Am I required to setup a usermapping for a clientcertificate in order to have client certificate authentication to work as expected (in IIS)?

北战南征 提交于 2019-12-08 03:24:28

问题


Linked to my question about client certificate authentication done the right way I was wondering whether I have to take the step to link a certificate to a user (active directory or local user) in order to have clientcertificate authentication to work as expected?

And is it necessary to disable all other authentication schemes (anonymous, windows) for clientcerticate authentication to happen?


回答1:


See this question on the IIS forum:

This is what I would like to achieve:

  1. A SSL-certificate for the URL itself (https://example.company.com). To my understanding this certificate does not have any connection whatsoever to client certificates.
  2. Client certificates issued from my local CA and shared to trusted clients.
  3. Some way of specifying which client certificates are allowed to connect to a specific IIS web site.

3 seems... complicated, to say the least. If I just set everything up and connect with a client certificate I have issued it works. The CA and the web server are on the same domain (if that matters), and I have added the root certificate from the CA to the trusted CAs on the web server. However, at this stage I have not told the web server which client certificates to accept, so my first guess was that it accepts all client certificates [chained to] any CA it trusts.

See also this question, which links to this site, which is dead.

It comes down to creating a "Certificate Trust List", or to mapping certificates to user accounts.

You can however implement a custom certificate validator in your service, how to do so is explained here.



来源:https://stackoverflow.com/questions/14440777/am-i-required-to-setup-a-usermapping-for-a-clientcertificate-in-order-to-have-cl

易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!