Solved

BIG-IP, F5, VPN, Client Certificate

Posted on 2014-01-17
2
851 Views
Last Modified: 2014-01-26
Hi all..

i have deployed F5 BIG-IP APM with two factor authentication. (Certificate validation and OTP). i want to enhance my configuration little bit such as grabing the user name from the client certificate. i am checking the forums and also devcentral but not able to find the accurate variable configuration. idea is to have username box read only mode so user can look his user name filled automatically by the system through APM policy.

can you please help.

Regards,
Skumar.
0
Comment
Question by:Skumar_CCSA
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 39790092
Devcentral indeed is a good place to have F5 experts to come into advices, wondrring if this regex helps. Most of it done in VPE
https://devcentral.f5.com/questions/regex-to-get-username-from-certificate-subject

Likewise iRule is available if you sre interested
https://devcentral.f5.com/wiki/irules.ClientCertificateCNChecking.ashx
0
 

Author Closing Comment

by:Skumar_CCSA
ID: 39810936
This issue resolved after following your given link.
thanks.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
AD architecture diagram 5 59
ASA 5505 packet drops 14 56
Domain Administrator locked out "Again" 7 76
Verifying if VA scan's vulnerabilities are false positives 3 52
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question