Certificate Renewal on Cisco Identity Services Engine Configuration Guide

Similar documents
Managing Certificates

Manage Certificates. Certificates Overview

Certificate Management in Cisco ISE-PIC

Managing Security Certificates in Cisco Unified Operating System

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Manage Certificates. Certificate Management in Cisco ISE. Certificates Enable Cisco ISE to Provide Secure Access

Comprehensive Setup Guide for TLS on ESA

Configuring SSL. SSL Overview CHAPTER

Using SSL to Secure Client/Server Connections

vcenter Support Assistant User's Guide

vcenter Support Assistant User's Guide

Creating and Installing SSL Certificates (for Stealthwatch System v6.10)

Configuring SSL CHAPTER

Configuring SSL. SSL Overview CHAPTER

Configure HTTPS Support for ISE SCEP Integration

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at

Create Decryption Policies to Control HTTPS Traffic

UCS Manager Communication Services

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Integrate the Cisco Identity Services Engine

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

Managing External Identity Sources

IceWarp SSL Certificate Process

SAPO Trust Centre: Certificate Installation on Exchange Manual

SAML-Based SSO Configuration

The information in this document is based on these software and hardware versions:

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)

Scenarios for Setting Up SSL Certificates for View. Modified for Horizon VMware Horizon 7 7.3

System Administration

RealPresence Access Director System Administrator s Guide

Scenarios for Setting Up SSL Certificates for View. VMware Horizon 6 6.0

CHAPTER. Introduction

Configuring the VPN Client 3.x to Get a Digital Certificate

Secure IIS Web Server with SSL

Certificates for Live Data

CSM - How to install Third-Party SSL Certificates for GUI access

AXIS Device Manager HTTPS certificate management

Cisco Secure ACS for Windows v3.2 With PEAP MS CHAPv2 Machine Authentication

Managing Certificates

VMware AirWatch Integration with RSA PKI Guide

Secure ACS for Windows v3.2 With EAP TLS Machine Authentication

Security Certificate Configuration for XMPP Federation

Set Up Certificate Validation

VMware Skyline Collector User Guide. VMware Skyline 1.4

Installing and Configuring vrealize Code Stream. 28 JULY 2017 vrealize Code Stream 2.3

Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Administrator's Guide

CLI users are not listed on the Cisco Prime Collaboration User Management page.

Installation and Configuration

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Administering the CAM

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server

App Orchestration 2.6

Set Up Cisco ISE in a Distributed Environment

System Configuration. The following topics explain how to configure system configuration settings on Firepower Management Centers and managed devices:

Backup and Restore Operations

Cisco CTL Client Setup

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Security Digital Certificate Manager

Sophos Mobile as a Service

Best Practices for Security Certificates w/ Connect

Managing vrealize Automation. vrealize Automation 7.2

eroaming platform Secure Connection Guide

Failover Configuration Bomgar Privileged Access

Configuring Cisco Unified MeetingPlace Web Conferencing Security Features

User Identity Sources

High Level View of Certificates and Authorities in CUCM

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Set Up Cisco ISE in a Distributed Environment

Secure Web Appliance. SSL Intercept

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

VMware Horizon JMP Server Installation and Setup Guide. Modified on 19 JUN 2018 VMware Horizon 7 7.5

Certificates for Live Data Standalone

Installing and Configuring vrealize Code Stream

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Privileged Remote Access Failover Configuration

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients

Sophos Mobile SaaS startup guide. Product version: 7.1

VMware Horizon JMP Server Installation and Setup Guide. 13 DEC 2018 VMware Horizon 7 7.7

IBM. Security Digital Certificate Manager. IBM i 7.1

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Configuring Failover

Failover Dynamics and Options with BeyondTrust 3. Methods to Configure Failover Between BeyondTrust Appliances 4

Workspace ONE UEM Certificate Authority Integration with JCCH. VMware Workspace ONE UEM 1810

Administrator's Guide

Configuring the Cisco VPN 3000 Concentrator 4.7.x to Get a Digital Certificate and a SSL Certificate

Backup and Restore Operations

Installation and Configuration. vrealize Code Stream 2.1

Configuring Cisco TelePresence Manager

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

LDAP Directory Integration

Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 Appliances

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

VMware AirWatch Integration with SecureAuth PKI Guide

Unified Communication Cluster Setup with CA Signed Multi Server Subject Alternate Name Configuration Example

SECURE Gateway v4.7. TLS configuration guide

Administrator's Guide

Administrator's Guide

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP

Transcription:

Certificate Renewal on Cisco Identity Services Engine Configuration Guide Document ID: 116977 Contributed by Roger Nobel, Cisco TAC Engineer. Jun 26, 2015 Contents Introduction Prerequisites Requirements Components Used Background Information Configure View ISE Self Signed Certificates Determine When to Change the Certificate Generate Certificate Signing Request Install Certificate Configure Alerting System Verify Verify Alerting System Verify Certificate Change Verify Certificate Troubleshoot Conclusion Introduction This document describes best practices and proactive procedures to renew certificates on the Cisco Identity Services Engine (ISE). It also reviews how to set up alarms and notifications so administrators are warned of upcoming events such as certificate expiration. Note: This document is not intended to be a troubleshooting guide for certificates. Prerequisites Requirements Cisco recommends that you have knowledge of these topics: X509 certificates Configuration of a Cisco ISE with certificates Components Used The information in this document is based on these software and hardware versions: Cisco ISE Release 1.2.0.899

Appliance or VMware Background Information As an ISE administrator, you will eventually encounter the fact that ISE certificates expire. If your ISE server has an expired certificate, serious problems might arise unless you replace the expired certificate with a new, valid certificate. Note: If the certificate that is used for the Extensible Authentication Protocol (EAP) expires, all authentications might fail because clients do not trust the ISE certificate anymore. If the HTTPS protocol certificate expires, the risk is even greater: an administrator might not be able to log in to the ISE anymore, and the distributed deployment might cease to function and replicate. In this example, the ISE has an installed certificate from a Certificate Authority (CA) server that will expire in one month. The ISE administrator should install a new, valid certificate on the ISE before the old certificate expires. This proactive approach prevents or minimizes downtime and avoids an impact on your end users. Once the time period of the newly installed certificate begins, you can enable the EAP and/or HTTPS protocol on the new certificate. You can configure the ISE so that it generates alarms and notifies the administrator to install new certificates before the old certificates expire. Note: This document uses HTTPS with a self signed certificate in order to demonstrate the impact of certificate renewal, but this approach is not recommended for a live system. It is better to use a CA certificate for both the EAP and HTTPS protocols. Configure View ISE Self Signed Certificates When the ISE is installed, it generates a self signed certificate. The self signed certificate is used for administration access and for communication within the distributed deployment (HTTPS) as well as for user authentication (EAP). In a live system, use a CA certificate instead of a self signed certificate. Tip: Refer to the Certificate Management in Cisco ISE section of the Cisco Identity Services Engine Hardware Installation Guide, Release 1.2 for additional information. The format for an ISE certificate must be Privacy Enhanced Mail (PEM) or Distinguished Encoding Rules (DER). In order to view the initial self signed certificate, navigate to Administration > System> Certificates > Local Certificates in the ISE console: If you install a server certificate on the ISE via a Certificate Signing Request (CSR) and change the certificate for the HTTPS or EAP protocol, the self signed server certificate is still present but is no longer used.

Caution: For HTTPS protocol changes, a restart of the ISE services is required, which creates a few minutes of downtime. EAP protocol changes do not trigger a restart of the ISE services and do not cause downtime. Determine When to Change the Certificate Assume that the installed certificate expires soon. Is it better to let the certificate expire before you renew it or to change the certificate before expiration? You should change the certificate before expiration so that you have time to plan the certificate swap and to manage any downtime caused by the swap. When should you change the certificate? Obtain a new certificate with a start date that precedes the expiration date of the old certificate. The time period between those two dates is the change window. Caution: If you enable HTTPS, it causes a service restart on the ISE server, and you experience a few minutes of downtime. This image depicts the information for a certificate that is issued by a CA and expires on 29 Nov 2013: Generate Certificate Signing Request This procedure describes how to renew the certificate through a CSR: 1. In the ISE console, navigate to Add > Generate Certificate Signing Request. 2. The minimum information that you must enter in the Certificate Subject text field is CN=ISEfqdn, where ISEfqdn is the Fully Qualified Domain Name (FQDN) of the ISE. Add additional fields such as O (Organization), OU (Organizational Unit), or C (Country) in the Certificate Subject with the use of commas: 3. One of the Subject Alternative Name (SAN) text field lines must repeat the ISE FQDN. You can add a second SAN field if you want to use alternative names or a wildcard certificate. 4. A popup window indicates whether the CSR fields are completed correctly:

5. In order to export the CSR, click Certificate Signing Requests in the left panel, select your CSR, and click Export: 6. The CSR is saved on your computer. Submit it to your CA for signature. Install Certificate Once you receive the final certificate from your CA, you must add the certificate to the ISE: 1. In the ISE console, click Local Certificates in the left panel, then click Add and Bind CA signed Certificate: 2. Enter a simple, clear description of the certificate in the Friendly Name text field: Note: Do not enable the EAP or HTTPS protocol at this time.

3. Because you are installing the new certificate before the old one expires, you see an error that reports a date range in the future (23 Nov 2013 in this example). 4. Click Yes in order to continue. The certificate is now installed but not in use, as highlighted in green. The overlap between the expiration date and valid date is highlighted in yellow: Note: If you use self signed certificates in a distributed deployment, the primary self signed certificate must be installed into the trusted certificate store of the secondary ISE server. Likewise, the secondary self signed certificate must be installed into the trusted certificate store of the primary ISE server. This allows the ISE servers to mutually authenticate each other. Without this, the deployment might break. If you renew certificates from a third party CA, verify whether the root certificate chain has changed and update the trusted certificate store in the ISE accordingly. In both scenarios, ensure that the ISE nodes, endpoint operating

systems, and supplicants are able to validate the root certificate chain. Configure Alerting System The Cisco ISE notifies you when the expiration date of a local certificate is within 90 days. Such advance notification helps you avoid expired certificates, plan the certificate change, and prevent or minimize downtime. The notification appears in several ways: Color expiration status icons appear in the Local Certificates page. Expiration messages appear in the Cisco ISE System Diagnostic report. Expiration alarms are generated at 90 days and 60 days, then daily in the final 30 days before expiration. Configure the ISE for email notification of expiration alarms. In the ISE console, navigate to Administration > System > Settings > SMTP Server, identify the Simple Mail Transfer Protocol (SMTP) server, and define the other server settings so that email notifications are sent for the alarms: There are two ways that you can set up notifications: Use Admin Access in order to notify administrators: 1. Navigate to Administration > System > Admin Access > Administrators > Admin Users. 2. Check the Include system alarms in emails checkbox for the Admin Users that need to receive alarm notifications. The email address for the sender of the alarm notifications is hardcoded as ise@hostname.

Configure the ISE alarm settings in order to notify users: 1. Navigate to Administration > System > Settings > Alarm Settings > Alarm Configuration: Note: Disable the Status for a category if you wish to prevent alarms from that category. 2. Click Alarm Notification, enter the email addresses of the users to be notified, and save the configuration change. Changes might take up to 15 minutes before they are active.

Verify Use this section in order to confirm that your configuration works properly. Verify Alerting System Verify that the alerting system works correctly. In this example, a configuration change generates an alert with a severity level of Information. (An Information alarm is the lowest severity, while certificate expirations generate a higher severity level of Warning.) This is an example of the email alarm that is sent by the ISE:

Note: In this example, the ISE sends the email alarm message twice to iseadmin@wlaaan.ch, as highlighted in yellow. This email address was set up to receive notifications by both methods explained in Configure Alerting System. Verify Certificate Change This procedure describes how to verify that the certificate is installed correctly and how to change the protocols for EAP and/or HTTPS: 1. On the ISE console, navigate to Administration > Certificates > Local Certificates, and select the new certificate in order to view the details. Caution: If you enable the HTTPS protocol, the ISE service restarts, which causes server downtime.

In this example, assume that HTTPS restarts the ISE service. 2. In order to verify the certificate status on the ISE server, enter this command into the CLI: CLI:> show application status ise 3. Once all of the services are active, attempt to log in as an administrator. 4. For a distributed deployment scenario, navigate to Administration > System > Deployment > Node Status on the ISE console, and verify the node status. 5. Check that the end user authentication is successful. On the ISE console, navigate to Operations > Authentications, and review the certificate for Protected Extensible Authentication Protocol (PEAP)/EAP Transport Layer Security (TLS) authentication. Verify Certificate If you want to check the certificate externally, you can use the embedded Microsoft Windows tools or the OpenSSL toolkit. OpenSSL is an open source implementation of the Secure Sockets Layer (SSL) protocol. If the certificates use your own private CA, you must place your root CA certificate on a local machine and use the OpenSSL option CApath. If you have an intermediate CA, you must place it into the same directory as well. In order to obtain general information about the certificate and verify it, use: openssl x509 in certificate.pem noout text openssl verify certificate.pem It might also be useful to convert the certificates with the OpenSSL toolkit:

openssl x509 in certificate.der inform DER outform PEM out certificate.pem Troubleshoot There is currently no specific troubleshooting information available for this configuration. Conclusion Because you can install a new certificate on the ISE before it is active, Cisco recommends that you install the new certificate before the old certificate expires. This overlap period between the old certificate expiration date and the new certificate start date gives you time to renew certificates and plan their installation with little or no downtime. Once the new certificate enters its valid date range, enable the EAP and/or HTTPS protocol. Remember, if you enable HTTPS, there will be a service restart. Updated: Jun 26, 2015 Document ID: 116977