Using CA certificates for client verification
  • 03 Jan 2025
  • 1 Minute à lire
  • Sombre
    Lumière
  • PDF

Using CA certificates for client verification

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

Client certificates are used when connecting to secure remote services to verify and confirm the identity of those remote services (authenticity), typically by verifying the client certificates using trusted root CAs.

OneSpan Authentication Server Appliance uses CA certificates/bundles to verify client certificates of the following components:

  • SEAL communicator
  • SOAP communicator
  • IBM Security Directory Server back-end servers
  • Active Directory (AD) back-end servers
  • Live audit
  • Message Delivery Component (MDC) SMS servers
  • Message Delivery Component (MDC) SMPP servers
  • Message Delivery Component (MDC) SMTP servers
  • Message Delivery Component (MDC) voice servers

Whenever you need to specify a client certificate for one of these components, you select the respective certificate from a list containing all valid and trusted CA certificates imported using the Certificate Management page.

By default, OneSpan Authentication Server Appliance already contains the cURL CA root certificate bundle.

The following procedure describes exemplarily how to change the client certificate for the communicator components.

To select a CA certificate/bundle for a communicator component

  1. Launch the OneSpan Authentication Server Appliance Configuration Tool and enter your credentials (see  Accessing OneSpan Authentication Server Appliance Configuration Tool and OneSpan Authentication Server Administration Web Interface).
  2. Select Authentication Server > SEAL Communicator or Authentication Server > SOAP Communicator, depending on the communicator component to configure.
  3. Set Require Client Certificate to Optional, Required, or Required-signed address only.
  4. Select a CA certificate/bundle from the CA Certificate Store list.

    The CA Certificate Store list contains all valid and trusted CA certificates you have previously created/imported using the Certificate Management page (see  Managing certificates).

  5. If required, select Re-Verify on Re-Negotiation.

    This option should be used sparingly and only if really necessary. It performs the SSL handshake each time you reconnect. If you reconnect each time you send a message, you should not select this option as it will decrease the performance.

  6. If you are using SEAL, select Automatically Trust Certificates to trust server certificates automatically.
  7. Click Save to finish.

    Client certificate configuration (SEAL)

    Figure:  Client certificate configuration (SEAL)


Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle