| Description | This article describes how to use the additional functionality of an EST server for certificate renewal. |
| Scope | FortiGate. |
| Solution |
By default, EST uses old keys for certificate renewal, unlike other auth protocols on FortiGate.
For example. Old cert:
FGVM04TM23009067 (mycert-a1) # get Name: X509v3 Key Usage Name: X509v3 Subject Key Identifier Name: X509v3 Authority Key Identifier
Name: X509v3 Key Usage Name: X509v3 Subject Key Identifier Name: X509v3 Authority Key Identifier
The Subject Key Identifier did not change, meaning the old key was used in the CSR. At times, some users may implement the CA server in such a way that it does not accept the old key and will return the old certificate.
To accommodate this, starting from v7.4.6, customers can regenerate a new key to get a new certificate from the EST server. This can be specified in the configuration on the FortiGate: dictate whether to use the old key or a new key each time it contacts the CA server to renew the certificate.
config vpn certificate local
Refer to this document for the configuration of Secure Transport for automatic certificate management on FortiGate: Enrollment over Secure Transport (EST) |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.