FortiWeb
A FortiWeb can be configured to join a Security Fabric through the root or downstream FortiGate.
kmak
Staff
Staff
Article Id 268199
Description This article describes how to enable Client Certificate Verification in the FortiWeb Server Policy.
Scope FortiWeb.
Solution

Prerequisite:

  • FortiWeb Server Policy enabled HTTPS Protocol Service.
  • CA and User Certificate generated from the local device.

 

  1. Log into FortiWeb GUI and navigate to Server Objects -> Certificates -> CA.     

kmak_0-1691639967684.jpeg

 

  1. Import the CA root cert generated from the local server which is used to sign the users’ certificate.

    kmak_1-1691639967689.jpeg

     

  2. The imported CA cert is shown on the page:

    kmak_2-1691639967693.jpeg

     

  3. Then navigate to the CA Group tab and create a new CA Group.

    kmak_3-1691639967698.jpeg

     

  4. Select the imported CA into the CA Group member.

    kmak_4-1691639967700.jpeg

     

  5. Go to the Certificate Verify page and create a new Certificate Verify group.

    kmak_5-1691639967703.jpeg

     

  6. Select the created CA Group in the Certificate Verify group.

    kmak_6-1691639967705.jpeg

     

  7. Go to the Server Policy and edit the policy that is required to be enabled with the Client-side certificate verification. Select the Advanced SSL settings and the dropdown menu of Certificate Verification for HTTPS, and select the created Certificate Verify group. Then, save the policy settings.

    kmak_7-1691639967710.jpeg

     

  8. The Server Policy is now enabled with Client-side certificate verification. Now ensure that the client’s device has imported the user certificate signed by the CA cert.

    kmak_8-1691639967714.jpeg

     

  9. Try to browse the webpage protected by the server policy. The page shall prompt with the client’s SSL certificate selection. Select the correct certificate to browse the page.

    kmak_9-1691639967717.jpeg

     

Related document:

How to apply PKI client authentication (personal certificates)