Cisco 5505 Administration Guide - Page 79

Extended Certificate Key Usage Matching, Certificate Distinguished Name Mapping

Page 79 highlights

Chapter 7 Configuring and Using AnyConnect Client Operating Modes and User Profiles Configuring Profile Attributes • DATA_ENCIPHERMENT • KEY_AGREEMENT • KEY_CERT_SIGN • CRL_SIGN • ENCIPHER_ONLY • DECIPHER_ONLY The profile can contain none or more matching criteria. If one or more criteria are specified, a certificate must match at least one to be considered a matching certificate. The example in Certificate Matching Example, page 7-15 shows how you might configure these attributes. Extended Certificate Key Usage Matching This matching allows an administrator to limit the certificates that can be used by the client, based on the Extended Key Usage fields. Table 7-3 lists the well known set of constraints with their corresponding object identifiers (OIDs). Table 7-3 Extended Certificate Key Usage Constraint serverAuth clientAuth codeSign emailProtect ipsecEndSystem ipsecTunnel ipsecUser timeStamp OCSPSign dvcs OID 1.3.6.1.5.5.7.3.1 1.3.6.1.5.5.7.3.2 1.3.6.1.5.5.7.3.3 1.3.6.1.5.5.7.3.4 1.3.6.1.5.5.7.3.5 1.3.6.1.5.5.7.3.6 1.3.6.1.5.5.7.3.7 1.3.6.1.5.5.7.3.8 1.3.6.1.5.5.7.3.9 1.3.6.1.5.5.7.3.10 As an administrator, you can add your own OIDs if the OID you want is not in the well known set. The profile can contain none or more matching criteria. A certificate must match all specified criteria to be considered a matching certificate. See profile example in Appendix A, "Sample AnyConnect Profile and XML Schema" for an example. Certificate Distinguished Name Mapping The certificate distinguished name mapping capability allows an administrator to limit the certificates that can be used by the client to those matching the specified criteria and criteria match conditions. Table 7-4 lists the supported criteria: OL-12950-012 Cisco AnyConnect VPN Client Administrator Guide 7-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118

7-13
Cisco AnyConnect VPN Client Administrator Guide
OL-12950-012
Chapter 7
Configuring and Using AnyConnect Client Operating Modes and User Profiles
Configuring Profile Attributes
DATA_ENCIPHERMENT
KEY_AGREEMENT
KEY_CERT_SIGN
CRL_SIGN
ENCIPHER_ONLY
DECIPHER_ONLY
The profile can contain none or more matching criteria. If one or more criteria are specified, a certificate
must match at least one to be considered a matching certificate.
The example in
Certificate Matching Example, page 7-15
shows how you might configure these
attributes.
Extended Certificate Key Usage Matching
This matching allows an administrator to limit the certificates that can be used by the client, based on
the
Extended Key Usage
fields.
Table 7-3
lists the well known set of constraints with their corresponding
object identifiers (OIDs).
As an administrator, you can add your own OIDs if the OID you want is not in the well known set. The
profile can contain none or more matching criteria. A certificate must match all specified criteria to be
considered a matching certificate. See profile example in
Appendix A, “Sample AnyConnect Profile and
XML Schema”
for an example.
Certificate Distinguished Name Mapping
The certificate distinguished name mapping capability allows an administrator to limit the certificates
that can be used by the client to those matching the specified criteria and criteria match conditions.
Table 7-4
lists the supported criteria:
Table 7-3
Extended Certificate Key Usage
Constraint
OID
serverAuth
1.3.6.1.5.5.7.3.1
clientAuth
1.3.6.1.5.5.7.3.2
codeSign
1.3.6.1.5.5.7.3.3
emailProtect
1.3.6.1.5.5.7.3.4
ipsecEndSystem
1.3.6.1.5.5.7.3.5
ipsecTunnel
1.3.6.1.5.5.7.3.6
ipsecUser
1.3.6.1.5.5.7.3.7
timeStamp
1.3.6.1.5.5.7.3.8
OCSPSign
1.3.6.1.5.5.7.3.9
dvcs
1.3.6.1.5.5.7.3.10