Configuring a Third party certificate on the controller.
RELATED PRODUCTS: controller
RELATED SOFTWARE VERSIONS: N/A
KEYWORDS: controller, third party, certificate
CONFIGURATION STEPS:
Step 1: Click on Configuration > Certificate Management > Server Certificates > Click on the ADD button.
Step 2: Under “Certificate Add” fill in the following fields
Step 3: Under Distinguished Name(DN), enter the following fields
Step 4: Now export/save the CSR file as alias_name.csr in the desktop.
Step 5: Send this CSR file to the third party CA (any) and request for a standard SSL certificate. In the certificate, the server option can be either “Standard SSL” or “others”
Step 6: The certificates we receive from the third party CA are filename.cer (Server certificate) and filename.p7b (Trusted chain root certificate).
Step 7: Click on Configuration>Certificate Management>Trusted Root CA and import the third party Root certificate which is of .p7b format.
Step 8: Click on the Configuration>Certificate Management>Server Certificate>Pending CSR button > Highlight alias_name.csr click on import and then browse for the server certificate file which is of .cer format.
Step 9: Once you choose it, you will have an option to choose “Used by” which is for captive portal or Web GUI. Hold control key and click on both options to enable the certificate to use both.
NOTE :
1. Certificate implementation is available only from 3.5 code onwards.
2. Only a standard SSL certificate is supported, not Wildcard certificates.
3. Ensure the trust root certificate is of .p7b format; it would be a chain.
4. The following screenshot shows the chain and the intermediate certificate. If an Intermediate certificate is required for trusted root CA, then it needs to be imported as well.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.