Applies To:
Show Versions
SSL Certificate Management
Supported certificate/key types
The BIG-IP® system supports multiple cipher suites when offloading SSL operations from a target server on the network. The BIG-IP system can support cipher suites that use these algorithms:
- Rivest Shamir Adleman (RSA)
- Elliptic Curve Digital Signature Algorithm (ECDSA)
- Digital Signature Algorithm (DSA)
When you generate a certificate request or a self-signed certificate, you specify the type of private key, which determines the specific signing or encryption algorithm that is used to generate the private key.
About RSA certificates
RSA (Rivest Shamir Adleman) is the original encryption algorithm that is based on the concept of a public and a private key. When a public site attempts to communicate with a device such as the BIG-IP® system, the device sends the site a public key that the site uses to encrypt data before sending that data back to the device. The device uses its private key associated with the public key to decrypt the data. Only the private key can be used to decrypt data encrypted with the public key.
The RSA encryption algorithm includes an authentication mechanism.
About DSA certificates
DSA (Digital Signature Algorithm) uses a different algorithm for signing key exchange messages than that of RSA. DSA is paired with a key exchange method such as Diffie-Hellman or Elliptical Curve Diffie-Hellman to achieve a comparable level of security to RSA. Because DSA is generally endorsed by federal agencies, specifying a DSA key type makes it easier to comply with new government standards, such as those for specific key lengths.
About ECDSA certificates
When creating certificates on the BIG-IP system, you can create a certificate with a key type of ECDSA (Elliptic Curve Digital Signature Algorithm). An ECDSA key is based on Elliptic Curve Cryptography (ECC), and provides better security and performance with significantly shorter key lengths.
Encryption based on ECC is ideally suited for mobile devices that cannot store large keys.
For example, an RSA key size of 2048 bits is equivalent to an ECC key size of only 224 bits. As a result, less computing power is required, resulting in faster, more secure connections. The BIG-IP system supports the eilliptic curves prime256v1, secp384r1, and secp521r1.
About SSL certificate management
You can obtain a certificate for the BIG-IP system by using the BIG-IP® Configuration utility to generate a certificate signing request (CSR) that can then be submitted to a third-party trusted certificate authority (CA). The CA then issues a signed certificate.
In addition to requesting CA-signed certificates, you can create self-signed certificates. You create self-signed certificates primarily for testing purposes within an organization.
When you install the BIG-IP software, the application includes a default self-signed certificate. The BIG-IP system also includes a default CA bundle certificate. This certificate bundle contains certificates from most of the well-known CAs.
Creating a self-signed certificate that contains an ECDSA key type
You can use this task to create a self-signed certificate with an ECDSA key type. The certificate is used to authenticate and secure either client-side or server-side HTTP traffic.
Requesting a CA-signed certificate that contains an ECDSA key type
Creating a FIPS-type self-signed certificate
You can use this task to create a self-signed certificate to authenticate and secure either client-side or server-side HTTP traffic.
Requesting a FIPS-type CA-signed certificate
Use this task to create a request for a certificate with FIPS type security from a certificate authority.
Converting a key to FIPS format
About SSL file import
You can import several types of SSL files onto the BIG-IP system.
Importing a certificate signed by a certificate authority
Importing an SSL key
Importing a PKCS-formatted file
Importing a PKCS-formatted file with SM2 license
You are now ready to create a SM2 cihper rule and cipher group to use when creating a customer Client SSL profile that supports SM2. See the Create a custom Client SSL profile that supports SM2 section in this guide for detailed steps.
Importing an archive file
Exporting an SSL certificate
Exporting an SSL certificate to another device with an SM2 license
Viewing a list of certificates on the system
You can perform this task to view a list of existing digital certificates on the BIG-IP system.
Viewing a list of SM2 certificates on the system
Digital SSL certificate properties
From the BIG-IP Configuration utility, you can see the properties of the SSL digital certificates you have installed on the BIG-IP system.
Property | Description |
---|---|
Certificate | The name of the certificate. |
Content | The type of certificate content, for example, Certificate Bundle or Certificate and Key. |
Common name | The common name (CN) for the certificate. The common name embedded in the certificate is used for name-based authentication. The default common name for a self-signed certificate is localhost.localdomain. |
Expiration date | The date that the certificate expires. If the certificate is a bundle, this information shows the range of expiration dates that apply to certificates in the bundle. |
Organization | The organization name for the certificate. The organization name embedded in the certificate is used for name-based authentication. The default organization for a self-signed certificate is MyCompany. |
About certificate bundle management
You can use the bundle manager to automatically update and install certificate authority (CA) bundles on the system from two sources: local certificate file objects and remote URL resources. By using the Include Bundles and Include URLs options, you can combine CA certificates from various sources to create a new, customized CA bundle. You can also use the Exclude Bundles and Exclude URLs options to remove certain CA certificates from the resulting CA bundle file. The newly created or modified CA bundle file is installed as a certificate-file-object on the system and used as a trusted CA bundle by other modules.
In addition, you can set the update frequency of the CA bundle, or use a web proxy for downloading the remote URL resources. By default, a newly created CA bundle manager does not create or update the managed CA bundle object. Exceptions are if the CA bundle manager has a positive update interval or is explicitly told to do so since you have set the Update Now option.
Creating a new certificate bundle
You can create a new certificate authority (CA) bundle, and specify bundles and URLs to include or exclude. You can also set the update frequency of the CA bundle, or use a web proxy for downloading the remote URL resources.
Modifying an existing certificate bundle
You can use the bundle manager to modify an existing certificate authority (CA) bundle.
Deleting an existing certificate bundle
About certificate order management
The BIG-IP system supports a unified interface for F5 customers to manage Certificate Authority (CA) certificate operations within the BIG-IP. Currently, F5 supports Certificate Authorities Comodo (now known as Sectigo) and Symantec (purchased by Digicert) by automating certificate management with trusted certificate authorities. You can generate, renew, and revoke certificates as necessary after setting up general properties, authentication details, certificate authority request order information, and internal proxy connection details.
A CA request is made up of multiple pieces of information from both the Certificate Order Manager and the Certificate Signing Request (CSR). This information is combined in the API request sent to the vendor. For example, the Certificate Order Manager object maintains information about contacting the CA, including authentication information and URI. It also maintains information about the type of certificate product being purchased from the vendor. The CSR, created during the certificate key creation in TMOS, maintains information about the specific host, or hosts, that the certificate is intended to cover (such as their common name, email address, and other information). With this information combined in the API request and sent to the vendor, it allows you to configure one certificate order for multiple certificates that use common certificate types and durations.
Generating a new certificate order (Comodo)
- Before setting up the CA order, you must first do one of the following:
- Setup a DNS responder in the system. Note: This does not apply to the DNS setup done during the system setup wizard.
- Setup and configure a proxy server pool in your system's environment.
- Make sure you have an account with the CA that is being setup for API access.
To generate a new Comodo certificate order, use the following steps.
Comodo is now known as Sectigo. For Comodo certificate manager tool and account information, see the official Sectigo web site. Make sure to read the Sectigo documentation and refer to it as necessary to understand their requirements, APIs, and other information that will help you complete the new certificate order information fields. In this documentation, and in the BIG-IP UI, F5 refers to Comodo as the CA name.
- a new SSL certificate
- check certificate request status
- renew a certificate
-
revoke a certificate.
Generating a new certificate order (Symantec)
- Before setting up the CA order, you must first do one of the following:
- Setup a DNS responder in the system. Note: This does not apply to the DNS setup done during the system setup wizard.
- Setup and configure a proxy server pool in your system's environment.
- Make sure you have an account with the CA that is being setup for API access.
To generate a new Symantec certificate order, use the following steps.
Symantec is now known as Digicert (after Digicert purchased Symantec). In this documentation, and in the BIG-IP UI, F5 refers to Symantec as the CA name. For Symantec certificate manager tool and account information, see the official Symantec (or Digicert as needed) web site. Digicert currently maintains Symantec’s API for Symantec’s customers. However, existing Digicert customers will not be able to use the Symantec APIs. In this documentation, and in the BIG-IP UI, F5 refers to Symantec as the CA name.
- a new SSL certificate
- check certificate request status
- renew a certificate
-
revoke a certificate.
Creating a new SSL certificate and key
Renewing an existing SSL certificate and key
Revoking an existing SSL certificate and key
Modifying an existing certificate order manager
- On the Main tab, click . The Certificate Order Manager List screen opens.
- Click the Name of the certificate you want to modify.
- Modify necessary fields and click Update.
Deleting an existing certificate order manager
- On the Main tab, click . The Certificate Order Manager List screen opens.
- Select the check box next to the Name of the certificate you want to delete.
- Click Delete.