It sounds like you're making solid progress in setting up EAP authentication, but you may indeed have a mismatch in certificate configuration. Let's address your specific queries:
- Should you have used the "Subordinate Certification Authority" template?
No, the "Subordinate Certification Authority" template is used when creating a certificate for a subordinate CA, not for server authentication purposes. For EAP authentication, the correct certificate template is typically based on the Server Authentication purpose.
The template you should use for ISE in this context is:
- Web Server or RADIUS Server, depending on your CA configuration.
- Ensure the template includes the Server Authentication purpose (OID:
1.3.6.1.5.5.7.3.1
).
If your CA does not have a specific RADIUS template, you can customize the Web Server template to meet your needs.
- How can you create an intermediate certificate on Windows Server 2019 CA?
An intermediate certificate isn't strictly necessary for your current setup unless your organization's certificate hierarchy requires it. If your CA issues certificates directly (i.e., it acts as a root CA), intermediate certificates wouldn't typically come into play. However, here’s how to create an intermediate CA if needed:
Steps to create an intermediate certificate:
Prepare a new server for the intermediate CA (if applicable).
- Install the AD Certificate Services role on the intermediate CA server.
- Choose "Certificate Authority" and configure it as a Subordinate CA during setup.
- During the CA installation, generate a CSR for the subordinate CA. - Submit the CSR to the root CA using the "Subordinate Certification Authority" template. **Issue the intermediate certificate:** - On the root CA, approve the CSR and issue a certificate using the subordinate CA template. - Export the issued certificate and import it into the intermediate CA during its setup. **Publish the Intermediate CA certificate:** - Publish the intermediate certificate in your environment's **Trusted Certificates** store and ensure it is included in your certificate chain.
Alternative Approach:
If you are not explicitly setting up a CA hierarchy, your immediate issue may not require creating a separate intermediate CA. Instead, focus on ensuring the certificate chain for ISE is complete.
- How to resolve the missing intermediate certificate issue?
To ensure proper EAP authentication, the full certificate chain (Root CA → Intermediate CA(s) → ISE Server Certificate) must be trusted by the clients and devices in your environment. If there is a missing intermediate certificate:
Steps to Verify and Resolve:
Check the Certificate Chain:
- Open the ISE server certificate in a tool like Windows Certificate Manager or OpenSSL and examine the chain.
- Ensure the intermediate certificates are present and correctly link to the root CA.
- On your Windows CA server, export the intermediate certificates from the CA console. This is typically found under: - **Certification Authority → Issued Certificates** or - **Certificate Templates → [Template Name]**. - Save the intermediate certificate in Base-64 or DER format. **Import into ISE Trusted Certificates:** - Go to **Administration → Certificates → Trusted Certificates** in Cisco ISE. - Import the intermediate certificate(s) to ensure the ISE server certificate chain is complete. **Test Client Trust:** - Ensure client devices trust the Root CA and Intermediate CA certificates. Deploy them through Group Policy, MDM, or other trust-distribution mechanisms.
Summary of Correct Configuration:
- Certificate Template for ISE: Use a Web Server or RADIUS Server template with the Server Authentication purpose.
- Certificate Chain: Ensure the ISE certificate chain includes all necessary intermediate certificates and the Root CA.
- Clients: Ensure all devices that connect to Wi-Fi trust the Root and Intermediate CA certificates.
Let me know if you need more details or assistance with any of these steps!