Manual Chapter :
About Machine Cert
Auth
Applies To:
Show VersionsBIG-IP APM
- 15.0.1, 15.0.0
About Machine Cert
Auth
A Machine Certificate Auth action can check for the existence of fields in a
machine certificate to ensure that Windows and Mac client systems comply with your security
policy.
Client | Description |
---|---|
Windows | The Machine Cert Auth action accesses the machine certificate
private key; admin privilege is required to do this. A user that runs without admin privilege
cannot successfully run this check unless the machine certificate checker service is
installed on the machine. (The Machine Certificate Checker Service is available for inclusion
in the Windows client package from the Secure Connectivity area of Access Policy Manager.) |
Mac | The Machine Cert Auth action accesses the machine certificate
private key. If the certificate is stored in a keychain other than user’s own keychain,
such as the system keychain, then an ACL is required for non-admin users to be able to
access this private key. |
The Machine Certificate Auth action provides the following configuration
elements and options:
- Certificate Store Name
- Specifies the certificate store name that the action attempts to match. The certificate store can be a system store with a predefined name, such as MY, or a user-defined name. The store name can contain alphanumeric characters. The Machine Cert Auth action treats MY as the default store name for both Mac and Windows clients.
- Certificate Store Location
- Specifies the type and location of the store that contains the certificate, either the local machine or the current user. For a Windows client, the store locations are in the following registry locations:
- LocalMachineWhen specified, the action searches inHKEY_LOCAL_MACHINEfor the machine certificate.
- CurrentUserWhen specified, the action searches inHKEY_CURRENT_USERfor the machine certificate.
- LocalMachineWhen specified, the action searches in the keychain specified inCertificate Store Namein the system preference domain.
- CurrentUserWhen specified, the action searches in the keychain specified inCertificate Store Namein the user preference domain.
- IfCertificate Store Nameis set toSystem.keychainandCertificate Store Locationis set toLocalMachine, the action searches for the machine certificate in/Library/Keychains/System.keychain.
- IfCertificate Store Nameis set tologin.keychainandCertificate Store Locationis set toCurrentUser, the action searches for the machine certificate in/Library/Keychains/login.keychainand then searches for the machine certificate in/Users/username/Library/Keychains/login.keychain
- IfCertificate Store Nameis set toMYthen the action searches for the machine certificate in the default keychain ofCertificate Store Location.
- CA Profile
- Specifies the certificate authority profile for the particular machine certificate.
- Save Certificate in a session variable
- SpecifiesEnabledorDisabled. WhenEnabled, specifies that the complete encrypted text of the machine certificate be saved in a session variable,session.check_machinecert.<name>.cert.cert.
- Allow User Account Control right elevation prompts
- SpecifiesYesorNo. When set toYes, a UAC prompt for users with admin-level privileges is allowed. When set toNothe UAC prompt for non-admin users is suppressed, which can cause a failure to verify the machine certificate. This setting does not affect users without admin-level privileges. If the Machine Certificate Checker Service is installed andAllow User Account Control right elevation promptsis set toYes, the following scenarios occur:
- Users with administrator privilege are prompted for UAC.
- Standard users who use Machine Certificate Checker service will not be prompted for UAC.
- Guest users who use Machine Certificate Checker service will not be prompted for UAC.
Allow User Account Control right elevation promptsis set toNo, the following scenarios occur:- Users with administrator privilege are not prompted for UAC.
- Standard users who use Machine Certificate Checker service will not be prompted for UAC.
- Guest users who use Machine Certificate Checker service will not be prompted for UAC.
Allow User Account Control right elevation promptstoYes, the following scenarios occur:- Users with administrator privilege are prompted for UAC.
- Standard users will fail to verify machine certificate.
- Guest users will fail to verify machine certificate.
Allow User Account Control right elevation promptstoNo, the following scenarios occur:- Users with administrator privilege will fail to verify machine certificate.
- Standard users will fail to verify machine certificate.
- Guest users will fail to verify machine certificate.
- Match Subject CN with FQDN
- SpecifiesYesorNo. When set toYes, specifies that the common name in the machine certificate matches the computer's fully qualified domain name (FQDN) such as,CHR-L-SMITH2.MARKETING.SITEREQUEST.COM.
- Match subject Alt Name with FQDN
- Specifies a regular expression used to extract content from the first subgroup matched in the Subject Alternative Name, and then to compare the extracted content with the machine's FQDN.Here are some examples of regex extraction.The order of RDNs is the same as is displayed; the required separator is a comma , .
- Partial extraction. For example,.*DNS Name=([^,]+).*" or.*Other Name:Principal Name=([^,]+).*. For a regular expression.*DNS Name=([^,]+).*, the value of the DNS Name field is extracted for matching.
- Whole extraction. Using(.*)specifies that the entire SubjectAltName content be extracted for matching.
- Match Issuer
- Specifies a regular expression that is used to match the Issuer content against the specified pattern.Here are some examples of regex extraction.The order of RDNs is the same as is displayed; the required separator is a comma , .
- Partial match.CN=.*, OU=FP, O=F5, L=San Jose, S=CA, C=US
- Exact match.E=test@f5.com, CN=f5clientrootcert, OU=es, O=f5, L=london, S=chertsey, C=uk
- Match Serial Number
- Specifies a serial number that must be an exact match for the certificate serial. The hex string must be specified in the same order as it is displayed by OpenSSL and Windows certificate tools. For example,33:AA:7B:82:00:01:00:00:00:33.