Forum Discussion
Dev_56330
Oct 22, 2015Cirrus
Kerberos Authentication with different UPN than Kerberos Realm
Using the Exchange 2013 iApp to allow the big ip (v12.0) load balance a pool of Client Access Servers with APM providing authentication, users are receiving Matching Credentials Cannot be Found after...
Kevin_Stewart
Oct 23, 2015Employee
Add an iRule event agent to the visual policy right after the OCSP auth. Give it an ID of "CERTPROC". Add an iRule to fetch the certificate SAN UPN:
when ACCESS_POLICY_AGENT_EVENT {
switch [ACCESS::policy agent_id] {
"CERTPROC" {
if { [ACCESS::session data get session.ssl.cert.x509extension] contains "othername:UPN<" } {
ACCESS::session data set session.logon.last.username [findstr [ACCESS::session data get session.ssl.cert.x509extension] "othername:UPN<" 14 ">"]
}
}
}
}
Add an LDAP Query agent after the iRule event and use the following LDAP filter:
userPrincipalName = %{session.logon.last.username}
If the LDAP query succeeds, you should have a session.ldap.last.attr.sAMAccountName session variable with the user's SAM name.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects