How to safely offboard from Portnox Cloud services
In this topic, you will find suggestions for safe offboarding from Portnox Cloud if you no longer want to use Cloud services and, instead, go back to an insecure network, or use a different product/service.
-
Ensure that your devices can connect to networks and other services after offboarding:
The first and most critical step in offboarding is ensuring that your users retain access to your networks and resources. Before removing any Portnox-related components – such as integrations, certificates, virtual machines, or Docker containers – you must first confirm that all users can still connect to the networks and services that were previously secured with Portnox Cloud, or to replacement networks and services. This can be achieved either by transitioning to a replacement solution or, if necessary, by enabling access through less secure fallback configurations. Only once continuity of access is confirmed should you proceed with the removal of Portnox elements from your environment.
-
Remove integrations with Portnox Cloud.
During your initial onboarding with Portnox Cloud, it’s likely that you integrated it with other systems – such as authentication providers (e.g., Entra ID, Google Workspace, Okta), UEM/MDM solutions (e.g., Intune, Jamf), SIEM platforms, and others. While removing these integrations is not required for maintaining network access or service continuity, and they will cease functioning once your Portnox Cloud tenant is decommissioned, it is strongly recommended to clean them up as part of good housekeeping and to avoid unnecessary clutter or confusion in your environment.
The exact steps for removing these integrations will vary depending on the specific solutions involved. For example, in Azure, you should remove any Portnox-related applications from your Entra ID tenant. In SIEM platforms, you may need to delete configured log sources and any associated resources, such as virtual machines or syslog forwarders. Refer to the documentation of each integrated product to ensure all Portnox-related components are properly removed.
-
Remove Portnox virtual machines, Docker containers, and AD Broker instances.
You may have virtual machines or Docker containers running Portnox-related services – such as local RADIUS, local TACACS+, ZTNA, or components used for integrations like SIEM – hosted either in your physical infrastructure or in a cloud environment. You may also have AD Broker services running in the background on local virtual or physical machines. Be sure to identify, stop, and remove all such instances.
While these services will no longer function once your Portnox Cloud tenant is decommissioned, they may still consume resources. If they are cloud-hosted, you may continue to incur charges; if they are running locally, they will continue to occupy system resources unnecessarily.
If you are using cloud platforms, also remove any additional services that were provisioned specifically for Portnox Cloud – for example, in Azure, remove virtual networks, public IP addresses, log configurations, and other related infrastructure components that were created to support container instances running Portnox Docker containers.
-
Remove AgentP from client devices.
If your devices were previously managed using AgentP, you should uninstall AgentP. While AgentP will stop functioning once your tenant is decommissioned and poses no security risk if left installed, it is recommended to uninstall it for housekeeping purposes and to free up disk space and reduce clutter.
-
Remove Portnox supplicant certificates from client devices.
If you issued Portnox certificates to client devices – whether distributed manually, via a UEM/MDM solution through SCEP, or through self-onboarding – you can now remove them as part of housekeeping. When your Portnox Cloud tenant is decommissioned, the tenant’s Certificate Authority (CA) will no longer exist, causing all issued certificates to stop working completely. Although these certificates pose no risk if left on devices, they are unnecessary and it’s best to remove them. There is no need to revoke any supplicant certificates, since without the CA, the certificates become invalid automatically.
Remove the Portnox tenant CA certificate from client devices, if present in the root certificates category, as it will no longer be valid or needed once the tenant is decommissioned. However, do not remove the DigiCert Trusted Root G4 certificate, the G2 certificate, or any other industry-standard CA certificates used to sign a wide range of certificates beyond Portnox. Removing these trusted root certificates may impact access to other services and cause broader connectivity or trust issues in your environment.
-
Decommission your Portnox Cloud tenant.
As the last step, coordinate with your Portnox contact to request the decommissioning and deletion of your tenant. Keep in mind that tenant deletion is permanent – if you choose to return to Portnox Cloud in the future, you will need to create a new tenant and begin the onboarding process from the beginning.