Previous Next

Traffic Management and Application Acceleration > SSL Offloading and Authentication > Client Authentication Policies

Client Authentication Policies
Client certificates enable network administrators to authenticate clients using a certificate generated by a central Certificate Authority (CA). When it is necessary to authenticate a client during the handshake process of the SSL, AppDirector sends a client certificate request to the client. To complete the handshake, the client then sends the client certificate to AppDirector to be validated. If the certificate is valid then the handshake process is complete on both sides and can start sending data. If the certificate is not valid then the session is terminated.
Performing Client Authentication
Authentication Setup
1.
2.
3.
4.
5.
6.
7.
8.
Automated Authentication Flow
1.
2.
AppDirector matches the Client CA issuer field against the Client CA that is trusted according to its configuration.
3.
4.
5.
6.
7.
Certificates
The certificate is a digitally signed indicator that identifies the server or user. This is usually provided in the form of an electronic key or value. The digital certificate represents the certification of an individual business or organizational public key. It can also be used to show the privileges and roles for which the holder has been certified. It also includes information from a third party verifying identity and authentication is needed to ensure that persons in a communication or transaction are who they claim to be.
A basic certificate includes:
*
*
*
*
*
To certify a public key, prospective subscribers requesting the certificate must register their public key with a CA. Once this is performed and the CA approves the request, a certificate is generated and issued to the subscriber.
To authenticate the client’s identity a CA certificate has to be imported into AppDirector. This CA certificate is used when AppDirector receives a client certificate and attempts to validate it. The client certificate is valid only when its issuer conforms to the CA certificate that was imported into the AppDirector. Client certificates must be installed on the client browsers by the organization or by the clients. You can check if a valid client's certificate was revoked by the CA by configuring AppDirector to check its status using OCSP (Online Certificate Status Protocol).
Certificate Revocation List (CRL)
AppDirector supports downloading CRLs from CDPs using the CDP URI embedded in client certificates or URI statically configured in the AppDirector authentication policy.
This means that multiple CDPs can be used for a single service. For example, if a single Web site supports Client Certificates from multiple CAs (for example, the Web site of a central bank that supports users using Client Certificates from different regional banks), then various CDP URI locations are extracted from the client’s certificates. As the downloaded CRL files include the validity period in which the list is valid and after which it should be updated, AppDirector fetches a new copy of the list when validity requires it.
When using CDP, Client Certificate verification is performed in the same way as importing CRLs manually. Once a CRL is downloaded using CDP, all clients that arrive at the SSL tunnel are requested to present a Client Certificate and then AppDirector checks if they appear in the CRL. If the Certificate displays in the CRL, then the request is denied.
The CRL authorizes the client and specifies which customers must be denied access to the Web server when this feature is enabled. This list must be updated periodically by importing it into AppDirector. To add a newly revoked certificate to the CRL, it must be added to the list of existing revoked certificates and then the file must be imported to the platform. For example, a bank main office might need to revoke a certificate of one of its customers. The bank must add this customer’s certificate to the CRL. Once the CRL file is modified, it must be imported into AppDirector so that requests received from the revoked certificate are denied access.
Note: Supported formats for CRL (the *.crl extension) are currently PEM and DER.
1.
2.
a.
b.
3.
Certificate Distribution Point (CDP)
Certification Authorities (CA) are responsible for the distribution and availability of CRLs (Certificate Revocation Lists) to the community (clients/organizations) that they serve.
Often this is achieved by posting the CRL to an X.500 directory server managed by the CA. It is then the responsibility of the end user, or the end user's software application to retrieve the CRL from the X.500 directory. There are alternative distribution methods such as e-mailing the CRL to all end users or posting the CRL to a Web site so that end users can download the file.
The locations where you can find posted CRLs are called CDPs (Certificate Distribution Points). CRLs posted in CDPs can be accessed by LDAP and HTTP. Each CDP is characterized with a complete URI, which is used to access the CRL, for example; http://www.example.com/crl/crl-site.txt.
Online Certificate Status Protocol (OCSP)
Instead of using CRLs, AppDirector can verify the revocation status of Client Certificates by using the on-line method of OCSP (Online Certificate Status Protocol), defined in RFC 2560.
OCSP eliminates problems related to CRL management and distribution, such as CRL updates. Each Client Certificate is tested when a new connection is established. This method is slower yet extremely safe. The client is blocked at the moment that the Client Certificate is revoked, not only when a new CRL is received.
When a request is sent to an OCSP responder for certificate status information, it receives a digitally signed response that can have one of the following three states:
*
A good certificate status indicates that the certificate is not revoked at the time of the request, according to the OCSP responder's knowledge of the certificate's status. This does not mean that the certificate was ever issued, or that the time of the response was within the certificate's validity interval.
*
A revoked certificate status indicates that the certificate is either permanently revoked or temporarily suspended.
*
An unknown certificate status indicates that the responder does not know about the certificate requested.
To configure AppDirector Client Authentication policy
1.
From the AppDirector menu, select Layer 4 Traffic Redirection > Authentication > Client Authentication Policies. The Authentication Policies pane displays.
2.
 
Defines for how long a CRL may be used beyond the NextUpdate value that appears inside the CRL indicating when it needs to be updated.
3.
Click Set.
4.
5.
Purge OCSP Cache
You can purge None of the OCSP cache information or ALL (for all the Authentication policies).
To purge OCSP cache
1.
2.
Click Purge. The Cache is purged.
Purge CDP Cache
You can purge None of the CDP cache information or ALL (for all the Authentication policies).
To purge CDP cache
1.
2.
Click Purge. The CDP is purged.
Notes:  
*
*