Forum Discussion
client authentication certificate with ocsp
Hello,
could you please help me to configure client authentication using ocsp.
- we have dedicated CA with OCSP responder.
- we need to authenticate connection to vip using client authentication certificate issues by our ca. we don't want to use traditional client authentication method using root and intermediate certificate association in client ssl profile. we would like to use OSCP for the same. some one please tell me how to achieve this, we are using v12
2 Replies
- Kevin_Stewart
Employee
Certificate authentication (validation) and revocation are different things.
Certificate validation is a function of the client SSL profile and involves a few processes including validity checking (x509 parsing, validity date checking, etc.) and trust establishment. The latter is defined by the Trusted Certificate Authorities option in the client SSL profile which is used to build a chain of trust from the client certificate to an explicitly trusted root. You can actually do this validation in two ways. If you set the client authentication option in the client SSL profile to "Require", it fails hard if there's a validation error of any kind. If you set it to "Request", it fails soft, meaning that the connection will proceed even if the certificate validation fails. This is generally what you do in a scenario where you want to client certificate authentication but want users to be able to access even if they don't have a certificate. In this case you'd maybe also want an iRule to catch and process the failed validation in some way, but not technically required.
Certificate revocation is the function of either matching the certificate against a CRL, or calling an OCSP responder. In the latter case, the OCSP responder will always digitally sign its responses, and the client (F5) must be able to trust those responses. You can turn that trust mechanism off, but never a good idea. In any case, the OCSP client configuration has an option to specify a bundle of certificates that it can use to validate the responder's response.
So to answer your question, you can allow the client certificate to soft fail with the "Request" client authentication option, and then send that (potentially untrusted) client certificate to OCSP for revocation checking, as a separate function. Of course if you do OCSP in APM, you'll have a lot of flexibility.
- Kevin_Stewart
Employee
Client certificate OCSP and OCSP stapling are two different things.
OCSP stapling is a function that allows the client SSL profile to prefetch revocation status of its own certificate and send that information to a client that supports the STATUS_REQUEST TLS extension.
Client certificate OCSP revocation checking is a separate function that allows the BIG-IP to validate the status of a client's certificate. This can be done in an LTM authentication profile, but that feature has been mostly deprecated in favor of APM OCSP.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com