Hello,
A client certificate issued by a Windows CA can only be used if the corresponding computer object in Active Directory is activated (OpenOTP licensed).
If you use the RCDevs CA, the client certificate is stored in the WebADM SQL database, and no OpenOTP license is required for this use case.
The username mismatch issue has been reproduced on our side, and there is nothing that can be done at your level to resolve it. We will coordinate with the development team to address the problem.
Regards
Hello,
There is a simple endpoint that can be called to issue a certificate for EAP-TLS authentication:
https://${fromServer}/mycert/${role}/${hostname}/${PRODUCT_NAME,,}
The certificate request must then be approved in the WebADM GUI. Once approved, the corresponding SQL entry is created automatically, and the test.crt file will contain both the certificate and the private key. That certificate will be flagged as specified in the request : CLIENT.
If you don't want any interaction with the admin portal, then you can set the API in auto-approval mode but it is only in auto-approval mode for a specific period.
WebADM GUI > Admin > Create Client / Server Certificate > Auto Confirm Mode
Alternatively, you can generate your own CSR and private key, then submit the CSR through the WebADM Manager API using the method described here:
https://docs.rcdevs.com/webadm-sign_certificate_request/
The certificate stored in SQL is currently marked as OTHER instead of CLIENT. In principle, it should be usable with PKI login, but this does not appear to be the case at the moment.
I will confirm if this behavior is intended with the development team and will get back to you.
Regards,
Hello,
There are two possibilities:
The certificate is issued and stored on the computer object (through AD CA or WebADM CA, which requires an OpenOTP license for authentication).
In this scenario, the RADIUS AVP can be configured on the group to which the computer belongs, or directly on the computer object itself.
Please see the attached screenshots.
If you are using client certificates stored in SQL, the certificate must include the RADIUS AVP.
In this scenario, it is unlikely that the AVP can be added through an automated script, as the RADIUS AVP can only be configured via the client certificate issuance form. (screenshots attached)
Hello,
We are currently reviewing the available options with the development team and will get back to you as soon as we have further updates.
At this stage, they have agreed to enhance the Manager API methods so that you can script and dynamically pass the RADIUS attributes during certificate issuance for script execution. We will also verify whether a similar approach can be implemented through the /mycert/ endpoint.
Regarding OpenOTP licensing for computer objects, we are assessing how this can be managed on our side.
Regarding the mismatch username topic, we will have a version fixing this in the coming days on next week.
I noticed that you have an Enterprise License. You may also contact us via the support email address to open a ticket, which will help us track and follow up on this topic more efficiently.
Regards,
Hello Roland,
To keep you updated on your request: we have adapted the Manager API method to allow certificate signing.
The method now supports issuing CLIENT type certificates and adding RADIUS attributes to the certificate.
These certificates will be stored in SQL and will not consume any user license for the EAP-TLS computer authentication use case. That will allow you to script the deployment.
Here is how it works :
- Issue a CSR and it's key with OpenSSL.
- Submit the CSR to WebADM Manager API, method Sign_Certificate_Request
As parameter of this method, you will found, expires for cert expiration, altname, type (CLIENT or SERVER), radius (for radius AVP)
Here is a PHP example :
Then if the call succeed, you will receive the certificate signed as response and the certificate will be stored in SQL :
If you check the content of the certificate, you will see our custom OID :
You now need to build a .p12 or .pfx file containing both the certificate and the private key in order to import it into Windows. This step may be optional, as I am not fully certain whether Windows allows importing the certificate and private key separately.
The version including this improvement is not yet available, but it will be released soon in our repository (WebADM 2.4.15-1).
I am also confirming one additional point with the development team regarding restricting the certificate usage to a specific application (OpenOTP or Spankey). An additional parameter may be introduced in the method, such as "application", to enforce this restriction.
Hope this help.
If you have any questions, please let me know.
Regards
Final version:
AlternativeNames cannot be passed through the CSR. If included in the CSR, they will be removed from the signed certificate. They must be explicitly provided as a parameter in the API call.
AlternativeNames can only be added with SERVER type.
Application can only be added with CLIENT type.
Attributes can only be added with CLIENT type.