Skip to main content

Client certificates

Client certificates provide mutual TLS (mTLS) authentication, ensuring both the client and server verify each other's identity. This creates a more secure communication channel compared to standard TLS where only the server is authenticated.

Client certificates in Frontdoor enable you to:

  • Authenticate clients using X.509 certificates instead of or in addition to other authentication methods
  • Implement zero-trust security architectures where every connection is verified
  • Meet compliance requirements that mandate certificate-based authentication
  • Secure service-to-service communication in microservices architectures

Certificate types

Frontdoor supports two ways to obtain client certificates:

Upload existing certificates

Use certificates you already have from your existing PKI infrastructure:

  • Certificates issued by your organization's CA
  • Third-party certificates from commercial CAs
  • Self-signed certificates for testing environments

Generate from Certificate Signing Requests (CSRs)

Let NetFoundry generate certificates for you:

  • NetFoundry acts as the Certificate Authority (CA)
    • Certificates are issued to your organization with a unique intermediate certificate for your Frontdoor
    • Certificates are valid for 365 days
    • Certificates are issued using a unique certificate signing request (CSR)
  • Certificates include appropriate key usage extensions
  • Automatic integration with Frontdoor's trust model
  • Simplified certificate lifecycle management

For more info, see ../how-to-guides/create-client-certificate.mdx.

Best practices

Certificate management

  • Use descriptive names that indicate the certificate's purpose and environment
  • Implement certificate rotation before expiration dates
  • Monitor certificate expiry with automated alerts
  • Store private keys securely and never transmit them

Security considerations

  • Use strong key lengths: RSA 2048-bit minimum, prefer 4096-bit or ECDSA P-256/P-384
  • Implement proper validation in your applications
  • Use Certificate Revocation Lists (CRL) or OCSP for revocation checking
  • Test thoroughly in non-production environments first

Operational guidelines

  • Start simple with one certificate and gradually expand
  • Document certificate mappings to services and environments
  • Implement backup procedures for certificate recovery
  • Train team members on certificate lifecycle management

More info