Certificate Question: 802.1x Authentication of iPad to Cisco Meraki WiFi

I am using a Cisco Meraki MR34 and I have an SSID setup for 802.1x with RADIUS authentication.  When a Windows host on the domain attaches to that domain - badaboom the device is on the network.  Great.  Now if I want my iPad to attach to that network I get prompted for AD user ID and password.  MS NPS RADIUS accepts my password and a certificate comes to the iPad from the domain controller - here MITYDC1.
Works pretty well.  BUT I am trying to see if the DC is keeping track of this certificate that it has issued and I am not seeing it.  I am looking in Console Root/Certificates(Local Computer) and all the branches below Certificates(Local Computer) but not seeing it there.  Is this information stored elsewhere?  Or perhaps I am just missing it in my search?  My longer goal would be to be able to revoke this certificate on demand if I wanted in the future.  Any thoughts appreciated.

+ System

  - Provider

   [ Name]  Microsoft-Windows-Security-Auditing
   [ Guid]  {54849625-5478-4994-3e3b0328c30d}
 
   EventID 6278
 
   Version 0
 
   Level 0
 
   Task 12552
 
   Opcode 0
 
   Keywords 0x8020000000000000
 
  - TimeCreated

   [ SystemTime]  2014-03-03T19:54:26.270Z
 
   EventRecordID 462586891
 
   Correlation
 
  - Execution

   [ ProcessID]  616
   [ ThreadID]  4500
 
   Channel Security
 
   Computer MITYDC1.MCAT.LOCAL
 
   Security
 

- EventData

  SubjectUserSid S-1-5-21-2244651681-2909242435-3723-4534
  SubjectUserName sclemmens
  SubjectDomainName MCAT
  FullyQualifiedSubjectUserName MCAT.LOCAL/IT Test/Samuel Clemmens
  SubjectMachineSID S-1-0-0
  SubjectMachineName -
  FullyQualifiedSubjectMachineName -
  MachineInventory -
  CalledStationID 02-18-4A-A3-5F-E0:mcatwifi
  CallingStationID 38-48-4C-E3-3C-6F
  NASIPv4Address 10.10.32.14
  NASIPv6Address -
  NASIdentifier -
  NASPortType Wireless - IEEE 802.11  
  NASPort 0
  ClientName sfo-cmr34-02
  ClientIPAddress 10.10.32.14
  ProxyPolicyName Use Windows authentication for all users
  NetworkPolicyName Wireless PEAP
  AuthenticationProvider Windows  
  AuthenticationServer MITYDC1.MCAT.LOCAL
  AuthenticationType PEAP
  EAPType Microsoft: Secured password (EAP-MSCHAP v2)
  AccountSessionIdentifier -
  QuarantineState Full Access  
  ExtendedQuarantineState -
  QuarantineSessionID -
  QuarantineHelpURL -
  QuarantineSystemHealthResult -
LVL 2
amigan_99Network EngineerAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Cliff GaliherCommented:
It is not issuing any certificate. It is only sending its own certificate for identification purposes.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
amigan_99Network EngineerAuthor Commented:
That helps a lot - thank you.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Windows Server 2008

From novice to tech pro — start learning today.