The Enrollment over Secure Transport protocol (EST) is a protocol for automating x.509 certificate issuance for public key infrastructure (PKI) clients, like web servers, endpoint devices and user identities, and for any other place PKI certificates are used, as well as the associated certificates from a trusted Certificate Authority (CA). The EST protocol is defined in RFC 7030 and standardizes an authenticated request and response exchange process with the CA, making it more secure as well as faster and easier for IT teams to deploy certificates on systems and devices than manually communicating the required information.
EST is recognized for its ease of use and its security features, including the use of HTTPS for secure transport and transport layer security (TLS) for client and server security. It also supports additional cryptographic algorithms such as elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA), unlike other widely used certificate management protocols like Simple Certificate Enrollment Protocol (SCEP), which was sponsored by Cisco and developed in the 1990s. As a result, EST has been put forward as a replacement for SCEP by the Internet Engineering Task Force (IETF) working group.
While there is no stronger, easier-to-use authentication and encryption solution than the digital identity provided by PKI, there are many potential pitfalls inherent in managing PKI certificates manually. Organizations need a certificate management automation standard like EST to ensure certificates are correctly configured and deployed at scale without human intervention.
Busy IT teams can ill-afford to manually deploy and manage certificates as doing so is risky, time-consuming and highly error-prone. Whether an organization deploys a single SSL certificate for a web server or manages millions of certificates across all networked endpoints, mobile devices, and user identities in an organization, the provisioning process from issuance to configuration and then deployment can take up to several hours per certificate.
Furthermore, manually managing certificates also puts enterprises at significant risk of certificates being forgotten until after expiration, resulting in sudden outage of critical business systems and exposure to malicious attacks.
The level of automation enabled by EST not only helps reduce risk but allows IT administrators to gain back precious time in their busy days.
Similar to EST, SCEP is also a certificate management protocol that helps IT administrators issue them automatically. SCEP has gained significant traction with businesses as an important component of enterprise security. Both EST and SCEP are satisfactory protocols for automated certificate enrollment and provide similar enrollment processes.
Yet, the IETF working group has established EST as a replacement for SCEP. Being a newer protocol, EST offers an easy-to-use certificate management solution and updated capabilities that deliver several key advantages for today's enterprise PKI environments, including:
The EST enrollment service standardizes the interoperability and secure information exchange between a client and a CA that is required to issue a certificate. It is commonly applied to the enrollment of numerous certificate use cases, including web servers, DevOps, endpoint devices, IoT devices, user identities, email services, and any other place PKI certificates are used.
In a PKI architecture, the EST service is located between a client and the CA and performs several functions traditionally assigned to the Registration Authority (RA) role. Its job is to provide validation of whether EST clients should receive the certificate they have requested or not. If so, it passes the request to CA and returns the resulting certificate to the client. The client communicates with an EST server, which listens for requests on a standard URL path. Clients just need to know the IP address of the server to make requests.
The EST enrollment process is developed to be easy for the establishment of automatic certificate issuance from a trusted CA. The general client/server interaction proceeds as follows:
Figure: The certificate enrollment process using EST
In addition, an EST client can renew or rekey its existing client certificate by submitting a re-enrollment request to an EST server. And additional optional requests can be transported via EST to support other certificate operations, such as passing CSR attributes that may be desired by the CA and server-side key pair generation.
The standardized request functions a client can make, and the corresponding URI path include:
Sectigo recognizes the complexity and scale of enterprise certificate needs. Enterprises rely on PKI certificates to authenticate and encrypt everything from web servers both in the cloud and on-premises, to networked devices, mobile devices, user identities, email systems, network appliances, IoT devices, DevOps environments, digital signatures, and more. Sectigo offers SSL, Code Signing, S/MIME, and other X.509 certificates that support EST, as well as an automated end-to-end certificate lifecycle management system that allows enterprises to manage certificates at scale through a single pane of glass.
Configuring a Sectigo EST service is a simple task, and is performed by following these steps:
Upon completing those steps, you are ready to test and perform your certificate enrollment or re-enrollment via your Sectigo EST service.
For a complete guide to EST configuration using Sectigo Certificate Manager, including how to create adapters and templates, go to the Sectigo Knowledge Base and refer to the Sectigo Certificate Manager Administration Guides.
For details on values of parameters to be specified in the configuration profile, contact your Sectigo account manager.