SUDI certificates
A Secure Unique Device Identity (SUDI) is a device credential that
-
provides device-specific authentication during secure connection handshakes
-
is provisioned in a secure hardware chip during manufacturing, and
-
supports multiple certificates for interoperability with diverse network environments.
Feature history
This table provides release and related information about the feature explained in this section.
This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise.
Feature Name |
Release Information |
Feature Description |
---|---|---|
SUDI99 certificate support |
Cisco IOS XE Dublin 17.7.1 |
This feature allows a network administrator to use SUDI99 certificates for authentication during secure connection handshakes enhancing security through device-specific credentials |
SUDI certificates validate device identity, ensuring only genuine devices connect to Cisco networks. They play a crucial role in maintaining the security of network infrastructure.
![]() Note |
Some existing SUDI certificates, such as those used in controller and AP platforms, are set to expire in May 2029. To ensure continued secure authentication, the SUDI refresh program migrates SW-SUDI SHA1 certificates to the new SUDI99 certificates with extended validity. |
Software selection for SUDI trustpoint certificates
Cisco IOS XE software supports two slots for initializing SUDI certificates from the secure hardware chip. This SUDI99 migration change will rearrange certificate-to-trustpoint mapping as follows:
Trustpoint Name |
Software Selection Among Programmed Certificate Chains |
---|---|
CISCO_IDEVID_SUDI |
CMCA2 SHA2 SUDI (SHA2-2037) |
CISCO_IDEVID_SUDI_LEGACY |
CMCA SHA1 SUDI |
Trustpoint Name |
Software Selection Among Programmed Certificate Chains |
---|---|
CISCO_IDEVID_SUDI |
CMCA-III SHA2 SUDI99 |
CISCO_IDEVID_SUDI_LEGACY |
CMCA2 SHA2 SUDI (SHA2-2037) |
![]() Caution |
Avoid using expired certificates for device authentication to prevent service disruption. |
SUDI99 certificate and software support
The table lists the SUDI99 certificate and software support:
Cisco Catalyst 9800 Controllers |
SUDI99 Certificate Support |
Software Support for SUDI99 Migration |
---|---|---|
Cisco Catalyst 9800-CL Wireless Controller for Cloud |
Not supported. |
— |
Cisco Catalyst 9800 Series Wireless Controllers
|
Supported |
Yes. From Cisco IOS XE Cupertino 17.7.1. |
Cisco Embedded Wireless Controller on Catalyst Access Points.
|
Supported |
Yes. From Cisco IOS XE Cupertino 17.7.1. |
Cisco Embedded Wireless Controller on Catalyst Switches
|
Not supported. |
— |
Backward compatibility
Backward compatibility refers to the Cisco Catalyst 9800 Series Wireless Controllers maintaining their functionality with legacy systems by using existing certificates for devices that cannot validate SUDI99.
-
If your device (AP or controller) cannot validate the SUDI99 certificate, the controller switches to an older certificate (SHA2-2037) for the connection.
-
For NMSP-TLS connections with Cisco CMX, the client certificate is not validated in default security mode. However, in FIPS mode, Cisco CMX validates the controller certificate.
-
In FIPS mode, install the new SUDI CA certificates on the earlier version of Cisco CMX, or upgrade to the latest version.
![]() Important |
Some applications, such as HTTPS, RADSEC, and WebAuth, do not use the SUDI certificate as their default trustpoint. However, you can configure them to use the SUDI trustpoint explicitly. The SUDI refresh program alters the certificate selection for such services. However, there is no functional impact. |