Hello,
I am at an impasse when it comes to deploying HTTPS API for Environment Data Download.
We have configured our Windows Sub CA with NDES which allows us to use SCEP for certificate enrollment for our trustpoint. When specifying the fingerprint of the CA the trustpoint successfully authenticates. Without the fingerprint config option the authentication request fails with a message to provide the fingerprint.
commands used when failing.
crypto pki trustpoint NDES1
enrollmet url *URL of NDES Server*
revocation-check crl
end
crypto authenticate NDES1
Commands used when working.
crypto pki trustpoint NDES1
enrollmet url *URL of NDES Server*
fingerprint *Fingerprint of SubCA cert*
revocation-check crl
end
crypto authenticate NDES1
When thinking about this so that it is set it and forget it, if we were to configure certificate re-enrollment you would still need to configure the fingerprint of the CA. When that subca cert changes the fingerprint of the ca will change causing all of our switching infrastructure to no longer access the PSNs over HTTPS. We have a switching infrastructure of around ~500 devices. Is it the thought that every time your CA expires you have to manually touch every switch? or is there a configuration that I am failing to see?
any tips or suggestions helps.
Thanks!