An organization is setting up a ClearPass server for their network authentication. The administrator has installed a certificate issued by an internal Certificate Authority. The clients cannot fully validate the server's certificate. What additional step must the administrator take to ensure the clients can successfully validate the certificate?
Certificate trust is hierarchical. For a client device to trust a server certificate, it must trust the Root CA that signed it. If an internal CA is used, its root certificate is not present in the default trust stores of consumer devices. Therefore, the administrator must deploy that root certificate to every client (typically via GPO, MDM, or Onboard) so they can successfully verify the identity of the ClearPass server during the EAP handshake.
Currently there are no comments in this discussion, be the first to comment!