Skip to main content

IronWifi PKI Infrastructure

IronWifi provides a multi-tiered, HSM-backed Certificate Authority (CA) infrastructure for secure certificate-based WiFi authentication. This document describes the PKI architecture and provides certificate fingerprints for verification.

Architecture Overview

IronWifi offers a modular PKI architecture supporting both:

  • Hybrid PKI - Customer's signing CA is signed by IronWifi's Root CA
  • Private PKI - Customers generate their own keypair for signing, which can be:
    • Securely transferred to IronWifi for import into HSM-based KMS
    • Accessed from the customer's own CloudHSM solution

Security Features

HSM-Based Key Management

All Intermediate Signing CA private keys are stored in geo-redundant, private cloud-based Key Management Servers (KMS) using Hardware Security Modules (HSMs):

  • Key generation - All private keys are generated directly on HSMs
  • Key protection - Private keys can never be exported from the HSM
  • Geographic redundancy - Keys are replicated across multiple regions
  • Access control - Strict authentication for all key operations

API Security

Communication between the SCEP issuing server and KMS is protected by:

  • HMAC authentication - All API calls are cryptographically authenticated
  • Client certificate verification - Mutual TLS for server authentication
  • Key rotation - Client certificates are rotated after each API call

Certificate Authority Hierarchy

IronWifi uses a three-tier PKI hierarchy:

IronWifi Root CA
├── SCEP Signing Intermediate CA
├── Client Signing Intermediate CA
├── RadSec Signing Intermediate CA
└── Signing Intermediate CA

Root Certificate Authority

The Root CA is the trust anchor for the entire PKI:

  • Offline and air-gapped for maximum security
  • HSM-protected private key
  • Used only to sign Intermediate CA certificates

Intermediate Certificate Authorities

CA NamePurpose
SCEP Signing Intermediate CASigns certificates requested via SCEP protocol
Client Signing Intermediate CASigns end-user and device certificates
RadSec Signing Intermediate CASigns certificates for RadSec (RADIUS over TLS)
Signing Intermediate CAGeneral-purpose certificate signing

Certificate Fingerprints

Use these SHA256 fingerprints to verify the authenticity of IronWifi certificates.

Root CA

PropertyValue
NameIronWifi Root CA
SHA256 FingerprintA0 BC E3 6E CE 95 AA 1B DB 61 F5 39 20 E4 91 C1 63 39 BB 10 1C 2D 2D BE F2 53 1E 63 B2 23 A6 C7

SCEP Signing Intermediate CA

PropertyValue
NameIRONWIFI SCEP Signing Intermediate Certificate Authority
SHA256 Fingerprint85 49 95 9A F1 F4 B4 8F 9A D5 A1 F9 95 D7 E4 C5 17 81 E4 BD 6C 23 70 C6 78 87 09 85 C0 2B 5B 24

Client Signing Intermediate CA

PropertyValue
NameIRONWIFI Client Signing Intermediate Certificate Authority
SHA256 Fingerprint55 19 EB 89 A2 CF A7 6D 7C FD 0A 27 8F 31 2B 1E 27 F8 D8 E8 91 93 20 BE 90 15 9E 0D 26 EB 35 B2

RadSec Signing Intermediate CA

PropertyValue
NameIRONWIFI RadSec Signing Intermediate Certificate Authority
SHA256 Fingerprint48 2F 06 21 E1 BA 25 5F 66 1B 6A C0 3D 81 18 18 F7 09 5C 29 04 A3 53 EB 65 AD F6 DC F7 AD FC 79

Signing Intermediate CA

PropertyValue
NameIRONWIFI Signing Intermediate Certificate Authority
SHA256 FingerprintB2 FA B1 11 F0 CB EB 53 C0 94 4A 67 F1 C0 03 28 74 69 68 E0 94 95 27 61 56 51 2D 40 A7 AD C0 6B

Verifying Certificate Fingerprints

Windows

certutil -hashfile certificate.crt SHA256

macOS / Linux

openssl x509 -in certificate.crt -noout -fingerprint -sha256

Browser

  1. Click the padlock icon in the address bar
  2. View certificate details
  3. Find SHA-256 fingerprint in certificate info

SCEP Integration

The Simple Certificate Enrollment Protocol (SCEP) allows devices to automatically enroll for certificates:

  1. Device sends Certificate Signing Request (CSR) to SCEP URL
  2. SCEP server validates request using shared secret
  3. Request is forwarded to KMS for signing
  4. Signed certificate is returned to device

SCEP URL Format

https://{{region}}.ironwifi.com/api/{{owner_id}}/certificates/scep
note

For Windows/Intune profiles, remove /scep from the URL as Intune appends it automatically.

Required Parameters

ParameterDescriptionExample
regionYour data residency regionus-east1, console, asia-northeast1
owner_idYour IronWifi account identifierFound in console URL

Downloading CA Certificates

  1. Log in to the IronWifi Console
  2. Navigate to Account > Certificates
  3. Download the required certificates:
    • IronWifi CA Certificate - For SCEP profiles
    • Trusted RADIUS Server Certificate - For WiFi profiles