FortiPAM
FortiPAM allows you to protect, isolate and secure privileged account credentials, manage and control privileged user access, and monitor and record privileged account activity.
Sheikh
Staff
Staff
Article Id 290889
Description This article describes how to add an HTTPS certificate in FortiPAM for administrative access.
Scope

Any supported version of FortiPAM.

Solution

This article will use the following Fortinet products:

 

FortiPAM: Firmware version 1.1.2 

FortiAuthenticator: Firmware version 6.5.2 (Fortiauthenticator will be used to sign CSR generated on FortiPAM. This can be replaced with any other PKI environment (E.g. Microsoft Certificate Server or any other Internal or External).

 

  • Logon to FortiPAM -> System -> Certificates -> Expand Create/Import -> Generate CSR.

 

CSR generation - 1.png

 

  • Here, IP is used in ID Type, but a Domain Name can be used as well.

 

CSR Information.png

 

  • After filling the required information, select OK to create a CSR request.
  • Once the CSR is generated, double-click on it and download the CSR. This file will be sent to the CA, which will sign it and a certificate will be generated. The certificate will be imported to FortiPAM later.
  • Log in to FortiAuthenticator and expand Certificate management -> End Entities -> Users -> On the right hand side, select Import.

 

FAC -Import CSR.png

 

FAC -CSR information.png

 

  • After filling in the required information, select Import

 

Certificate Export from FAC.png

 

  • Once the certificate is ready, select the recently created certificate and select 'Export Certificate'. This will download a certificate, which will then be imported in FortiPAM.
  • Next, login to FortiPAM and expand System -> Certificates. Check that the Status of CSR 'FortiPAM_HTTPS' still shows 'Pending', because the certificate is not yet imported in FortiPAM. 

 

Certificate import- FortiPAM.png

 

  • Select Create/Import and select Certificate.

 

FortiPAM Import Certificate.png

 

Select Certificate and click Create.png

 

  • Select the certificate recently downloaded from FortiAuthenticator, then select Create and select OK to finalize the import of the certificate. 

 

Certificate Valid and Imported.png

 

  • The certificate will import successfully, but it will not yet have been assigned. Log in to the FortiPAM CLI and run 'config system global'.

 

Set Certificate - admin access.png

      

After changing the admin-server-cert, the change also needs to be completed on the VIP:

 

config firewall vip

edit "fortipam_vip"

set uuid b1040....

set type access-proxy
set extip 10.191.x.x
set extintf "port1"
set server-type https
set extport 443
ssl-certificate "FortiPAM_HTTPS"

next

end

 

  • Now, the certificate will be added in to FortiPAM. The next step will be to import the CA certificate in FortiPAM. Here, the FortiAuthenticator CA certificate is being added. Add the CA certificate which signs this FortiPAM certificate.

 

Note: If there are multiple CAs in environment, e.g. Root CA -> Intermediate CAs, all of the CAs must be imported in FortiPAM and also on the client machine. From there, open GUI access to FortiPAM. In short: the CA chain must be completed on both FortiPAM as well as on the client machine, as it will otherwise lead to certificate errors in browsers.

 

  • The subject must contain the address the end station is able to resolve.
  • Google Chrome and Microsoft Edge use a built-in Windows certificate store while Mozilla Firefox has its own certificate store.
  • Next, export the RootCA certificate from FortiAuthenticator and then import it into FortiPAM.

 

Export CA certificate - FAC.png

 

  • Next, go to FortiPAM and expand System -> Certificates. On the right hand side, select Create/Import and select CA Certificate. Select File and upload the add Root CA certificate. This will add the Root CA under the 'Remote CA Certificate' list

 

Import Root CA file.png

 

RootCA Added.png

 

  • As the certificate is imported now, check the certificate status by opening a GUI console from Google Chrome.

 

Certificate Check in Chrome.png

 

Note: The 'RootCA' certificate must be trusted by the client machine. It has to be imported to the Trusted Root certificate authority store of the browser or Operating System.

 

Related articles:

Technical Tip: TLS and the use of Digital Certificates.

Certificates - FortiPAM Administration Guide.