Skip to main content

FortiWeb

SecTrail CM enables automatic deployment and renewal of SSL certificates by establishing agentless connections to Fortinet FortiWeb Web Application Firewall (WAF) devices.

Connection Requirements​

RequirementDetailDescription
ProtocolREST API (HTTPS)FortiWeb's native REST API is used
Port443Standard HTTPS port or custom management port
AuthenticationBasic AuthenticationAuthentication via Username and Password
User PermissionAdministrator or Certificate ManagerCertificate upload and configuration permission

Automated Operations​

SecTrail CM automatically performs the following operations on FortiWeb:

  1. Certificate and Key Upload: Secure transfer of SSL certificate and private key
  2. Certificate Chain Creation: Creating chain with Intermediate CA certificates
  3. Server Policy Update: Updating certificate references in server policy
  4. SNI Members Update: SNI-based certificate assignments
  5. Configuration Apply: Activating the configuration

Configuration Steps​

1. Creating FortiWeb User​

Navigate to Automation > Device Users and create a user for FortiWeb.

2. Adding FortiWeb Device to SecTrail CM​

Click Automation > Devices > Add New Device button and enter the following information:

FortiWeb Device Creation

  • Name: Provide a descriptive name for the device
  • Device Users: Select the user created in Step 1
  • IP: Enter the management IP address of the FortiWeb device
  • Device Type: Select FortiWeb from the dropdown menu
  • Cert Upload Only: Should only certificate be uploaded? (Disabled/Enabled)
Automatic Discovery

After the FortiWeb device is added to SecTrail CM, the IP addresses and ports of all Server Policies and SNIs defined on the device are automatically included in the discovery period and scanned regularly.

3. Viewing Device Information​

After the device is added, it will be displayed in the Automation > Devices list. Click on the row to view device details:

FortiWeb Device Details and Server Policy List

  • Server Policy: Server Policy names defined on the FortiWeb device
  • Type: Shows policy type (Server-Policy or SNI)
  • SNI: Server Name Indication name (for SNI types)
  • Domain Name: Associated domain name of the SNI profile
  • Address: IP address and port of the virtual server
  • Common Name: Common Name value of the certificate
  • Not After: Certificate expiration date
  • Deploy: For certificate deployment

Certificate Deployment​

Step 1: Server Policy and Certificate Selection​

  1. Select your FortiWeb device from Automation > Devices
  2. In the device details, find the Server Policy or SNI where you want to deploy the certificate
  3. Click the Deploy button on the relevant row
  4. In the Deploy Certificate window that opens:
    • Server Policy/SNI: Target policy information is displayed
    • Certificate: Select the certificate you want to deploy from the dropdown menu

Certificate Deployment Screen

Step 2: Starting the Deployment Process​

Click the Deploy button to start the certificate deployment process.

Step 3: Process Tracking​

The deployment process can be tracked from Automation > Processes:

FortiWeb Server Policy Deployment

Operation Details​

The following steps are performed during deployment:

StepOperation Description
1Certificate file is uploaded to the device
2Certificate chain is created
3Intermediate CA group is created
4Chain certificate is added to CA group
5Server policy is updated with new certificate
Server Policy Operations

FortiWeb integration supports Server Policy-based certificate updates. During deployment, the certificate reference in the relevant server policy is automatically updated.

SNI (Server Name Indication) Management​

FortiWeb supports SNI-based certificate management. SNI deployment operations:

FortiWeb SNI Deployment

SNI Operation Details​

StepOperation Description
1Certificate file is uploaded to the device
2Certificate chain is created
3Intermediate CA group is created
4Chain certificate is added to CA group
5SNI member certificate is updated
SNI Override Operations

In SNI member updates, existing certificate references are overridden with the new certificate. This simplifies domain-based certificate management.

Rollback Operation​

The Manual Rollback feature can be used in case of issues after certificate deployment.

Automatic Rollback

If an error occurs at any step during the deployment process, the system automatically performs a rollback and all changes are reverted.

Rollback Steps​

  1. Navigate to Automation > Processes
  2. Find the operation you want to rollback
  3. Use the Manual-Rollback option in the Status column
  4. Confirm

Operations During Rollback​

StepServer Policy RollbackSNI Rollback
1Server policy is reverted to old certificateSNI member is reverted to old certificate
2Chain certificate is removed from CA groupChain certificate is removed from CA group
3Uploaded chain certificate is deletedUploaded chain certificate is deleted
4Uploaded certificate is deletedUploaded certificate is deleted