EST protocol for automated certificate provisioning
Enrollment over Secure Transport (EST) is a digital certificate provisioning protocol that
-
enhances security by using TLS for secure communication, and
-
automates the renewal of certificates to minimize manual intervention.
Feature Name |
Release Information |
Feature Description |
---|---|---|
EST protocol for automated certificate provisioning |
Release 25.1.1 |
Introduced in this release on: Fixed Systems (8200 [ASIC: Q200, P100], 8700 [ASIC: P100, K100]); Centralized Systems (8600 [ASIC:Q200]) ; Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) This release introduces support for Enrollment over Secure Transport (EST), a digital certificate provisioning protocol, which enhances certificate management by offering secure transport using TLS and designated certificate requestors. It enables automated certificate renewal. EST is an enhancement of the existing Simple Certificate Enrollment Protocol (SCEP), providing improved security and flexibility for certificate management operations over both IPv4 and IPv6 networks. The feature introduces these changes: CLI:
YANG Data Model:
(see GitHub, YANG Data Models Navigator) |
EST protocol—key features and benefits
These are the key features and benefits of the EST protocol:
-
Secure transport—EST utilizes TLS to ensure that all messages and certificates are securely transmitted without the need for additional encapsulation.
-
Designated certificate requestors—With EST, the certificate signing request (CSR) can be associated with a specific trusted requestor that is authenticated with TLS.
-
Automated certificate renewal—The protocol supports automatic re-enrollment, facilitating seamless renewal of certificates.
EST protocol—key components and related terminologies
Understand key components and terms related to the EST protocol:
-
Certificate Management Protocol (CMP)—A protocol with comprehensive management capabilities for managing digital certificates, including their enrollment, renewal, and revocation.
-
Certificate signing request (CSR)—A message sent by the client to the CA to request a digital certificate. It includes the client's public key and identifying information.
-
PKCS 7—A standard used for cryptographic message syntax, which is employed by SCEP to encapsulate messages.
-
Public Key Infrastructure (PKI)—The framework that manages digital certificates and keys, essential for certificate provisioning operations using the EST protocol.
-
Simple Certificate Enrollment Protocol (SCEP)—An older protocol used for certificate provisioning that relies on HTTP and PKCS 7 for securing messages and lacks some of the modern security features of EST.
Client authentication options in the EST protocol
-
TLS certificate-based authentication (mTLS)—Requires the client to have a valid certificate chain signed by a CA in the EST server trust store so that server can verify the client during mutual TLS (mTLS) authentication. The bootstrap certificate is used only during the first enrollment and can be onboarded using existing methods like SCEP. For re-enrollment, the certificate issued during the initial enrollment is used in the mTLS handshake.
-
HTTP-based authentication—Used when a bootstrap certificate is not available for initial enrollment. After establishing a TLS session, the EST client sends HTTP authentication details. The HTTP-based authentication method uses Type6 encryption to secure passwords configured on the router, preventing unauthorized access. Type6 encryption is disabled by default and must be enabled. Additionally, a master key must be created, which is securely stored in TAM. This authentication method involves sending a username and clear text password through the TLS-protected channel, ensuring password security via encryption.
Guidelines and limitations for configuring the EST protocol
Supported key types
-
In IOS-XR release 25.1.1, only RSA keys are supported for signing the Certificate Signing Request (CSR) during enrollment; ECDSA keys are not.
Client authentication methods
-
The EST client supports both TLS certificate-based authentication and HTTP-based authentication. Cisco recommends using TLS certificate-based authentication as per RFC 7030, even though both methods are available.
TLS validation and authentication requirements
-
If client or server certificate validation fails during the TLS handshake, EST enrollment fails. No fallback mechanism switches to HTTP authentication if TLS certificate-based client authentication fails.
Re-enrollment
-
For re-enrollment, the client always uses the previously issued certificate to establish the TLS connection.
-
A re-enrollment profile is required in scenarios where the EST server uses a fixed username and password for re-enrollment, but uses a one-time password (OTP) for initial enrollment. This behavior is optional and depends on how the EST server is configured.
Certificate types and their uses in EST protocol
Learn about the types of certificates used in the EST protocol, along with their issuers and specific uses.
If the certificate type is... |
And the issuer is... |
Then it is used for... |
---|---|---|
EST server certificate |
EST server |
authenticating the CA during the TLS handshake when the EST server interacts with clients. |
EST client certificate |
EST client |
authenticating to the EST server during certificate enrollment operations. |
End entity or leaf certificate |
EST server |
non-EST uses, such as authenticating devices in different contexts beyond EST operations. |
EST server certificate |
third-party web CA |
providing authentication for the EST server by a CA that is not part of the EST infrastructure but trusted as a third party. |
third-party EST client certificate |
third-party web CA |
authenticating the EST client to the EST server for initial interactions before enrollment. |
Trust anchor databases in EST protocol
Effective certificate validation and authentication in the EST protocol involve different types of trust anchor (TA) databases, each serving specific purposes.
A TA database refers to a repository of trusted anchor certificates used to verify the authenticity of a Certification Authority (CA) during the certificate enrollment process. The database acts as a trusted source for validating the CA issuing certificates to clients through the EST protocol.
If the TA database type is... |
Then it is used by... |
For the purpose of... |
---|---|---|
EST server |
EST server |
authenticating certificates issued by the EST CA during enroll and re-enroll operations. |
EST server (implicit) |
EST server |
authenticating certificates issued by third-party TAs; can be disabled if not needed. |
EST client |
EST client |
authenticating EST server certificates issued by the EST CA. |
EST client (implicit) |
EST client |
authenticating an EST server using an externally issued certificate; can be disabled if unnecessary. |
Pre-defined message types in EST protocol
The EST protocol includes several pre-defined message types, each serving distinct functions to facilitate secure certificate provisioning:
-
CACerts—This message type is used to request the CA certificates. It ensures the client can validate the CA's authenticity before proceeding with certificate enrollment.
-
SimpleEnroll—Utilized for simple enrollment of a certificate, this message type involves a client sending a certificate signing request (CSR) to the CA. If the request is valid, the CA issues a certificate in response.
-
Reenroll—Designed for requesting certificate renewal or reissuance, this message type allows clients to obtain a new certificate with updated validity or information when an existing certificate is about to expire.