Forum Discussion
10 Replies
I habe not used LTM auth profiles but if this is to extract the UPN from an SSL cert and then send it to the AD maybe check the links below:
- JRahmAdmin
yeah, as Nikoolayy1 suggests, it's not missing, just differently implemented in the visual policy editor in APM. Kevin also has an iRule solution, which he prefers, over doing it solely in the VPE.
https://community.f5.com/t5/technical-forum/apm-clientcert-to-kerberos-transition-parsing/m-p/249706
If you managed to get the needed answers, please flag the question as answered.
Any progress on the issue 🙂
- Peter_BaumannCirrostratus
Sorry I was quite busy...
No unfortunately it is not solved.
Advanced Auth had the Feature as displayed in the screenshot:
Search Type: Certificate: Specifies that the system searches for a certificate stored in the user's profile in the remote LDAP database.So, ACA was checking in the LDAP DB if there's a cert stored in the users profile.
How can this be done with APM? I couldn't find any solution for it since it is more an active LDAP query which has to be done and not checking session variables.Thanks,
Peter- Peter_BaumannCirrostratus
Hello again,
The customer just told me that with ACA they could validate the provided cert against users cert stored in LDAP.
So, what is missing in the access profile is the ability to check the from the client provided cert with the cert stored at the user in LDAP.The customer was using a cert validation with ACA if the provided cert is matching the user certs stored in LDAP, even when the user has two valid certs and one of it will soon be invalid because of the expired date.
Have you used the APM VPE? I think you can do a simple LDAP search to get the contents of this, but you will need your full DN to set it.