cisco-ise.md 1.8 KB


title: Cisco Identity Services Engine (ISE) breadcrumbs:

  • title: Networking --- {% include header.md %}

I keep most of my Cisco notes elsewhere, sorry.

Certificate Administration

  • Certificate types:
    • System certs: Per node.
    • Trusted certs: CA certs used to trust leaf certs for various uses. Replicated to all nodes.
    • Issued certs: Certs issued by ISE. E.g. for endpoints, ISE messaging and pxGrid services.
  • System certs:
    • Leaf certs for ISE nodes and node-associated services. E.g. for admin page, EAP, RADIUS-DTLS, portals, SAML, pxGrid etc.
    • Configured for each node, but certs may for certain services be shared by all nodes if configured properly.
    • May use a single cert for all services or different for all. However, certain services like pxGrid and SAML should have separate certs.
    • pxGrid cert requires both server auth and client auth usages enabled, should therefore use separate cert.
    • The admin cert is used for admin web UI, admin web API, communication between ISE nodes and communication between ISE nodes and external services.
    • Most (all?) system certs should be public CA signed since many of the services are web-based.
    • Changing admin cert causes the ISE node to restart.
  • Trusted certs:
    • CA certs used to trust leaf certs for various uses.
    • Replicated to all nodes.
    • When adding new system certs, the upper CA cert should be added as trusted for appropriate services.
    • When adding new nodes with self-signed certs, their certs are automatically added to trusted certs to allow for trusted communication. This does not happen if a cert signed by a trusted cert is already present on the new node.
  • Issued certs:
    • Should use a CA cert signed by a corporate or public CA. (Why not a private CA?) Uses a self-signed CA cert by default.

{% include footer.md %}