Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

BIG-IP, F5, VPN, Client Certificate

Posted on 2014-01-17
2
846 Views
Last Modified: 2014-01-26
Hi all..

i have deployed F5 BIG-IP APM with two factor authentication. (Certificate validation and OTP). i want to enhance my configuration little bit such as grabing the user name from the client certificate. i am checking the forums and also devcentral but not able to find the accurate variable configuration. idea is to have username box read only mode so user can look his user name filled automatically by the system through APM policy.

can you please help.

Regards,
Skumar.
0
Comment
Question by:Skumar_CCSA
2 Comments
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 39790092
Devcentral indeed is a good place to have F5 experts to come into advices, wondrring if this regex helps. Most of it done in VPE
https://devcentral.f5.com/questions/regex-to-get-username-from-certificate-subject

Likewise iRule is available if you sre interested
https://devcentral.f5.com/wiki/irules.ClientCertificateCNChecking.ashx
0
 

Author Closing Comment

by:Skumar_CCSA
ID: 39810936
This issue resolved after following your given link.
thanks.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question