes in your deployment, from the Cisco ISE administration portal.
Before you begin
-
You must have the digitally signed certificate, and the relevant root intermediate CA certificates sent by the CA.
-
Import the relevant root and intermediate CA certificates to the Trusted Certificates store ().
Procedure
Step 1 |
Choose . |
||
Step 2 |
Check the check box next to the certificate signing request you must bind with the CA-signed certificate. |
||
Step 3 |
Click Bind. |
||
Step 4 |
In the Bind CA Signed Certificate window displayed, click Browse to choose the CA-signed certificate. |
||
Step 5 |
Enter a value in the Friendly Name field. |
||
Step 6 |
Check the Validate Certificate Extensions check box if you want Cisco ISE to validate certificate extensions. If you enable the Validate Certificate Extensions option, and the certificate that you import contains a basic constraints extension with the CA flag set to True, ensure that the key usage extension is present, and that the keyEncipherment bit or the keyAgreement bit, or both, are also set.
|
||
Step 7 |
(Optional) Check the services for which this certificate will be used in the Usage area. Changing the Admin usage certificate on a primary PAN restarts the services on all the other nodes. The system restarts one node at a time, after the primary PAN restarts. |
||
Step 8 |
Click Submit to bind the certificate-signing request with the CA-signed certificate. If this certificate is marked for Cisco ISE internode communication usage, the application server on the Cisco ISE node restarts. Repeat this process to bind the certificate-signing request with the CA-signed certificate on the other nodes in the deployment. |
What to do next
Export a Certificate-Signing Request
Before you begin
To perform the following task, you must be a Super Admin or System Admin.
Procedure
Step 1 |
Choose . |
Step 2 |
Check the check box next to the certificates that you want to export, and click Export. |
Step 3 |
Click OK to save the file to the file system that is running the client browser. |
Step 4 |
The certificate-signing request is downloaded to your local file system. |
Set Up Certificates for Portal Use
With multiple PSNs in a deployment that can service a web portal request, Cisco ISE needs a unique identifier to identify the certificate that must be used for portal communication. When you add or import certificates that are designated for portal use, define a certificate group tag and associate it with the corresponding certificate on each node in your deployment. Associate this certificate group tag to the corresponding end-user portals (guest, sponsor, and personal devices portals). This certificate group tag is the unique identifier that helps Cisco ISE identify the certificate that must be used when communicating with each of these portals. You can only designate one certificate from each node for each of the portals.
![]() Note |
Cisco ISE presents the Portal certificate on TCP port 8443 (or the port that you have configured for portal use). |
Procedure
Step 1 |
Create a Certificate-Signing Request and Submit it to a Certificate Authority. You must choose a Certificate Group Tag that you have already defined or create a new one for the portal. For example, mydevicesportal. |
Step 2 | |
Step 3 |
Bind a CA-Signed Certificate to a Certificate Signing Request. |
Reassign Default Portal Certificate Group Tag to CA-Signed Certificate
By default, all Cisco ISE portals use the self-signed certificate. If you want to use a CA-signed certificate for portals, you can assign the default portal certificate group tag to a CA-signed certificate. You can use an existing CA-signed certificate or generate a CSR and obtain a new CA-signed certificate for portal use. You can reassign any portal group tag from one certificate to another.
![]() Note |
When you edit an existing certificate, if the portal tag (guest) that is associated with the certificate is already in use by any of the portals, then you cannot reassign the default portal certificate group tag or any other portal group tag to this certificate. The system displays the list of portals that use the "guest" portal tag. |
The following procedure describes how to reassign the default portal certificate group tag to a CA-signed certificate.
Procedure
Step 1 |
Choose .Hover the mouse over the i icon next to the Default Portal Certificate Group tag to view the list of portals that use this tag. You can also view the ISE nodes in the deployment that have portal certificates which are assigned this tag. |
Step 2 |
Check the check box next to the CA-signed certificate that you want to use for portals, and click Edit. Be sure to choose a CA-signed certificate that is not in use by any of the portals. |
Step 3 |
Under the Usage area, check the Portal check box and choose the Default Portal Certificate Group Tag. |
Step 4 |
Click Save. A warning message appears. |
Step 5 |
Click Yes to reassign the default portal certificate group tag to the CA-signed certificate. |
Associate Portal Certificate Tag Before You Register a Node
If you use the "Default Portal Certificate Group" tag for all the portals in your deployment, before you register a new ISE node, ensure that you import the relevant CA-signed certificate, choose "Portal" as a service, and associate the "Default Portal Certificate Group" tag with this certificate.
When you add a new node to a deployment, the default self-signed certificate is associated with the "Default Portal Certificate Group" tag and the portals are configured to use this tag.
After you register a new node, you cannot change the Certificate Group tag association. Therefore, before you register the node to the deployment, you must do the following:
Procedure
Step 1 |
Create a self-signed certificate, choose "Portal" as a service, and assign a different certificate group tag (for example, tempportaltag). |
||||||||
Step 2 |
Change the portal configuration to use the newly created certificate group tag (tempportaltag). |
||||||||
Step 3 |
Edit the default self-signed certificate and remove the Portal role. This option removes the Default Portal Certificate Group tag association with the default self-signed certificate. |
||||||||
Step 4 |
Do one of the following:
|
||||||||
Step 5 |
Register the ISE node to the deployment. |
User and Endpoint Certificate Renewal
By default, Cisco ISE rejects a request that comes from a device whose certificate has expired. However, you can change this default behavior and configure ISE to process such requests and prompt the user to renew the certificate.
If you choose to allow the user to renew the certificate, Cisco recommends that you configure an authorization policy rule which checks if the certificate has been renewed before processing the request any further. Processing a request from a device whose certificate has expired may pose a potential security threat. Hence, you must configure appropriate authorization profiles and rules to ensure that your organization’s security is not compromised.
Some devices allow you to renew the certificates before and after their expiry. But on Windows devices, you can renew the certificates only before it expires. Apple iOS, Mac OSX, and Android devices allow you to renew the certificates before or after their expiry.
Dictionary Attributes Used in Policy Conditions for Certificate Renewal
Cisco ISE certificate dictionary contains the following attributes that are used in policy conditions to allow a user to renew the certificate:
-
Days to Expiry: This attribute provides the number of days for which the certificate is valid. You can use this attribute to create a condition that can be used in authorization policy. This attribute can take a value from 0 to 15. A value of 0 indicates that the certificate has already expired. A value of 1 indicates that the certificate has less than 1 day before it expires.
-
Is Expired: This Boolean attribute indicates whether a certificate has expired or not. If you want to allow certificate renewal only when the certificate is near expiry and not after it has expired, use this attribute in authorization policy condition.
Authorization Policy Condition for Certificate Renewal
You can use the CertRenewalRequired simple condition (available by default) in authorization policy to ensure that a certificate (expired or about to expire) is renewed before Cisco ISE processes the request further.
CWA Redirect to a Renew Certificate
If a user certificate is revoked before its expiry, Cisco ISE checks the CRL published by the CA and rejects the authentication request. In case, if a revoked certificate has expired, the CA may not publish this certificate in its CRL. In this scenario, it is possible for Cisco ISE to renew a certificate that has been revoked. To avoid this, before you renew a certificate, ensure that the request gets redirected to Central Web Authentication (CWA) for a full authentication. You must create an authorization profile to redirect the user for CWA.
Configure Cisco ISE to Allow Users to a Renew Certificate
You must complete the tasks listed in this procedure to configure Cisco ISE to allow users to renew certificates.
Before you begin
Configure a limited access ACL on the WLC to redirect a CWA request.
Procedure
Step 1 | |
Step 2 | |
Step 3 | |
Step 4 |
Update the Allowed Protocol Configuration
Procedure
Step 1 |
Choose . |
Step 2 |
Check the Allow Authentication of expired certificates to allow certificate renewal in Authorization Policy check box under the EAP-TLS protocol and EAP-TLS inner methods for PEAP and EAP-FAST protocols. Requests that use the EAP-TLS protocol will go through the NSP flow. For PEAP and EAP-FAST protocols, you must manually configure Cisco AnyConnect for Cisco ISE to process the request. |
Step 3 |
Click Submit. |
What to do next
Create an Authorization Policy Profile for CWA Redirection
Before you begin
Ensure that you have configured a limited access ACL on the WLC.
Procedure
Step 1 |
Choose . |
Step 2 |
Click Add. |
Step 3 |
Enter a name for the authorization profile. For example, CertRenewal_CWA. |
Step 4 |
Check the Web Redirection (CWA, DRW, MDM, NSP, CPP) check box in the Common Tasks area. |
Step 5 |
Choose Centralized Web Auth from the drop-down list and the limited access ACL. |
Step 6 |
Check the Display Certificates Renewal Message check box. The URL-redirect attribute value changes and includes the number of days for which the certificate is valid. |
Step 7 |
Click Submit. |
![]() Note |
If you have configured the following Device Registration WebAuth (DRW) policies for wireless devices in Cisco ISE 1.2:
After upgrading to ISE 1.3 or above version, you must update the DRW-Allow policy condition as follows:
|
What to do next
Create an Authorization Policy Rule to Renew a Certificate
Before you begin
Ensure that you have created an authorization profile for central web authentication redirection.
Enable Policy Sets on
.Procedure
Step 1 |
Choose . |
Step 2 |
Click Create Above. |
Step 3 |
Enter a name for the new rule. |
Step 4 |
Choose the following simple condition and result: If CertRenewalRequired EQUALS True, then choose the authorization profile that you created earlier (CertRenewal_CWA) for the permission. |
Step 5 |
Click Save. |
What to do next
When you access the corporate network with a device whose certificate has expired, click Renew to reconfigure your device.
Enable BYOD Settings in Guest Portal
For a user to be able to renew a personal device certificate, you must enable the BYOD settings in the chosen guest portal.
Procedure
Step 1 |
Choose .
|
Step 2 |
From BYOD Settings, check the Allow employees to use personal devices on the network check box. |
Step 3 |
Click Save. |
Certificate Renewal Fails for Apple iOS Devices
When you use ISE to renew the endpoint certificates on Apple iOS devices, you might see a “Profiled Failed to Install” error message. This error message appears if the expiring or expired network profiles were signed by a different Admin HTTPS certificate than the one that is used in processing the renewal, either on the same Policy Service Node (PSN) or on another PSN.
As a workaround, use a multi-domain SSL certificate, which is commonly referred to as Unified Communications Certificate (UCC), or a wildcard certificate for Admin HTTPS on all PSNs in the deployment.