O'Reilly logo

Cisco ISE for BYOD and Secure Unified Access, 2nd Edition by Jamey Heary, Aaron Woland

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix D The ISE CA and How Cert-Based Auth Works

This appendix provides a primer on certificate-based authentications as described by Aaron Woland.

I find a few universal truths when mentioning certificates to IT professionals. Almost without fail, most people I speak with consider certificates and public key cryptography (PKI) to be a very secure concept. However, upon mentioning to someone that I want to talk about certificates or PKI, that person’s face turns a slightly lighter shade, their eyes get a bit wider, and they have this immediate fight-or-flight instinct kick in.

This is a subject that does not have to be scary; there are just a few misunderstandings. One example of a common misunderstanding is the notion that a certificate is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required