Certificates
This section contains topics about uploading certificates and provides examples of how certificates may be used to encrypt and decrypt communications, and represent the identity of the FortiGate. This sections assumes that you have a high level understanding of the public key infrastructure (PKI) system, particularly how entities leverage trusted certificate authorities (CAs) to verify the authenticating party, and how public and private certificate keys work to secure communications.
The certificates feature is hidden by default in FortiOS. In the GUI, go to System > Feature Visibility and enable Certificates.
|
Type |
How to generate/import certificate |
FortiGate Use Examples |
Private Key1 |
|---|---|---|---|
|
Local Certificate |
Client certificates: Server certificates: |
Yes |
|
|
File Upload |
|
No |
|
|
Local CA (and sub-CA) |
Online SCEP, File Upload |
Multiple Clients Connecting to Multiple Servers
|
Yes |
|
Online SCEP, File Upload |
Enable FortiGate to trust certificates signed by the remote CA. Example uses:
|
No |
1Certificates with a private key are uploaded in the following common formats:
-
Certificate and private key in one file (PKCS #12)
-
.PFX
-
-
Certificate and private key in separate files
-
Certificate: .CER, .DER
-
Key: .PEM
-
-
When using Certificate Signing Request (CSR), the private key remains on the FortiGate and the signed CSR is returned to the FortiGate to complete the cert+key pair.
-
.CER
See Import a certificate for more details.
-
For additional capabilities and enhanced certificate management, please review the FortiAuthenticator Administration Guide and Examples. FortiManager can integrate with FortiAuthenticator to provide large scale FortiGate certificate deployment and management; see FortiManager Examples.
The following topics provide information about certificates:
The following topics provide examples of how to use certificates:
- Administrative access using certificates
- Configuring certificates for SAML SSO
- Creating certificates with XCA
- FortiClient troubleshooting
- Microsoft CA deep packet inspection
- Procuring and importing a signed SSL certificate
- Protecting an SSL server
- Site-to-site VPN with digital certificate
- SSL VPN with certificate authentication
- SSL VPN with LDAP-integrated certificate authentication
- Using the default certificate for HTTPS administrative access