ltm auth ssl-cc-ldapΒΆ

ltm auth ssl-cc-ldap(1) 				BIG-IP TMSH Manual				   ltm auth ssl-cc-ldap(1)

NAME
       ssl-cc-ldap - Configures an SSL client certificate configuration object for remote SSL-based LDAP authorization for client
       traffic passing through the traffic management system.

MODULE
       ltm auth

SYNTAX
       Configure the ssl-cc-ldap component within the ltm auth module using the syntax shown in the following sections.

   CREATE/MODIFY
	create ssl-cc-ldap [name]
	modify ssl-cc-ldap [name]
	  options:
	    admin-dn [ [name] | none]
	    admin-password [none | [password] ]
	    cache-size [integer]
	    cache-timeout [integer]
	    certmap-base [none | [search base] ]
	    certmap-key [ [name] | none)
	    certmap-user-serial [no | yes]
	    description [string]
	    group-base [none | [search base] ]
	    group-key [ [name] | none]
	    group-member-key [[name] | none]
	    role-key [ [name] | none]
	    search-type [cert | certmap | user]
	    secure [no | yes]
	    servers
	      [add | delete | none | replace-all-with] {
		[ip address ... ]
	    }
	    user-base [none | [search base] ]
	    user-class [ [class] | none]
	    user-key [ [key] | none]
	    valid-groups
	      [add | delete | replace-all-with] {
		[group ... ]
	    }
	    valid-groups none
	    valid-roles
	      [add | delete | replace-all-with] {
		[role ... ]
	    }
	    valid-roles none

	edit ssl-cc-ldap [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties

   DISPLAY
	list ssl-cc-ldap
	list ssl-cc-ldap [ [ [name] | [glob] | [regex] ] ... ]
	show running-config ssl-cc-ldap
	show running-config ssl-cc-ldap
	  [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties
	    one-line
	    partition

   DELETE
	delete ssl-cc-ldap [name]

DESCRIPTION
       You can use the ssl-cc-ldap component to configure SSL client certificate-based remote LDAP authorization for client
       traffic passing through the traffic management system.

       To configure this type of authentication module and create a configuration object:

       1. Use the ssl-cc-ldap component in the ltm auth module to create an SSL client certificate LDAP configuration object.
       2. Use the profile component in the ltm auth module to create an authentication profile in which you specify the following
       options:
	   a. For the configuration option, specify the configuration object that you created in Step 1.
	   b. For the defaults-from option, specify a parent profile (either the default profile named ssl_cc_ldap or another
	   custom profile that you created).

OPTIONS
       admin-dn
	    Specifies the distinguished name of an account to which to bind to perform searches. This search account is a read-
	    only account used to do searches. The admin account can also be used as the search account. If no admin DN is
	    specified, then no bind is attempted.

	    This option is required only when an LDAP database does not allow anonymous searches. The default value is none.

       admin-password
	    Specifies the password for the admin account. See admin-dn above. The default value is none.

       cache-size
	    Specifies the maximum size, in bytes, allowed for the SSL session cache. Setting this option to 0 (zero) disallows SSL
	    session caching. The default value is 20000 bytes (20KB).

       cache-timeout
	    Specifies the number of usable lifetime seconds of negotiable SSL session IDs. When this time expires, a client must
	    negotiate a new session. The default value is 300 seconds.

       certmap-base
	    Specifies the search base for the subtree used by the certmap search method. A typical search base is:
	    ou=people,dc=company,dc=com. The default value is none.

       certmap-key
	    Specifies the name of the certificate map that the certmap search method uses. This name is found in the LDAP
	    database. The default value is none.

       certmap-user-serial
	    Specifies whether the system uses the client certificate's subject or serial number (in conjunction with the
	    certificate's issuer) when trying to match an entry in the certificate map subtree.

	    A value of yes uses the serial number. A value of no uses the subject. The default value is no.

       description
	    User defined description.

       glob Displays the items that match the glob expression. See help glob for a description of glob expression syntax.

       group-base
	    Specifies the search base for the subtree used by group searches. Use this option only when specifying the valid-
	    groups option. The typical search base is similar to: ou=groups,dc=company,dc=com. The default value is none.

       group-key
	    Specifies the name of the attribute in the LDAP database that specifies the group name in the group subtree. An
	    example of a typical key is cn (common name for the group). The default value is none.

       group-member-key
	    Specifies the name of the attribute in the LDAP database that specifies members (DNs) of a group. A typical key is
	    member. The default value is none.

       name Specifies a unique name for the component. This option is required for the commands create, delete, and modify.

       partition
	    Displays the administrative partition within which the component resides.

       regex
	    Displays the items that match the regular expression. The regular expression must be preceded by an at sign (@[regular
	    expression]) to indicate that the identifier is a regular expression. See help regex for a description of regular
	    expression syntax.

       role-key
	    Specifies the name of the attribute in the LDAP database that specifies a user's authorization roles. Use this option
	    only when specifying the valid-roles option. A typical role key is authorizationRole. The default value is none.

       search
	    Specifies the type of LDAP search that is performed based on the client's certificate. Possible values are:

	    cert Searches for the exact certificate.

	    certmap
		 Searches for a user by matching the certificate issuer and the certificate serial number or certificate.

	    user Searches for a user based on the common name found in the certificate. This is the default value.

       secure
	    Specifies whether the system attempts to use secure LDAP (LDAP over SSL). The alternative to using secure LDAP is to
	    use insecure (clear text) LDAP. Secure LDAP is a consideration when the connection between the BIG-IP system and the
	    LDAP server cannot be trusted. The default value is no.

       servers
	    Specifies a list of LDAP servers you want to search. You must specify a server when you create an SSL client
	    certificate configuration object.

       user-base
	    Specifies the search base for the subtree used when you select for the search option either of the values user or
	    cert. A typical search base is: ou=people,dc=company,dc=com. You must specify a user base when you create an SSL
	    client certificate configuration object. The default value is none.

       user-class
	    Specifies the object class in the LDAP database to which the user must belong to be authenticated. The default value
	    is none.

       user-key
	    Specifies the key that denotes a user ID in the LDAP database (for example, the common key for the user option is
	    uid). You must specify a user key when you create an SSL client certificate configuration object.

       valid-groups
	    Specifies a space-delimited list of the names of groups to which the client must belong in order to be authorized
	    (matches against the group key in the group subtree). The client needs to be a member of only one of the groups in the
	    list. The default value is none.

       valid-roles
	    Specifies a space-delimited list of the valid roles that clients must have to be authorized. The default value is
	    none.

SEE ALSO
       create, delete, edit, glob, list, ltm auth profile, ltm virtual, modify, regex, show, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
       photocopying, recording, or information storage and retrieval systems, for any purpose other than the purchaser's personal
       use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2008-2013, 2015. All rights reserved.

BIG-IP							    2015-07-22					   ltm auth ssl-cc-ldap(1)