Skip to main content
banner image
venafi logo

Automating Certificate Management for Your F5 Infrastructure [Thinking Too Small?]

Automating Certificate Management for Your F5 Infrastructure [Thinking Too Small?]

automating F5 certificates
September 2, 2020 | Diane Garey

If you’re an F5 administrator, you might not spend a lot of time thinking about automating the management of machine identities. By machine identities, I mean the keys and certificates that assure the unique identity of assets in and on your F5 infrastructure. After all, until recently, certificate lifespans were a couple of years long. That means, depending on the number of F5 devices you’re responsible for and the number of certificates on them, it’s not something you would have to think about that often.
 

But with today’s shorter certificate lifespans, you’ll likely need to consider automation to keep your machine identities current and active. However, that automation may mean giving away some control over devices in the form of credentials needed to automate certain tasks. Maybe you don’t want another application automatically doing anything with your F5 infrastructure.
 

While not thinking about automation is understandable, it’s something many organizations are embracing (or being forced to embrace). As I mentioned before, certificate lifespans are getting progressively shorter, down to 398 days. This means more work if you’re renewing certificates manually and the risk of missing more frequent renewals may result in certificate-based outages. Many organizations won’t have enough people to do these renewals manually and/or would like to let those same people work on projects that are more strategic than updating keys and certificates.


 

 

There are also the occasional, but massively impactful events that require bulk replacement of keys and certificates or the need to update machine identities that are vulnerable, weak, or distrusted. When a Certificate Authority (CA) gets compromised, a cryptographic algorithm is broken, or a vendor suffers a major vulnerability, compromised keys and certificates need to be replaced quickly without impacting the functions of business-critical infrastructure. Organizations relying on manual updates simply can’t keep up with these types of events.
 

While those trends driving the need for automation might be important for your organization, you might be wondering how automating certificate management for your F5 infrastructure would affect you personally. Would it give you more time and make your life better or add risk because you’d have to give up that control?
 

First, imagine that you didn't have to do so many manual tasks in terms of keys and certificates. Does it consume too much of your time to generate keys, generate CSRs (urgently searching how-to reminders from Google), and wait on approvals? What if these tasks were automated for you? You’d gain time and peace-of-mind. You’d gain even more time in those situations where the process falls down—particularly in cases where you generate keys, generate the CSR, submit the CSR to your PKI team, and they then come back to you to say there’s a mistake and everything needs to be redone. It’s not that unusual to make a mistake if you’re not a PKI expert and you haven’t been dealing with keys and certificates on a regular basis. 
 

Saving you time is a huge benefit of automation, but the benefits don’t stop there. Automation enables intelligence about certificates, where they’re installed, and who are the certificate owners. As you and other F5 administrators move to new roles and responsibilities, those critical pieces of information are available for the people you follow or the ones who come after you. Automation can help you eliminate mistakes during maintenance windows, because all you are doing in the maintenance window is running automation. Before the maintenance window, you have the opportunity to iron out mistakes through configuration and code reviews. Automation also supports better scalability when you have many certificates installed on similar types of applications and devices.
 

The one thing that excites Venafi customers that have automated the interaction between Venafi and F5 is the speed of operation. One customer in particular has automated their request process so that any time a new application is requested in ServiceNow, and all the required assets are automatically created. In just a few minutes, their web server, the IP address, and F5 virtual server are all provisioned. The F5 virtual server spins up, the certificate gets automatically provisioned where it belongs, and every new web application that's requested is created and ready for use. This organization is a good example of thinking big about automating certificate management—and it’s paying off for them in quick, easy, and safe creation of applications.
 

You might be thinking that automation is sounding interesting but still have concerns about giving up control. After all, F5 systems are critical infrastructure and you don’t want just anyone or anything messing with them. While a Machine Identity Management system like Venafi will require credentials to automate tasks, it shouldn’t require an admin account with root control over applications and devices. It should be using the least amount of privilege needed to do an assigned task such as installing a certificate or doing a validation check to make sure things are installed corrected.
 

You should also have flexibility into how much you automate and when. Using Venafi Machine Identity Management again as an example, you can have Venafi place the key and certificate you need in a directory where you can retrieve and install it if you don’t want Venafi to perform the installation automatically. Or you might want Venafi to do the installation, but not restart services so you have complete control over when that happens. Flexibility like this lets you take advantage of automation while making sure it works the way you need it to and most importantly, won’t break any of F5 devices.
 

Venafi and F5

Venafi and F5 are partners in certificate automation through Machine Identity Management. Our companies have built multiple integrations between our solutions to help F5 teams easily deploy, manage, and protect applications using TLS. We make it easy to automate the entire lifecycle of keys and certificates needed by F5, from initial discovery of existing certificates in use, to the automated renewal of those certificates before they expire, and finally to the automated provisioning to the F5 devices and applications that consume them.
 

Thinking Bigger?

Automating certificate management for F5 BIG-IP and BIG-IQ wherever possible can help you and your organization. You get back the time that you'd otherwise spend on manual tasks, and those tasks are done faster and mistake free without you having to sacrifice control over the F5 devices you're responsible for managing.
 

Your organization benefits too. It won't need additional resources to deal with managing machine identities manually as certificate lifespans get shorter and as widespread security events occur.
 

Want to learn more about how Venafi and F5 are partners in certificate automation? Visit the Venafi Marketplace to learn about integrating Venafi with F5 BIG-IP Local Traffic Manager and F5 BIG-IQ.  


Related Posts


 

Like this blog? We think you will love this.
graphic of a digital rendering of a 3D matrix, lit up with a dark background
Featured Blog

Identity Wars: Episode II – Attack of the Clones

Trusted identities

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

CIO Study: Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

Machine Identity Protection for Dummies
eBook

Machine Identity Protection for Dummies

About the author

Diane Garey
Diane Garey

Diane is on the product marketing team at Venafi and loves sharing how the Venafi Platform helps organizations protect their machine identities.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat