This article describes the procedure to create and use the Citrix NetScaler client certificates.
NetScaler software release 10.1 and above
NetScaler hardware appliance or a NetScaler VPX
A client workstation, such as Microsoft Windows XP SP2
The NetScaler software consists of an SSL tools suite that enables you to generate private keys, certificate requests, and certificates. In addition, this suite can be used to create Certificate Authorities or use the pre-installed NetScaler Root Authority and create server certificates and client certificates. By default, the certificate and key files are stored in the /nsconfig/ssl directory.
The FreeBSD environment of the appliance also consists of a version of OpenSSL for advanced certificate and key administration.
The use of private certificates can cause third-party software/operating systems with built-in certificate stores to fail and operate as expected with known trusted root certificate authorities.
The Internet Explorer Web Interface must do a callback over SSL to NetScaler Gateway VPN virtual servers in Smart Access Mode and if the NetScaler root CA is not installed in the system accounts trusted root CA store, the callback fails.
Warning!The use of private certificates can cause third-party software/operating systems with built-in certificate stores to fail and operate as expected with known trusted root certificate authorities.
The Internet Explorer Web Interface must do a callback over SSL to NetScaler Gateway VPN virtual servers in Smart Access Mode and if the NetScaler root CA is not installed in the system accounts trusted root CA store, the callback fails.
To create and use the Citrix NetScaler client certificates, complete the following procedures:
To add the NS-Root-CA certificate-key pair on the NetScaler appliance, complete the following procedure:
Under Traffic Management, expand the SSL Tab and click Certificates.
On the Certificates page click Install and you will see the Install Certificate page.
While selecting the existing certificates click on the drop-down arrow besides the Browse button and select Appliance.
Now select the appropriate certificates from your preferred location and click Install.
Under Traffic Management expand the Load Balancing Tab and select Virtual Servers.
Click Add and fill in the IP, Port and Protocol details and click OK.
Bind the services to this load balancing virtual server and click Continue.
You will now see the Certificates option and you can add the certificates as CA and Server certificate.
Click on each of the Certificates tab and bind the NS-Root-CA certificate.
After binding the certs click on OK and now you will see SSL Parameters options. Click on the Edit option.
Enable Client Authentication and select the Mandatory option from the drop down menu.Click Ok.
Note: The screen shot displays the sample values for your reference.
Click the Create Certificate Signing Request link. The Create Certificate Signing Request dialog box is displayed. Specify appropriate values for the various fields. The screen shot displays the sample values for your reference. Ensure to select the PEM key format. This enables you to export the certificate request to a PKCS12 file.
Again in SSL page click on Certificate and open the Create Certificate page. Fill in appropriate details.
Click on 'Export PKCS12 file' on the SSL page. Fill in name of the pfx file that you want to export. Click OK.
Click Add and select the Certificates snap-in.
The Certificate snap-in wizard verifies the user managing certificates. Ensure that you select current user.
When the snap-in starts, right-click Personal.
From the All Actions menu, select Import.
In the Certificate Import Wizard, click Next.
Click Browse to locate and select the appropriate .pfx file and click Next.
In the Password section, type the password you had used to create the pfx file and click Next.
In the Certificate Store section, ensure that Personal is selected in Certificate store: field.
Verify if the client certificate is added to MMC Certificates Snap-In under the Personal store.