Configure Certificate-Based Device Authentication for Secure Access
For supported software information, click here.
Certificate-based SASE client device authentication uses digital certificates to authenticate users and devices or systems attempting to connect to the gateway. Certificate-based device authentication can be used in addition to other user authentication methods such as SAML or LDAP. You can install a client certificate for a device and use it to authenticate any user of the device.
Certificate-based device authentication provides the following benefits:
- Password dependence—Reduces the requirement for traditional passwords or tokens such as SSO.
- Enhanced security—Utilizes public key infrastructure (PKI) for secure and scalable authentication.
- User experience—Offers a seamless experience because users do not have to repeat password logins.
- Mutual authentication—Ensures that the client and server authenticate each other to strengthen overall security.
- Reduced risks—Minimizes password theft, phishing, and brute force attacks.
This article describes the configuration to authenticate approved endpoint devices using device certificates in authentication profiles.
Configure Certificate-Based Device Authentication
Certificate-based device authentication focuses on devices, which is ideal for environments where device trust is critical. It ensures that user connections are from approved or trusted corporate devices and prevents connections from unauthorized devices. Compared to certificate-based user authentication, certificate-based device authentication does not verify usernames and users can connect if device certificate authentication succeeds.
Integrating mobile device management (MDM) or Active Directory (AD) enables automatic certificate provisioning and automatic installation of connection settings. MDM or AD apply certificate profiles to ensure that certificate private keys are non-exportable by default, which is useful for BYOD users. MDM or AD can also verify leakage of certificate validity. For more information, see Configure SASE Unified Endpoint Management for Microsoft Intune, Configure SASE Unified Endpoint Management for Ivanti Neurons, and Configure User and Device Authentication.
To activate certificate-based device authentication, you do the following:
- Generate the root certificate authority (CA) key and certificate and the device certificate
- Upload the root CA to gateways from Concerto and verify that they are reflected in the associated devices.
- Configure a device certificate authentication profile by associating the profile with the root CA.
Generate the CA Key, CA Certificate, and Device Certificate
This section describes how to generate a root CA key, CA certificate, and device certificate using OpenSSL on any Linux system. You can create a certificate, get it signed by a CA, and then use it on a Concerto node.
You can skip the following steps if you have already generated the CA key, CA certificate, and device certificates, or if you use other methods to generate certificates.
To generate a root CA key and certificate:
- Generate the root CA key:
openssl genrsa -aes256 -out root-ca.key 4096
- Generate the CA certificate using the root CA key:
openssl req -new -x509 -sha256 -days 3650 -key root-ca.key -out root-ca-cert.pem
- To inspect and display the contents of a certificate file (in PEM format):
openssl x509 -noout -text -in root-ca-name.pem
To generate a device client certificate:
- Generate the private key for device certificate:
openssl genrsa -aes256 -out user-cert-name.key 4096
- Generate a certificate signing request (CSR) for the certificate:
openssl req -out user-csr-name.csr -newkey rsa:2048 -nodes -keyout user-cert-name.key -config user-cert-name.conf
- Sign the CSR with the root CA to issue a device certificate:
sudo openssl x509 -req -in user-cert-name.csr -CA root-ca-name.pem -CAkey rootca-key.key -out user-cert-name.crt -CAcreateserial -days 2865 -sha256 -extfile user-cert-name.conf -extensions 'usr_cert'
-
Convert the .crt file to a .pfx file (pasword-protected file) and bundle the device private key.
openssl pkcs12 -inkey user-cert-name.key -in user-cert-name.crt -export -out user-cert-name.pfx -passin pass:lab123 -passout pass:lab123
The following is an sample configuration file for device certificate. You can use any common name (CN), unlike in a user certificate.
[admin@SASE-GW2-Concerto: device-cert2] $ cat user1-cert.conf #authorityKeyIdentifier = keyid,issuer:always distinguished_name = req_distinguished_name req_extensions = v3_req x509_extensions = usr_cert prompt = no [ req_distinguished_name ] countryName = IN stateOrProvinceName = TN localityName = Chennai organizationName = Versa Networks commonName = user1-cert [ v3_req ] extendedKeyUsage = clientAuth, emailProtection basicConstraints = CA:FALSE keyUsage = critical, digitalSignature, keyEncipherment [ usr_cert ] basicConstraints = CA:FALSE nsCertType = client, email nsComment = "OpenSSL Generated Client Certificate" keyUsage = critical, digitalSignature, keyEncipherment extendedKeyUsage = clientAuth, emailProtection subjectKeyIdentifier = hash authorityKeyIdentifier = keyid,issuer
Upload Root CA Certificate
To upload the root CA certificate for a tenant:
- Go to Configure > Settings > Certificates.
- The Certificates screen displays all currently available certificates. For more information, see Configure SASE Certificates.

- Click + Add to add certificates. The Add CA Certificate popup window displays.

- Select CA Chain, and then enter a name for the certificate in the CA-Chain Name field.
- Click Upload File to upload the CA certificate file.
- Click Add.
Configure Device Authentication Profiles
When you configure a device certificate authentication profile, you associate the CA chain you uploaded in Upload Root CA Certificate, above.
To configure a device certificate authentication profile:
- Go to Configure > Security Service Edge > User and Device Authentication > Profiles. The User and Device Authentication Profiles screen displays.

- To create a new profile, click + Add.

- Select Device Certificate Based, and then click Get Started. The Add Device Certificate Authentication Profile screen displays.

- Select step 1, Settings.
- In the Client CA Chain field, select the root CA certificate you uploaded in Upload Root CA Certificate.
- In the Username Identifying Field in Certificate field, select Subject common-name.
- Click Next to go to step 2, Authentication Order.

- Click the Device Authentication Enabled toggle to enable device authentication.
- For "Select which profile would you like to authentication first?", select Device Authentication to use this device authentication profile first for authentication. For more information, see Configure User and Device Authentication Profiles.
- Click Next to go to step 3, Review & Submit.
- Click Save to create the authentication profile.
Install the Device Certificate on the Client Device
To install the .pfx file that you generated in Generate Root CA and Device Certificates on the device with SASE client:
- In the Run command, type MMC to open the Microsoft Management Console.
- In the Console screen, select File > Add/Remove Snap In.

- In the Add or Remove Snap-ins window, click Certificates and then Add.

- In the Certificates snap-in window, select Computer account, and then click Next.
- In the Select Computer window, select Local Computer, and then click Finish. The following screen displays with Certificates (Local Computer) under Console Root.

- To import and install the .pfx certificate file:
- Go to Console Root\Certificates (Local Computer)\Personal\Certificates.
- Right-click on the right side of the window and select All Tasks > Import. For example:

- To ensure that a user has access to private keys assigned at the device level, click on the device certificate and select More Actions > All Tasks > Manage Private Keys.

The following window displays:

- Assign permissions for the user, as needed.
- Click OK.
Authenticate Users on SASE Client
When a user connects to the SASE client gateway, if certificate-based device authentication is the first method in the authentication order, the following window displays:

If the certificate authentication is successful, users proceed to the corresponding SAML or SSO authentication.

Verification on the Gateways
Supported Software Information
Releases 12.1.1 and later support all content described in this article.
Additional Information
Configure SASE Certificates
Configure User and Device Authentication
