Deploy Client Certificates to the GlobalProtect Satellites
As an alternative method for deploying client certificates to satellites, you can configure your GlobalProtect portal to act as a Simple Certificate Enrollment Protocol (SCEP) client to a SCEP server in your enterprise PKI. SCEP operation is dynamic in that the enterprise PKI generates a certificate when the portal requests it and sends the certificate to the portal.
When the satellite device requests a connection to the portal or gateway, it also includes its serial number with the connection request. The portal submits a CSR to the SCEP server using the settings in the SCEP profile and automatically includes the serial number of the device in the subject of the client certificate. After receiving the client certificate from the enterprise PKI, the portal transparently deploys the client certificate to the satellite device. The satellite device then presents the client certificate to the portal or gateway for authentication.
- Create a SCEP profile.
- Selectand thenDeviceCertificate ManagementSCEPAdda new profile.
- Enter aNameto identify the SCEP profile.
- If this profile is for a firewall with multiple virtual systems capability, select a virtual system orSharedas theLocationwhere the profile is available.
- (Optional) To make the SCEP-based certificate generation more secure, configure a SCEP challenge-response mechanism between the PKI and portal for each certificate request.After you configure this mechanism, its operation is invisible, and no further input from you is necessary.To comply with the U.S. Federal Information Processing Standard (FIPS), use aDynamicSCEP challenge and specify aServer URLthat uses HTTPS (see Step 7).Select one of the following options:
- None—(Default) The SCEP server does not challenge the portal before it issues a certificate.
- Fixed—Obtain the enrollment challenge password from the SCEP server (for example,http://10.200.101.1/CertSrv/mscep_admin/) in the PKI infrastructure and then copy or enter the password into the Password field.
- Dynamic—Enter the SCEPServer URLwhere the portal-client submits these credentials (for example,http://10.200.101.1/CertSrv/mscep_admin/), and a username and OTP of your choice. The username and password can be the credentials of the PKI administrator.
- Specify the settings for the connection between the SCEP server and the portal to enable the portal to request and receive client certificates.To identify the satellite, the portal automatically includes the device serial number in the CSR request to the SCEP server. Because the SCEP profile requires a value in theSubjectfield, you can leave the default$USERNAMEtoken even though the value is not used in client certificates for LSVPN.
- Configure theServer URLthat the portal uses to reach the SCEP server in the PKI (for example,http://10.200.101.1/certsrv/mscep/).
- Enter a string (up to 255 characters in length) in theCA-IDENT Namefield to identify the SCEP server.
- Select theSubject Alternative Name Type:
- RFC 822 Name—Enter the email name in a certificate’s subject or Subject Alternative Name extension.
- DNS Name—Enter the DNS name used to evaluate certificates.
- Uniform Resource Identifier—Enter the name of the resource from which the client will obtain the certificate.
- None—Do not specify attributes for the certificate.
- (Optional) Configure cryptographic settings for the certificate.
- Select the key length (Number of Bits) for the certificate. If the firewall is in FIPS-CC mode and the key generation algorithm is RSA. The RSA keys must be 2048 bits or larger.
- Select theDigest for CSRwhich indicates the digest algorithm for the certificate signing request (CSR): SHA1, SHA256, SHA384, or SHA512.
- (Optional) Configure the permitted uses of the certificate, either for signing or encryption.
- To use this certificate for signing, select theUse as digital signaturecheck box. This enables the endpoint use the private key in the certificate to validate a digital signature.
- To use this certificate for encryption, select theUse for key enciphermentcheck box. This enables the client use the private key in the certificate to encrypt data exchanged over the HTTPS connection established with the certificates issued by the SCEP server.
- (Optional) To ensure that the portal is connecting to the correct SCEP server, enter theCA Certificate Fingerprint. Obtain this fingerprint from the SCEP server interface in the Thumbprint field.
- Enter the URL for the SCEP server’s administrative UI (for example,http://<hostname or IP>/CertSrv/mscep_admin/).
- Copy the thumbprint and enter it in theCA Certificate Fingerprintfield.
- Enable mutual SSL authentication between the SCEP server and the GlobalProtect portal. This is required to comply with the U.S. Federal Information Processing Standard (FIPS).FIPS-CC operation is indicated on the firewall login page and in its status bar.Select the SCEP server’s rootCA Certificate. Optionally, you can enable mutual SSL authentication between the SCEP server and the GlobalProtect portal by selecting aClient Certificate.
- Save and commit the configuration.
The portal attempts to request a CA certificate using the settings in the SCEP profile and saves it to the firewall hosting the portal. If successful, the CA certificate is shown in.DeviceCertificate ManagementCertificates
- ClickOKto save the settings and close the SCEP configuration.
- Committhe configuration.
- (Optional) If after saving the SCEP profile, the portal fails to obtain the certificate, you can manually generate a certificate signing request (CSR) from the portal.
- Selectand then clickDeviceCertificate ManagementCertificatesDevice CertificatesGenerate.
- Enter aCertificate Name. This name cannot contain spaces.
- Select theSCEP Profileto use to submit a CSR to your enterprise PKI.
- ClickOKto submit the request and generate the certificate.
Deploy User-Specific Client Certificates for Authentication
Deploy User-Specific Client Certificates for Authentication To authenticate individual users, you must issue a unique client certificate to each GlobalProtect user and deploy the client ...
Deploy Server Certificates to the GlobalProtect Components
Deploy Server Certificates to the GlobalProtect Components The following table shows the best practice steps for deploying SSL/TLS certificates to the GlobalProtect components: Import a ...
Device > Certificate Management > SCEP
Device > Certificate Management > SCEP The simple certificate enrollment protocol (SCEP) provides a mechanism for issuing a unique certificate to endpoints, gateways, and satellite ...
Change a Client Certificate
Change a Client Certificate Complete the following task to replace a client certificate. Obtain or generate the device certificate. You can deploy certificates on Panorama ...
Manage Firewall and Panorama Certificates
Manage Firewall and Panorama Certificates Device > Certificate Management > Certificates > Device Certificates Panorama > Certificate Management > Certificates Select Device Certificate Management Certificates ...
Communication Settings Panorama > Managed Collectors > Communication To configure custom certificate-based authentication between Log Collectors and Panorama, firewalls, and other Log Collectors, configure the ...
Enable Two-Factor Authentication Using Certificate and Authentication Profiles
Enable Two-Factor Authentication Using Certificate and Authentication Profiles The following workflow describes how to configure GlobalProtect client authentication requiring the user to authenticate both to ...
GlobalProtect Certificate Best Practices
GlobalProtect Certificate Best Practices The following table summarizes the SSL/TLS certificates you will need, depending on which features you plan to use: Certificate Usage Issuing ...
Configure Authentication Using Custom Certificates on Managed Devices
Configure Authentication Using Custom Certificates on Managed Devices Complete the following procedure to configure the client side (firewall or Log Collector) to use custom certificates ...