F5 is upgrading its customer support chat feature on My.F5.com. Chat support will be unavailable from 6am-10am PST on 1/20/26. Refer to K000159584 for details.

Forum Discussion

mikegray_198028's avatar
Apr 25, 2016

external client authetication certificate

hello team

 

Can we use external client authentication certificate, if so is there any security issue?

 

5 Replies

  • Are you talking about using a client certificate to authenticate to an application?

     

  • Still not completely clear. In the context of a full proxy system like F5, there are essentially four ways that "authentication" can happen:

     

    1. Client authentication to the F5 front-end - this could simply be presenting a client certificate to the F5 VIP, or performing full APM-based client side authentication

       

    2. F5 (acting as the client) authentication to the backend server - this is usually performed by APM doing SSO to an application

       

    3. Client passing credentials through the proxy - the simplest form. If, however, that authentication is client certificate, then the F5 cannot terminate and re-encrypt the SSL channel, and otherwise perform any intelligent functions at layer 7

       

    4. Or some combination of the first two

       

    I believe you're talking about client certificate authentication, where the client presents a certificate as part of an SSL handshake. This can obviously be done between the client and the F5 (option 1 above), and directly through the F5 (option 3 - without terminating the SSL). If you terminate the SSL and consume the client cert (option 1), you can perform some other form of server side authentication (option 2) based on attributes of that client certificate, but not the client cert itself.

     

    You also asked about security concerns. That depends entirely on a few different things. For instance, are you trying to perform client certificate authentication to the F5? Are the clients using hardware certificate tokens (smart cards) or software-based certificates? What type of authentication is required at the backend servers?

     

  •  

    We are using the below option and now bundled with our internal ca. the problem here this will allow all users who has the certificate from the same CA, so i am trying to limit this

     

  • Ah, I see. Well, as Josiah answered in your other post (https://devcentral.f5.com/questions/client-authentication-user-authentication-certificates?, once consumed the BIG-IP will have access to all of the X509 data from the certificate. The CA bundle provides a trust mechanism to complete the SSL handshake. You then need to provide a mechanism to validate the contents of the certificate. Take a look at the X509 section in the wiki for some ideas on how to handle this in iRules.

     

    https://devcentral.f5.com/wiki/iRules.X509.ashx