Skip to main content
Version: 2.7.0 (Current)

FortiManager

SecTrail CM enables automatic deployment and renewal of SSL certificates to all managed FortiGate devices by establishing agentless connections to the FortiManager central management platform.

Connection Requirements​

RequirementDetailDescription
ProtocolREST API (HTTPS)FortiManager's native REST API is used
Port443Standard HTTPS port or custom management port
AuthenticationUsername and PasswordAuthentication via Username and Password
User PermissionAdmin or Certificate Manager roleCertificate upload and configuration permission

Automated Operations​

SecTrail CM automatically performs the following operations on FortiManager:

  1. Certificate and Key Upload: Secure transfer of SSL certificate and private key to ADOM local store
  2. Certificate Import: Distributing certificate and key to managed devices via FortiManager
  3. SSL Profile Update: Updating SSL inspection profiles
  4. Policy Install: Installing updated policies to target devices
  5. Configuration Commit: Committing workspace and making configuration persistent

Configuration Steps​

1. Creating FortiManager User​

Navigate to Automation > Device Users and create a user for FortiManager.

2. Adding FortiManager Device to SecTrail CM​

Click Automation > Devices > Add New Device button and enter the following information:

FortiManager Device Creation

  • Name: Provide a descriptive name for the device
  • Device Users: Select the user created in Step 1
  • IP: Enter the FortiManager management IP address or hostname
  • Device Type: Select FortiManager from the dropdown menu
  • Deployment Type: Select deployment type
    • Generative - Append: Creates a new SSL profile, adds the new certificate to it, and associates it with matching policies
    • Generative - Replace: Creates a new SSL profile, replaces the certificate within it, and associates it with matching policies
    • Override - Append: Adds the new certificate to the existing SSL profile
    • Override - Replace: Removes the current certificate from the existing SSL profile and adds the new one
  • Install Policy: Should updated policies be installed to devices? (Disabled/Enabled)
  • Install Bypass Validation: Should validation be bypassed during policy installation? (Disabled/Enabled)
  • ADOM: FortiManager ADOM name (e.g. root)
  • Filter SSL Profile: FortiManager SSL profile filter name (optional)
  • Execution Server: Server to use for executing deployment operations
Automatic Discovery and Monitoring

After the FortiManager device is added to SecTrail CM, all certificates on devices managed by FortiManager are automatically included in the discovery period and scanned regularly. Automatic alarms are created for certificates that are about to expire or have issues.

3. Viewing Device Information​

After the device is added, it will be displayed in the Automation > Devices list. Click on the row to view device details:

FortiManager Device Details

  • Firewall Policy: Name of the firewall policy associated with the certificate
  • Policy Package: Policy package the rule belongs to
  • Installation Targets: Target FortiGate devices the policy will be installed to
  • SSL Profile: SSL inspection profile name associated with the certificate
  • Dynamic Local Certificate: Dynamic local certificate mappings on managed devices
  • Common Name: Common Name (CN) information of the certificate
  • Not After: Certificate expiration date
  • Deploy: For certificate deployment

Certificate Deployment​

Step 1: Virtual Server and Certificate Selection​

  1. Select your FortiManager device from Automation > Devices
  2. In the device details, find the policy where you want to deploy the certificate
  3. Click the Deploy button on the relevant row
  4. In the Deploy Certificate window that opens:
    • Virtual Servers: Target virtual server information is displayed (SSL Profile / Installation Targets / Common Name format)
    • Deploy Type: Displays the configured deployment type (e.g. Generative-Append)
    • Certificate: Select the certificate you want to deploy from the dropdown menu

Certificate Deployment Screen

Step 2: Starting the Deployment Process​

Click the Deploy button to start the certificate deployment process.

Step 3: Process Tracking​

The deployment process can be tracked from Automation > Processes:

FortiManager Deployment Operations

Operation Details​

The following steps are performed during deployment:

StepOperation Description
1Workspace mode is enabled, ADOM is locked
2Certificate uploaded to ADOM local store
3Certificate distributed to managed devices
4Dynamic Certificate Object created in ADOM
5Dynamic Certificate Mapping assigned to devices
6SSL profile fetched and cloned
7SSL Profile payload prepared and applied
8Firewall policies updated to use new profile
9ADOM workspace committed and policy installed
10ADOM workspace unlocked successfully
Commit

SecTrail CM locks the ADOM workspace before deployment, commits all changes after the operation is complete, and unlocks the workspace. If Install Policy is enabled, the updated policy is also pushed to the target FortiGate devices.

Rollback Operation​

The Manual Rollback feature can be used in case of issues after certificate deployment.

Automatic Rollback

If an error occurs at any step during the deployment process, the system automatically performs a rollback and all changes are reverted.

Rollback Steps​

  1. Navigate to Automation > Processes
  2. Find the operation you want to rollback
  3. Use the Manual-Rollback option in the Status column
  4. Confirm

Operations During Rollback​

FortiManager Rollback Operations

StepOperation
1Workspace mode is enabled, ADOM is locked
2SSL profiles fetched from ADOM
3Firewall policies reverted to base profile
4SSL Profile deleted successfully
5Dynamic mappings deleted from managed devices
6Dynamic Certificate Object deleted
7Certificate deleted from ADOM and device databases
8ADOM workspace committed successfully
9ADOM workspace unlocked successfully