Security

last person joined: yesterday 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

[TUTORIAL] How to generate TLS certificates for Linux using the Onboard CA

This thread has been viewed 8 times
  • 1.  [TUTORIAL] How to generate TLS certificates for Linux using the Onboard CA

    EMPLOYEE
    Posted Mar 17, 2014 06:42 AM

    This is a tutorial about how to manually generate TLS certificates from the ClearPass Onboard CA for Linux Clients, since Onboard does not have an automatic facility to do so for Linux devices.  This tutorial assumes that you have already created your Onboard CA and  Onboard is also distributing certificates automatically for other Client OSs.  It also assumes that you already have a service in ClearPass Policy Manager created that will successfully authenticate clients that have EAP-TLS certificates generated by Onboard.  It DOES NOT describe how to install the certificates on the many different flavors of Linux.  Please consult directions on your Linux supplicant on how to install EAP-TLS certificates.

     

    Steps:

    1.  On the main page of ClearPass policy manager, click on On ClearPass Onboard:screen1.png

     

    2.  Go to Management and Control> View by Certificatescreen2.png

    3.  Click on "Generate A New Certificate Signing Request"

    screen3.png

    4.  Ensure that

    - The Certificate type is TLS Client Certificate

    - The Common Name field matches the user's username in Active Directory of whatever directory you are using.  This is so that you can later check to see if the account is active in that directory prior to successful authentication.  It will also show up in the controller as the username of the certificate

    - The email address field is filled out.  This can be used in later versions of ClearPass to email the user when the certificate is about to expire.

    - The Key Type is 2048-bit RSA

    - The device type is Linux so that you will be able to know just by looking at the certificate in a List

    - The Mac address field is filled out correctly.  During authentication, you can optionally use this attribute to compare the mac address on the certificate with the mac address of the user as an additional check to make sure it was not copied.

    - The username field matches the username

    - Issue this certificate Immediately is checked

    screen4-generic.png

     

    5.  Find the certificate you just generated and click on Export Certificate.

    screen5-generic.png

     

    6.  Export the certificate in PKCS#12 format (.p12 extension) and put a strong passphrase on it.  The passphrase will be used to install the client certificate later.  Only the administrator should know this passphrase so that it can only be installed by the administrator and NOT the user.  This is so that the user cannot install it on any other machine:

    screen6.png

     

    7.  Save the .p12 file somewhere temporary:

    screen7-generic.png

     

    8.  Exporting the Server Certificate.  On the ClearPass Policy Manager side, go to Administration> Certificates> Server Certificate:screen8.png

     

    9.  Click on Export Server Certificate:

    screen9.png

     

    10.  This will create a .zip file with a .crt file and a .pkey file.  Destroy the .pkey file.  You will only need the .crt server certificate file and .p12 file to install on the client.  You will also need the the client's TLS passphrase to install:

     

    screen10.png

     

    This is all that is needed from the Onboard side to generate a certificate.  Please see how to install the server certificate as well as the user certificate (.p12) file on various flavors of clients at the external link here:  https://uniluug.org/wiki/Template:EAP-TLS



  • 2.  RE: [TUTORIAL] How to generate TLS certificates for Linux using the Onboard CA

    Posted Jul 22, 2014 05:27 AM

    Hello,

     

    Clearly its a main disadvantage not to have Linux covered by the onboard product.

     

    Is it fair to say or help me understand otherwise, that a helpdesk function would be required to generate the certificates required for Linux across the entprise and there is no method for a user to self generate a certificate once authenticated via Active Directory/LDAP for example?

     

    Thanks

    Ken

     

     



  • 3.  RE: [TUTORIAL] How to generate TLS certificates for Linux using the Onboard CA

    EMPLOYEE
    Posted Jul 22, 2014 08:30 AM

    Ken,

     

    If you want to see Linux Support for onboarding in the product, please register your desire at the Ideas Portal here:  https://arubanetworkskb.secure.force.com/cp/ideas/ideaList.apexp



  • 4.  RE: [TUTORIAL] How to generate TLS certificates for Linux using the Onboard CA

    Posted Mar 29, 2019 03:38 PM

    Note:

     

    https://community.arubanetworks.com/t5/Security/Onboarding-for-Linux/m-p/193701/highlight/true#M14379

     

    In the NetworkManager configuration, you must leave off the CA certificate as linux refuses to validate a self-signed cert.