Certificate Authentication Support

This feature enables users to login to the client using their certificates. The supported scenario is “certificate-based login only" the Unified Pulse Client setup is now switched to this authentication method. In a typical enterprise environment, each user will be provided with certificate which can be used for VPN login. This mechanism can be used as a primary or secondary authentication mechanism.

Configuring Client Certificate in Pulse Connect Secure

To configure trusted client CA certificate:

1.Select System > Configuration > Certificates > Trusted Client CAs.

2.Click Import CA Certificate to display the configuration page.

3.Browse to the certificate file and select it.

4.Click Import Certificate to complete the import operation.

5.Click the link for the Trusted Client CA to configure.

Configuring Authentication with the Certificate Server

To configure authentication with the certificate server, follow the steps below:

1.Select Authentication > Auth Servers.

2.Select Certificate Server and Click New Server to display the configuration page.

3.Complete the configuration as described in following table:

Settings

Guidelines

Name

Specify a name to identify the server within the system

User Name Template

Specify a username template. Specify how the system should construct a username. You may use any combination of certificate variables contained in angle brackets and plain text.

NOTE: This value populates the <USER> and <USERNAME> session variables for use throughout the rest of the system configuration.

User Record Synchronization

This applies only to Connect Secure.

Enable User Record Synchronization

Select this option to retain the bookmarks and individual preferences regardless of which system you log in to.

Logical Auth Server Name

Specify a logical authentication server name.

4.Save the configuration.

Client Certificate Installation

The installation of the certificates can be facilitated through a script. Client certificates can be installed using util script “certificate_installer.sh”. Use the following commands to install or delete the certificates:

To install the certificate:

/opt/pulsesecure/bin/certificate_installer.sh install_certificates [-inpfx < PFX /P12 file >] [-inpriv <private file> -inpub <public file>]

Password is required to install private and public keys separately.

To list the certificates on the certificate store

/opt/pulsesecure/bin/certificate_installer.sh list_installed_certificates

To delete the Certificate from certificate store

/opt/pulsesecure/bin/certificate_installer.sh delete_certificates -certName <certificate name>

To delete certificates from CEF certificate store:

/usr/bin/certutil -d sql:/ /$HOME/.pki/nssdb -D -n <Nickname>

where, 'Nickname' is available in list of installed certificates

Public Certificates

Extensions

Certificate Formats

der, cer

DER

pem, crt, key, pub

PEM

Private Keys

Extensions

Certificate Formats

der, cer

DER

pem, crt, key

PEM

PFX file (Contains both Private Key and Public Keys)

Extensions

Certificate Formats

Pfx, p12

PFX

Default Certificate Selection

If multiple certificates are available for a connection, the certificates list allows the user to select the certificate and authenticate to establish the connection.

Client certificate authentication through smart cards is not supported.