Forum Discussion
Greg_33216
Nimbostratus
Dec 24, 2009Using a local certificate and protected configurations
Hello,
I hope someone can help here as this has been doing my head in for a number of weeks now. I want to use a scenario on Firepass 6.1 where a resource group is protected by a 'Protected Configuration'. The main check is for a certificate installed on the machine issued by our Microsoft CA server. I have installed the client root certificate onto the firepass and this certificate is signed by our CA server and seems to have worked. Once the user has our Root Microsoft CA server certificate imported from the signing server "server01" (same one that signed the firepass certificate request) imported into their trusted store then the client web browser no longer complains that the Firepass is using a non trusted certificate.
Where I am falling apart is checking the issuing CN = "Server1" field on the certificate generated for the client machines. These certificates are using the Web server template and are signed on the same Microsoft CA server. When I view the certificate the "issued by" field shows 'server01'. I have imported them using the MMC snap into both the user store and the local machine store.
I have the pre-logon inspection running the Windows Machine Certificate Inspector and I am using inspectors check details the following way;
Cert Store Name: MY
Sert Store Location: Current User
Cert Match Rule: Issuer (regex match)
SubjectAltName(regex): blank
Issuer(regex): |CN = (server01)|
SerialNumber: blank
I have the logger turned on which is set to dump the certificate fields and also with a note to say "Cert Found and Verified" when session.cert_check.last_check.result ==1, "Cert found no match" when session.cert_check.last_check.result ==2 and "No Cert found" when going to fallback. I also try and dump the following logger action CN Issuer=%session.ssl.cert.issuer.cn% which only returns "CN Issuer =" with no data.
I am starting to think that it is not even finding a certificate. It always seems to go through the fallback branch. The client side pre-logon process shows the message that it is checking for certificates and google desktop etc... so I am sure the right inspection sequence is being used.
Any help would be much appreciated. I try and work out as much as I can myself before calling in the cavalry but so far have come up blank with my own efforts and finding a similar scenario in a posting somewhere.
cheers,
Greg
- Mike_61719
Cirrus
Can you enable the session variables and logon? Then post them if you can. Once you post them we can tell. - Greg_33216
Nimbostratus
It looks like it does not like my certificate...... - Mike_61719
Cirrus
Can you post your check for session.cert_check.cert_check9187 - Greg_33216
Nimbostratus
The parameters are the same as I posted in the 1st message. A screen shot is attached. I've also attached a screenshot of the sequence I am using to test this all with. Thanks for your help to by the way. - Mike_61719
Cirrus
When you installed the certificate on the local machine where did you store it? I believe you have to set the location to local machine. I never got the user store working right. - Greg_33216
Nimbostratus
I've used the MMC to install it both locally and in the current user profile. Tweaking the inspector to check for local machine as opposed to current user has the same result. - Mike_61719
Cirrus
Posted By Greg on 12/31/2009 7:43 AM
- Mike_Ho
Cirrus
The "MY" store is the same thing as the Personal store. - Greg_33216
Nimbostratus
Thanks Mike and Michael for getting back on this one. - Mike_Ho
Cirrus
The one key thing you haven't shown us is that in Device Management -> Security -> Certificates you have installed the issuing certificate in the "Client Root Cert(s)" store. Click "details" next to the CA cert and verify it has the correct subject identifier.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects