We are currently using publicly signed certificates for our eduroam access
on a cluster of 2 ClearPass servers.

We are in a situation where one of our certs will be expiring in October of
this year, while the other is good until June of next year.

The certificate are issued through InCommon, and when I renewed our
expiring certificate, I noticed that it is showing that is has a root of
Sectigo, where it was previously Comodo.  The certificate that is not
expiring has a root CA of Comodo.

This leads me to the following questions:
1.  Is it advisable to run certificates with different Root CAs on
different members of our ClearPass cluster?  Would we expect to see client
issues?
2.  If it's not a problem to do this, can I simply add the Root CA for
Sectigo to our eduroam CAT configuration, or is there only one Root CA
allowed?

Any other advice is appreciated.  I understand that most institutions are
moving to privately issued certificates in order to get control of these
certificate chain issues, but we haven't quite gotten there yet.  Our plan
to properly onboard clients is to use an SSID with a captive portal to
direct them to the eduroam CAT download.

Thanks,

Jonathan Miller
Senior Network Analyst
Franklin and Marshall College

**********
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community

Reply via email to