广告C

Client certificate authentication

Websites that contain sensitive content, such as online banking websites or websites with employee personal information, sometimes require client certificates for authentication. To configure authentication, authorization, and auditing to authenticate users based on client-side certificate attributes, you first enable client authentication on the traffic management virtual server and bind the root certificate to the authentication virtual server. Then, you implement one of two options. You can configure the default authentication type on the authentication virtual server as CERT, or you can create a certificate action that defines what the Citrix ADC must do to authenticate users based on a client certificate. In either case, your authentication server must support CRLs. You configure the ADC to extract the user name from theSubjectCNfield or another specified field in the client certificate.

When the user tries to log on to an authentication virtual server for which an authentication policy is not configured, and a global cascade is not configured, the user name information is extracted from the specified field of the certificate. If the required field is extracted, the authentication succeeds. If the user does not provide a valid certificate during the SSL handshake, or if the user name extraction fails, authentication fails. After it validates the client certificate, the ADC presents a logon page to the user.

The following procedures assume that you have already created a functioning authentication, authorization, and auditing configuration, and therefore they explain only how to enable authentication by using client certificates. These procedures also assume that you have obtained your root certificate and client certificates and have placed them on the ADC in the /nsconfig/ssl directory.

配置client certificate authentication

配置client certificate parameters by using the GUI

  1. Install a CA certificate and bind it to an authentication virtual server.

    1. Navigate toSecurity > AAA - Application Traffic > Virtual Servers.
    2. In theAuthentication Virtual Serverspage that appears, select the virtual server that you want to configure to handle client certificate authentication, and then clickEdit.
    3. On theAuthentication Virtual Serverpage, navigate to theCertificatesection and click the right arrow “>”.
    4. On theCA Certificate Bindingpage, select a CA certificate, update the other required fields, and clickBind.

      CA certificate binding

    5. If a CA certificate is not available, then selectAdd.
    6. On theInstall Certificatepage, update the following fields and clickInstalland then clickClose.
      • Certificate-Key Pair Name: Name for the certificate and private-key pair
      • Certificate File Name: The name of the certificate file that is used to form the certificate-key pair. The certificate file must be present on the NetScaler’s hard-disk drive or solid-state drive. Storing a certificate in any location other than the default might cause inconsistency in a high availability setup. The default path is /nsconfig/ssl/.
      • Notification Period: Number of days before certificate expiration at which NetScaler notifies the admin that the certificate is about to expire.
      • Notify When Expires: Enable this option to receive an alert when the certificate is about to expire.

      Install CA certificate

    7. Once the CA certificate is installed, go to theCA Certificate Bindingpage, bind it to an authentication virtual server.
  2. Return to theSecurity > AAA - Application Traffic > Virtual Serverspage.
  3. Navigate toSecurity > AAA - Application Traffic > Policies > Authentication > Basic Policies > CERT.
  4. Select the policy that you want to configure to handle client certificate authentication, and then clickEdit.
  5. On theConfigure Authentication CERT Policypage, go to the服务器drop-down list and select the virtual server that is configured to handle client certificate authentication.
  6. ClickOK.

    配置client certificate policy

配置client certificate parameters by using the CLI

At the command prompt, type the following commands, in the order shown, to configure the certificate and verify the configuration:

add ssl certKey  -cert  -key  -password -inform  -expiryMonitor  -notificationPeriod  bind ssl certKey [] [-ocspResponder ] [-priority ] show ssl certKey [] set aaa parameter -defaultAuthType CERT show aaa parameter set aaa certParams -userNameField "Subject:CN" show aaa certParams 

配置client certificate advanced authentication policies by using the GUI

  1. Install CA certificate and bind it to a certificate-key pair.

    1. Navigate toSecurity > AAA - Application Traffic > Virtual Servers.
    2. In theAuthentication Virtual Serverspage that appears, select the virtual server that you want to configure to handle client certificate authentication, and then clickEdit.
    3. On theAuthentication Virtual Serverpage, navigate to theCertificatesection and click the right arrow “>”.
    4. On theCA Certificate Bindingpage, select a CA certificate, update the other required fields, and clickBind.
    5. If a CA certificate is not available, then selectAdd.
    6. On theInstall Certificatepage, update the following fields and clickInstalland then clickClose.
      • Certificate-Key Pair Name: Name for the certificate and private-key pair
      • Certificate File Name: The name of the certificate file that is used to form the certificate-key pair. The certificate file must be present on the NetScaler’s hard-disk drive or solid-state drive. Storing a certificate in any location other than the default might cause inconsistency in a high availability setup. The default path is /nsconfig/ssl/.
      • Notification Period: Number of days before certificate expiration at which NetScaler notifies the admin that the certificate is about to expire.
      • Notify When Expires: Enable this option to receive an alert when the certificate is about to expire.
    7. Once the CA certificate is installed, go to theCA Certificate Bindingpage and repeat step 4.
  2. Return to theSecurity > AAA - Application Traffic > Virtual Serverspage.

    Note:

    If you have imported a valid CA certificate and server certificate for the virtual server you can skipsteps 1 and 2.

  3. Navigate toSecurity > AAA - Application Traffic > Policies > Authentication > Advanced Policies, and then selectPolicy.
  4. On theAuthentication Policiespage, do one of the following:

    • 创建一个政策,点击Add.
    • To modify an existing policy, select the policy, and then clickEdit.
  5. On theCreate Authentication PolicyorConfigure Authentication Policypage, type or select values for the parameters.

    • Name: Policy name. You cannot change the name of a previously configured policy.
    • Action Type: Type of the authentication action.
    • Action: Name of the authentication action to be performed if the policy matches. You can choose an existing authentication action, or clickAddand create an action.
    • Expression: The rule that selects connections to which you want to apply the action that you specified. The rule can be simple (“true” selects all traffic) or complex. You enter expressions by first choosing the type of expression in the leftmost drop-down list beneath the Expression window, and then by typing your expression directly into the expression text area, or by clicking Add to open Add Expression dialog box and using the drop-down lists in it to define your expression.
    • Log Action: Name of the audit action to use when an authentication request matches this policy. You can choose an existing audit action, or clickAddto create an action.
    • Comment: You can type a comment that describes the type of traffic that this authentication policy applies to. This field is optional.
  6. ClickCreateorOK, and then clickClose.

Client certificate pass-through

The Citrix ADC can now be configured to pass client certificates through to protected applications that require client certificates for user authentication. The ADC first authenticates the user, then inserts the client certificate into the request and sends it to the application. This feature is configured by adding appropriate SSL policies.

The exact behavior of this feature when a user presents a client certificate depends upon the configuration of the VPN virtual server.

  • If the VPN virtual server is configured to accept client certificates but not require them, the ADC inserts the certificate into the request and then forwards the request to the protected application.
  • If the VPN virtual server has client certificate authentication disabled, the ADC renegotiatiates the authentication protocol and reauthenticates the user before it inserts the client certificate in the header and forwards the request to the protected application.
  • If the VPN virtual server is configured to require client certificate authentication, the ADC uses the client certificate to authenticate the user, then inserts the certificate in the header and forwards the request to the protected application.

In all of these cases, you configure the client certificate pass-through as follows.

Create and configure client certificate pass-through by using the command line interface

At the command prompt, type the following commands:

add vpn vserver  SSL  443 

Forname, substitute a name for the virtual server. The name must contain from one to 127 ASCII characters, beginning with a letter or underscore (_), and containing only letters, numbers, and the underscore, hash (#), period (.), space, colon (:), at (@), equals (=), and hyphen (-) characters. For, substitute the IP address assigned to the virtual server.

set ssl vserver  -clientAuth ENABLED -clientCert  

For, substitute the name of the virtual server that you created. For, substitute one of the following values:

  • disabled—disables client certificate authentication on the VPN virtual server.
  • mandatory—configures the VPN virtual server to require client certificates to authenticate.
  • optional—configures the VPN virtual server to allow client certificate authentication, but not to require it.
bind vpn vserver  -policy local 

For, replace the name of the VPN virtual server that you created.

bind vpn vserver  -policy cert 

For, substitute the name of the VPN virtual server that you created.

bind ssl vserver  -certkeyName  

For, substitute the name of the virtual server that you created. For, substitute the client certificate key.

bind ssl vserver  -certkeyName  -CA -ocspCheck Optional 

For, substitute the name of the virtual server that you created. For, substitute the CA certificate key.

add ssl action  -clientCert ENABLED -certHeader CLIENT-CERT 

For, substitute a name for the SSL action.

add ssl policy  -rule true -action  

For, substitute a name for your new SSL policy. For, substitute the name of the SSL action that you created.

bind ssl vserver  -policyName  -priority 10 

For, replace the name of the VPN virtual server.

Example

add vpn vserver vs-certpassthru SSL 10.121.250.75 443 set ssl vserver vs-certpassthru -clientAuth ENABLED -clientCert optional bind vpn vserver vs-certpassthru -policy local bind vpn vserver vs-certpassthru -policy cert bind ssl vserver vs-certpassthru -certkeyName mycertKey bind ssl vserver vs-certpassthru -certkeyName mycertKey -CA -ocspCheck Optional add ssl action act-certpassthru -clientCert ENABLED -certHeader CLIENT-CERT add ssl policy pol-certpassthru -rule true -action act-certpassthru bind ssl vserver vs-certpassthru -policyName pol-certpassthru -priority 10 
Client certificate authentication