-
Configuring Client Certificate Authentication
-
Configuring and Binding a Client Certificate Authentication Policy
-
-
Configure NetScaler Gateway to use RADIUS and LDAP Authentication with Mobile Devices
-
Restrict access to NetScaler Gateway for members of one Active Directory group
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Configuring and Binding a Client Certificate Authentication Policy
You can create a client certificate authentication policy and bind it to a virtual server. You can use the policy to restrict access to specific groups or users. This policy takes precedence over the global policy.
To configure a client certificate authentication policy:
- In the configuration utility, on the Configuration tab, expand NetScaler Gateway > Policies > Authentication.
- In the navigation pane, under Authentication, click CERT.
- In the details pane, click Add.
- In Name field, type a name for the policy.
- Next to Server, click New.
- In Name, type a name for the profile.
- Next to Two Factor, select OFF.
- In User Name field and Group Name field, select the values and then click &Create. Note: If you previously configured client certificates as the default authentication type, use the same names that you used for the policy. If you completed the User Name field and Group Name field for the default authentication type, use the same values for the profile.
- In the Create Authentication Policy dialog box, next to Named Expressions, select the expression, click Add Expression, click Create and then click Close.
To bind a client certificate policy to a virtual server:
After you configure the client certificate authentication policy, you can bind it to a virtual server.
- In the configuration utility, on the Configuration tab, in the navigation pane, expand NetScaler Gateway and then click Virtual Servers.
- In the details pane, click a virtual server and then click Open.
- In the configure NetScaler Gateway Virtual Server dialog box, click the Authentication tab.
- Click Primary or Secondary.
- Under Details, click Insert Policy.
- In Policy Name, select the policy and then click OK.
To configure a virtual server to request the client certificate:
When you want to use a client certificate for authentication, you must configure the virtual server so that client certificates are requested during the SSL handshake.
- In the configuration utility, on the Configuration tab, in the navigation pane, expand NetScaler Gateway and then click Virtual Servers.
- In the details pane, click a Virtual Server and then click Open.
- On the Certificates tab, click SSL Parameter.
- Under Others, click Client Authentication.
- In Client Certificate, select Optional or Mandatory and then click OK twice. Select Optional if you want to allow other authentication types on the same virtual server and do not require the use of client certificates.
Note
- For more information about Callback URL, see Import a NetScaler Gateway.
- For more information about certificates, see Install, link, and update certificates.
Share
Share
In this article
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.