The device CA, a private CA that is provided by Catalyst Center, manages the certificates and keys that are used to establish and secure server-client connections. To change the role of the device CA from a root CA to a subordinate CA, complete this procedure.
You can change the role of the private (internal) Catalyst Center CA from a root CA to a subordinate CA using the Certificate Authority window in the GUI. When making this change:
-
If you want to have Catalyst Center act as a subordinate CA, ensure that you have a root CA, for example, Microsoft CA, and agree to use its certificate.
-
As long as the subordinate CA is not fully configured, Catalyst Center continues to operate as an internal root CA.
-
Generate a Certificate Signing Request file for Catalyst Center and ensure it is manually signed by your external root CA, as described in this procedure.
Note
Catalyst Center continues to run as an internal root CA during this time period.
-
After the Certificate Signing Request is signed by the external root CA, this signed file must be imported back into Catalyst Center using the GUI (as described in this procedure).
After the import, Catalyst Center initializes itself as the subordinate CA and provides all the existing functionalities of a subordinate CA.
-
When you switch a CA's role from root to subordinate, the old CA is retired and the new subordinate CA's PKI chain takes over. The revocation list is published by a CA, and after the CA is retired, revocation is moot since trust cannot be established. If your organization's policy mandates that unused certificates are revoked first, you can revoke the certificate from the GUI's Device Certificates window before switching the CA's role from root to subordinate.
Device controllability (enabled by default) will automatically update the device with a new certificate chain, sourced from the subordinate CA. New telemetry connections would only authenticate with this new certificate chain, which aligns with the trusted subordinate CA on the authenticator side.
-
The subordinate CA certificate lifetime displayed in the GUI is read directly from the certificate and is not calculated using the system time. Therefore, if you install a certificate with a lifespan of 1 year today and look at it in the GUI the same time next year, the GUI will still show that the certificate has a 1-year lifetime.
-
The subordinate CA certificate must be in one of these formats: .pem, .crt, .cer, .der.
-
The subordinate CA does not interact with the higher CAs; therefore, it is not aware of revocation, if any, of the certificates at a higher level. Because of this, any information about certificate revocation is also not communicated from the subordinate CA to the network devices. Because the subordinate CA does not have this information, all the network devices use only the subordinate CA as the CRL Distribution Points (CDP) source.
-
Consider that if you use EAP-Transport Level Security (EAP-TLS) authentication for AP profiles in Plug and Play (PnP), you cannot use a subordinate CA. You can only use a root CA.
Before you begin
You must have a copy of the root CA certificate.
Procedure
|
1. |
From the main menu, choose . |
|
2. |
Under CA Management, review the existing root or subordinate CA certificate configuration information: CA mode, certificate issuer, issued to, and lifetime value of the current certificate. |
|
3. |
To change from a root CA to a subordinate CA, click Enable SubCA Mode. |
|
4. |
Review the warnings that display:
For example,
-
Changing from root CA to subordinate CA is a process that cannot be reversed.
-
You must ensure that no network devices have been enrolled or issued a certificate in root CA mode. Revoke any devices enrolled in root CA mode before changing to subordinate CA.
-
Network devices must come online only after the subordinate CA configuration process finishes.
|
|
5. |
Click OK to proceed. |
|
6. |
Drag and drop your root CA certificate into the Import External Root CA Certificate Chain field and click Upload.
The root CA certificate is uploaded into Catalyst Center and used to generate a Certificate Signing Request.
After the upload process finishes, a Certificate Uploaded Successfully message is displayed.
|
|
7. |
Click Next.
Catalyst Center generates and displays the Certificate Signing Request.
|
|
8. |
View the Catalyst Center-generated Certificate Signing Request in the GUI and do one of these actions:
-
Click the Download link to download a local copy of the Certificate Signing Request file. You can then attach this Certificate Signing Request file to an email to send to your root CA.
-
Click the Copy to the Clipboard link to copy the Certificate Signing Request file's content. You can then paste this Certificate Signing Request content to an email or include it as an attachment to an email and send it to your root CA.
|
|
9. |
Send the Certificate Signing Request file to your root CA.
Your root CA will then return a subordinate CA file, which you must import back into Catalyst Center.
|
|
10. |
After receiving the subordinate CA file from your root CA, access the Catalyst Center GUI again and return to the Certificate Authority window. |
|
11. |
Click the CA Management tab. |
|
12. |
Click Yes for the Change CA mode button.
After clicking Yes, the GUI view with the Certificate Signing Request display.
|
|
13. |
Click Next.
The Certificate Authority window displays the Import SubCA Certificate field.
|
|
14. |
Drag and drop your subordinate CA certificate into the Import SubCA Certificate field and click Save.
The subordinate CA certificate is uploaded into Catalyst Center.
After the upload finishes, the GUI displays the subordinate CA mode under the CA Management tab.
|
|
15. |
Review the fields under the CA Management tab:
-
Sub CA Certificate: Displays the current subordinate CA certificate.
-
External Root CA Certificate: Displays the root CA certificate.
-
Sub CA Certificate Lifetime: Displays the lifetime value of the subordinate CA certificate.
-
Current CA Mode: Displays SubCA mode.
|