A device certificate verifies that a user device is allowed to connect to the internal network. NetScaler Gateway supports device certificates that enable you to bind the device identity to a public key.
Notes:
You must install NetScaler Gateway 10.1, Build 120.1316.e or later or 10.5.e.x or 10.5.x to configure device certificates.
When users log on, you can require only the device certification as part of the authentication process. You can also require the device certificate when using pre-authentication or advanced endpoint analysis policies.
NetScaler Gateway needs to verify the device certificate before the endpoint analysis scan runs or before the logon page appears. If you configure endpoint analysis, the endpoint scan runs to verify the user device. When the device passes the scan and after NetScaler Gateway verifies the device certificate, users can then log on to the NetScaler Gateway.
If you install two or more device certificates on the client machines, users need to select the correct certificate when they start to log on to NetScaler Gateway or before the endpoint analysis scan runs.
When you create the device certificate, it must be an X.509 certificate.
If you have a device certificate issued by an intermediate CA, then both intermediate and root CA certificates need to be bound.
The EPA client needs the user to have local administrator rights to be able to access the machine certificate store. This is rarely the case, so a workaround is to install the full NetScaler Gateway plug-in which can access the local store.
To configure Device Certificate, complete the following steps:
Install the Device Certificate Issuer’s Certificate Authority Certificate on the NetScaler Gateway
Create/Bind OCSP (Responder) on Device Certificate Issuer’s Certificate Authority Certificate
Client-Side Configuration and Verification of Device Certificate on Windows Machine
Note: All the Client intended to avail the Device Certificate EPA check should have the device certificate installed in the system certificate store of the machine.
Ensure that you have the Device Certificate issuer’s CA certificate.
Upload the Device Certificate issuer’s certificate to the NetScaler Gateway to /flash/nsconfig/ssl/ or any custom location using SCP or NetScaler Gateway portal.
Uploading Through SCP:
Uploading Through NetScaler Gateway Portal:
Navigate to Traffic Management > SSL Click Manage Certificates and upload the Device Certificate issuer’s CA certificate.
Navigate to Traffic Management > SSL > Certificates > Install
Enter the relevant information and select the location of the certificate file and click Install.
If the certificate is installed correctly then it will be listed under the Traffic Management > SSL > Certificates page.
Binding the CA certificate from CLI:
bind ssl vserver TestClient -CertkeyName ag51.xm.nsi.test.com -CA -ocspCheck Mandatory
Note: oscpCheck is optional if OCSP check is not required for Device Certificate.
Binding using NetScaler Gateway Admin Portal:
To create OCSP responder using CLI:
add ssl ocspResponder ocsp_responder1 -url "http:// www.myCA.org:80/ocsp/" -cache ENABLED -cacheTimeout 30 -batchingDepth 8 -batchingDelay 100 -resptimeout 100 -responderCert responder_cert -producedAtTimeSkew 300 -signingCert sign_cert -insertClientCert YES bind ssl certKey ca_cert -ocspResponder ocsp_responder1 -priority 1 sh ocspResponder ocsp_responder1 1)Name: ocsp_responder1 URL: http://www.myCA.org:80/ocsp/, IP: 192.128.22.22 Caching: Enabled Timeout: 30 minutes Batching: 8 Timeout: 100 mS HTTP Request Timeout: 100mS Request Signing Certificate: sign_cert Response Verification: Full, Certificate: responder_cert ProducedAt Time Skew: 300 s Nonce Extension: Enabled Client Cert Insertion: Enabled Done show certkey ca_cert Name: ca_cert Status: Valid, Days to expiration:8907 Version: 3 … 1) VServer name: vs1 CA Certificate 1) OCSP Responder name: ocsp_responder1 Priority: 1 Done sh ssl vs vs1 Advanced SSL configuration for VServer vs1: DH: DISABLED … 1) CertKey Name: ca_cert CA Certificate OCSPCheck: Mandatory 1) Cipher Name: DEFAULT Description: Predefined Cipher Alias
Note: Insert Certificate is optional.
To create OCSP Responder using NetScaler Gateway Portal, navigate to Traffic Management > SSL > OCSP Responder > Add.
Bind the OCSP responder to the Device Certificate issuer’s CA certificate.
To enable the Device Certificate feature and add the Device Certificate issuer’s CA Certificate name to the list, use the following command:
set vpn vserver TestClient -deviceCert on -certkeyNames DeviceCertCA1, DeviceCertCA2
Note: For multiple CAs add commas. Only max 10 CA certificates are supported.
To enable the device certificate feature on the NetScaler Gateway virtual server from Admin portal:
Navigate to NetScaler Gateway > Virtual Server > Basic setting > More > Device Certificate Option.
Click Add to add the available Device Certificate CA certificate name.
There are multiple ways to configure the Device Certificate on a Windows machine:
Device Certificate install using Windows Certificate Web Enrollment.
Device Certificate install using Active Directory GPO.
Device Certificate install using Simple Certificate Enrollment Protocol (SCEP).
Note: Ensure that the logon user has privileges to read the Device Certificate key. It is recommended that NetScaler Gateway plug-in is installed on device for Device Certificate EPA Check to work smoothly.
Open a browser and access the NetScaler Gateway FQDN.
Allow the Citrix End Point Analysis (EPA) client to run. If not already installed then install EPA.
Citrix EPA runs and validates the Device Certificate and redirects to the authentication page if the Device Certificate EPA check passes, else it redirects you to EPA error page. In case you have other EPA checks, then the EPA scan results depend on the configured EPA checks.
For further debugging on the client, examine the following EPA logs on client:
C:\Users\<User name>\AppData\Local\Citrix\AGEE\nsepa.txt
Note: Device certificate verification with CRL is not supported.
Citrix Documentation - Creating Device Certificates for Authentication