Fortinet white logo
Fortinet white logo

Step 1: Determine FortiNAC Certificate Targets to Secure

Step 1: Determine FortiNAC Certificate Targets to Secure

SSL certificates can be installed in one or more Certificate Targets in FortiNAC. Determine use cases so the appropriate certificates can be acquired. Different certificates can be installed for different targets. Not all targets may be used.

Refer to the Deployment Guide (Create and Install SSL Certificates) for details on specific use cases.

SSL Certificates can be issued from the following Certificate Authorities (CA):

  • Corporate Owned Internal CA (Internal)

    • Certificates issued from within the organization. You may act as your own Certificate Authority (CA) and use your own internal certificate, as long as all systems in your domain use the same certificate.

    • Certificate types: Individual & SAN (Subject Alternative Name)*

  • Third party public (External)

    • Certificates issued from Certificate Authorities like GoDaddy, DigiCert, GlobalSign, etc.

    • Certificate types: Individual, SAN* & Wildcard

* SAN certificates can be used to secure multiple host names and/or IP addresses. For example, in a Layer 2 HA environment the virtual, Primary, and Secondary appliance host names and their corresponding IP addresses can all be secured with one certificate.

Certificate Target

Function

Certificate to Use

Admin UI

Access to the FortiNAC UI

(https://<FortiNAC FQDN>:8443/)

Internal or External

Persistent Agent

Persistent Agent communication

Internal (Recommended) or External

Portal

Captive Portal access and Dissolvable Agent communication

External

Local RADIUS Server (EAP)

For use when FortiNAC is acting as the 802.1x EAP termination point.

Internal or External (avoid wildcard certificates)

RADIUS Endpoint Trust

Client-side certificate validation (EAP-TLS)

Internal or External (avoid wildcard certificates)

Step 1: Determine FortiNAC Certificate Targets to Secure

Step 1: Determine FortiNAC Certificate Targets to Secure

SSL certificates can be installed in one or more Certificate Targets in FortiNAC. Determine use cases so the appropriate certificates can be acquired. Different certificates can be installed for different targets. Not all targets may be used.

Refer to the Deployment Guide (Create and Install SSL Certificates) for details on specific use cases.

SSL Certificates can be issued from the following Certificate Authorities (CA):

  • Corporate Owned Internal CA (Internal)

    • Certificates issued from within the organization. You may act as your own Certificate Authority (CA) and use your own internal certificate, as long as all systems in your domain use the same certificate.

    • Certificate types: Individual & SAN (Subject Alternative Name)*

  • Third party public (External)

    • Certificates issued from Certificate Authorities like GoDaddy, DigiCert, GlobalSign, etc.

    • Certificate types: Individual, SAN* & Wildcard

* SAN certificates can be used to secure multiple host names and/or IP addresses. For example, in a Layer 2 HA environment the virtual, Primary, and Secondary appliance host names and their corresponding IP addresses can all be secured with one certificate.

Certificate Target

Function

Certificate to Use

Admin UI

Access to the FortiNAC UI

(https://<FortiNAC FQDN>:8443/)

Internal or External

Persistent Agent

Persistent Agent communication

Internal (Recommended) or External

Portal

Captive Portal access and Dissolvable Agent communication

External

Local RADIUS Server (EAP)

For use when FortiNAC is acting as the 802.1x EAP termination point.

Internal or External (avoid wildcard certificates)

RADIUS Endpoint Trust

Client-side certificate validation (EAP-TLS)

Internal or External (avoid wildcard certificates)