Forum Discussion
gd-29
Aug 12, 2019Brass Contributor
Valid Client Certificate Setup
How do you get valid client certificate to work? What i have so far. 1. CA with Intermediate, User Certificate Template cloned for this purpose 2. Issued a cert to my domain desktop and IOS devi...
rajatm
Apr 21, 2020Former Employee
i just tested with IE11 and it works as expected. i did not have to add the cert to IE, just import to user's personal store. Latest versions of Edge and Chrome work too. after trying everything above, i can only suspect an issue with the root/intermediate certs. I am sharing my testing certificates with you in a direct message. if these work for you, then you can be sure that the issue is with certs alone.
ataviste
Apr 21, 2020Copper Contributor
Hi,
I got it to work!
I had added a session policy in MCAS (which is supposed to be for browser clients). I replaced that with an access policy (see screenshot), and now things work as expected on Firefox on Linux and in IE11 on Windows (I got prompted for the cert on IE11 though, even though I'd added the client cert to the user cert store).
Trying on another machine without the client cert blocks access (to MS Exchange) as expected.
Can you confirm your working setup is with an access policy in MCAS?
Thanks for your help.
Antony
- rajatmApr 21, 2020Former Employeeyes. cert based identification works for both session and access policies. the difference is that session policies can only control activities in web-apps/browser sessions while access policies can control overall allow/block for web-apps AND native/desktop apps.
i have both session and access policies using the same certs and working as expected.
if you only need to block access to devices without certs, an access policy is the right way to go.