User's Manual
6. Configuration Using the Web Interface
Version 6.6
73
MediaPack Series
6.5.1.4.3 Mutual TLS Authentication
By default, servers using TLS provide one-way authentication. The client is certain that the
identity of the server is authentic. When an organizational PKI is used, two-way
authentication may be desired - both client and server should be authenticated using X.509
certificates. This is achieved by installing a client certificate on the managing PC and
loading the root CA's certificate to the device's Trusted Root Certificate Store. The Trusted
Root Certificate file may contain more than one CA certificate combined, using a text
editor.
Since X.509 certificates have an expiration date and time, the device must be configured to
use NTP to obtain the current date and time. Without the correct date and time, client
certificates cannot work.
To enable mutual TLS authentication for HTTPS:
1.
Set the 'Secured Web Connection (HTTPS)' field to
HTTPS Only
to ensure you have
a method for accessing the device in case the client certificate does not work. Restore
the previous setting after testing the configuration.
2.
Open the Certificates page (see 'Replacing the Device's Certificate' on page
3.
In the
Upload certificate files from your computer
group, click the
Browse
button
corresponding to the 'Send Trusted Root Certificate Store ...' field, navigate to the file,
and then click
Send File
.
4.
When the operation is complete, set the 'Requires Client Certificates for HTTPS
connection' field to
Enable
(see 'Configuring Web Security Settings' on page
5.
Save the configuration with a device reset.
When a user connects to the secured Web interface of the device:
If the user has a client certificate from a CA that is listed in the Trusted Root Certificate
file, the connection is accepted and the user is prompted for the system password.
If both the CA certificate and the client certificate appear in the Trusted Root
Certificate file, the user is not prompted for a password (thus, providing a single-sign-
on experience - the authentication is performed using the X.509 digital signature).
If the user does not have a client certificate from a listed CA or does not have a client
certificate, the connection is rejected.
Notes:
•
The process of installing a client certificate on your PC is beyond the
scope of this document. For more information, refer to your operating
system documentation, and/or consult your security administrator.
•
The root certificate can also be loaded via the Automatic Update facility,
using the HTTPSRootFileName ini file parameter.
•
You can enable the device to check whether a peer's certificate has been
revoked by an Online Certificate Status Protocol (OCSP) server.
Содержание MediaPack MP-114
Страница 2: ......
Страница 6: ...User s Manual 6 Document LTRT 71405 MediaPack Series Reader s Notes...
Страница 8: ...User s Manual 8 Document LTRT 71405 MediaPack Series Reader s Notes...
Страница 20: ...User s Manual 20 Document LTRT 71405 MediaPack Series Figure 5 MediaPack Startup Process Diagram...
Страница 36: ...User s Manual 36 Document LTRT 71405 MediaPack Series Reader s Notes...
Страница 42: ...User s Manual 42 Document LTRT 71405 MediaPack Series Reader s Notes...
Страница 154: ...User s Manual 154 Document LTRT 71405 MediaPack Series Reader s Notes...
Страница 163: ...User s Manual 9 Technical Specifications Version 6 6 163 MediaPack Series Reader s Notes...
Страница 164: ...User s Manual www audiocodes com www audiocodes com...