Dell PowerConnect W Clearpass 100 Software 3.7 Deployment Guide - Page 106

Managing Certificates for External Authentication Servers, Client Private Key, Passphrase

Page 106 highlights

3. In the Client Private Key row, browse to the file containing the client's private key. This must be a base-64 encoded (PEM) or binary encoded (DER) private key file. 4. (Optional) In the Passphrase row, you may enter the passphrase for the client's private key. 5. (Optional) To provide a file containing a CA certificate for verifying the server's identity, you can use the Certificate Authority row to browse to the file. If you selected Copy and paste as text for the TLS identity: 1. In the PKCS#12 row, browse to the file in your system that contains both the client certificate and the client's private key. When this file is uploaded, if a CA certificate is also included, it is used to verify the server's identity. 2. In the Client Certificate row, copy and paste the client certificate. This block of encoded text must include the lines "BEGIN CERTIFICATE" and "END CERTIFICATE". 3. In the Client Private Key row, copy and paste the client's private key. This block of encoded text must include the lines "BEGIN RSA PRIVATE KEY" and "END RSA PRIVATE KEY". 4. (Optional) In the Passphrase row, you may enter the passphrase for the client's private key. 5. (Optional) To provide a file containing a CA certificate for verifying the server's identity, you can use the Certificate Authority row to browse to the file. When you have completed the fields for the network settings, outer authentication, and inner authentication, click the Run Test button. Managing Certificates for External Authentication Servers Use the Certificates command link on the RADIUS > Authentication page to manage the list of trusted certificates used to identify external authentication servers. External authentication servers may be configured to use a TLS (Transport Layer Security) connection. For example, LDAP connections on port 636 use TLS (SSL) to provide a secure connection. TLS connections offer two kinds of security guarantees: privacy (meaning that the content of communications cannot be intercepted or modified), and authentication (meaning that the identity of the server can be verified). The public key infrastructure (PKI) required to provide these guarantees is based on the X.509 standard for digital certificates. To verify the identity of an authentication server, use the RADIUS Certificates list view to install one or more digital certificates for a certificate authority (CA). These certificates will be trusted for the purposes of identifying a remote server. When a TLS connection to an authentication server is established, the authentication server must identify itself with a certificate issued by one of the trusted certificate authorities. If the authentication server's identity cannot be established, the connection will fail. 106 | RADIUS Services Amigopod 3.7 | Deployment Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438

106
|
RADIUS Services
Amigopod 3.7
|
Deployment Guide
3.
In the
Client Private Key
row, browse to the file containing the client’s private key. This must be a
base-64 encoded (PEM) or binary encoded (DER) private key file.
4.
(Optional) In the
Passphrase
row, you may enter the passphrase for the client’s private key.
5.
(Optional) To provide a file containing a CA certificate for verifying the server’s identity, you can use the
Certificate Authority
row to browse to the file.
If you selected
Copy and paste as text
for the TLS identity:
1.
In the
PKCS#12
row, browse to the file in your system that contains both the client certificate and the
client’s private key. When this file is uploaded, if a CA certificate is also included, it is used to verify the
server’s identity.
2.
In the
Client Certificate
row, copy and paste the client certificate. This block of encoded text must
include the lines “BEGIN CERTIFICATE” and “END CERTIFICATE”.
3.
In the
Client Private Key
row, copy and paste the client’s private key. This block of encoded text must
include the lines “BEGIN RSA PRIVATE KEY” and “END RSA PRIVATE KEY”.
4.
(Optional) In the
Passphrase
row, you may enter the passphrase for the client’s private key.
5.
(Optional) To provide a file containing a CA certificate for verifying the server’s identity, you can use the
Certificate Authority
row to browse to the file.
When you have completed the fields for the network settings, outer authentication, and inner
authentication, click the
Run Test
button.
Managing Certificates for External Authentication Servers
Use the
Certificates
command link on the
RADIUS > Authentication
page to manage the list of trusted
certificates used to identify external authentication servers.
External authentication servers may be configured to use a TLS (Transport Layer Security) connection.
For
example, LDAP connections on port 636 use TLS (SSL) to provide a secure connection.
TLS connections offer two kinds of security guarantees:
privacy
(meaning that the content of
communications cannot be intercepted or modified), and
authentication
(meaning that the identity of the
server can be verified).
The public key infrastructure (PKI) required to provide these guarantees is based on the X.509 standard for
digital certificates.
To verify the identity of an authentication server, use the RADIUS Certificates list view to install one or
more digital certificates for a certificate authority (CA). These certificates will be trusted for the purposes
of identifying a remote server.
When a TLS connection to an authentication server is established, the authentication server must identify
itself with a certificate issued by one of the trusted certificate authorities. If the authentication server’s
identity cannot be established, the connection will fail.