ltm auth ssl-cc-ldapΒΆ

ltm auth ssl-cc-ldap(1) 			  BIG-IP TMSH Manual			      ltm auth ssl-cc-ldap(1)

NAME
       ssl-cc-ldap - Configures an SSL client certificate configuration object for remote SSL-based LDAP
       authorization for client traffic passing through the traffic management system.

MODULE
       ltm auth

SYNTAX
       Configure the ssl-cc-ldap component within the ltm auth module using the syntax shown in the following
       sections.

   CREATE/MODIFY
	create ssl-cc-ldap [name]
	modify ssl-cc-ldap [name]
	  options:
	    admin-dn [ [name] | none]
	    admin-password [none | [password] ]
	    cache-size [integer]
	    cache-timeout [integer]
	    certmap-base [none | [search base] ]
	    certmap-key [ [name] | none)
	    certmap-user-serial [no | yes]
	    description [string]
	    group-base [none | [search base] ]
	    group-key [ [name] | none]
	    group-member-key [[name] | none]
	    role-key [ [name] | none]
	    search-type [cert | certmap | user]
	    secure [no | yes]
	    servers
	      [add | delete | none | replace-all-with] {
		[ip address ... ]
	    }
	    user-base [none | [search base] ]
	    user-class [ [class] | none]
	    user-key [ [key] | none]
	    valid-groups
	      [add | delete | replace-all-with] {
		[group ... ]
	    }
	    valid-groups none
	    valid-roles
	      [add | delete | replace-all-with] {
		[role ... ]
	    }
	    valid-roles none

	edit ssl-cc-ldap [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties

   DISPLAY
	list ssl-cc-ldap
	list ssl-cc-ldap [ [ [name] | [glob] | [regex] ] ... ]
	show running-config ssl-cc-ldap
	show running-config ssl-cc-ldap
	  [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties
	    one-line
	    partition

   DELETE
	delete ssl-cc-ldap [name]

DESCRIPTION
       You can use the ssl-cc-ldap component to configure SSL client certificate-based remote LDAP authorization for
       client traffic passing through the traffic management system.

       To configure this type of authentication module and create a configuration object:

       1. Use the ssl-cc-ldap component in the ltm auth module to create an SSL client certificate LDAP configuration
       object.
       2. Use the profile component in the ltm auth module to create an authentication profile in which you specify
       the following options:
	   a. For the configuration option, specify the configuration object that you created in Step 1.
	   b. For the defaults-from option, specify a parent profile (either the default profile named ssl_cc_ldap or
	   another custom profile that you created).

OPTIONS
       admin-dn
	    Specifies the distinguished name of an account to which to bind to perform searches. This search account
	    is a read-only account used to do searches. The admin account can also be used as the search account. If
	    no admin DN is specified, then no bind is attempted.

	    This option is required only when an LDAP database does not allow anonymous searches. The default value
	    is none.

       admin-password
	    Specifies the password for the admin account. See admin-dn above. The default value is none.

       cache-size
	    Specifies the maximum size, in bytes, allowed for the SSL session cache. Setting this option to 0 (zero)
	    disallows SSL session caching. The default value is 20000 bytes (20KB).

       cache-timeout
	    Specifies the number of usable lifetime seconds of negotiable SSL session IDs. When this time expires, a
	    client must negotiate a new session. The default value is 300 seconds.

       certmap-base
	    Specifies the search base for the subtree used by the certmap search method. A typical search base is:
	    ou=people,dc=company,dc=com. The default value is none.

       certmap-key
	    Specifies the name of the certificate map that the certmap search method uses. This name is found in the
	    LDAP database. The default value is none.

       certmap-user-serial
	    Specifies whether the system uses the client certificate's subject or serial number (in conjunction with
	    the certificate's issuer) when trying to match an entry in the certificate map subtree.

	    A value of yes uses the serial number. A value of no uses the subject. The default value is no.

       description
	    User defined description.

       glob Displays the items that match the glob expression. See help glob for a description of glob expression
	    syntax.

       group-base
	    Specifies the search base for the subtree used by group searches. Use this option only when specifying
	    the valid-groups option. The typical search base is similar to: ou=groups,dc=company,dc=com. The default
	    value is none.

       group-key
	    Specifies the name of the attribute in the LDAP database that specifies the group name in the group
	    subtree. An example of a typical key is cn (common name for the group). The default value is none.

       group-member-key
	    Specifies the name of the attribute in the LDAP database that specifies members (DNs) of a group. A
	    typical key is member. The default value is none.

       name Specifies a unique name for the component. This option is required for the commands create, delete, and
	    modify.

       partition
	    Displays the administrative partition within which the component resides.

       regex
	    Displays the items that match the regular expression. The regular expression must be preceded by an at
	    sign (@[regular expression]) to indicate that the identifier is a regular expression. See help regex for
	    a description of regular expression syntax.

       role-key
	    Specifies the name of the attribute in the LDAP database that specifies a user's authorization roles. Use
	    this option only when specifying the valid-roles option. A typical role key is authorizationRole. The
	    default value is none.

       search
	    Specifies the type of LDAP search that is performed based on the client's certificate. Possible values
	    are:

	    cert Searches for the exact certificate.

	    certmap
		 Searches for a user by matching the certificate issuer and the certificate serial number or
		 certificate.

	    user Searches for a user based on the common name found in the certificate. This is the default value.

       secure
	    Specifies whether the system attempts to use secure LDAP (LDAP over SSL). The alternative to using secure
	    LDAP is to use insecure (clear text) LDAP. Secure LDAP is a consideration when the connection between the
	    BIG-IP system and the LDAP server cannot be trusted. The default value is no.

       servers
	    Specifies a list of LDAP servers you want to search. You must specify a server when you create an SSL
	    client certificate configuration object.

       user-base
	    Specifies the search base for the subtree used when you select for the search option either of the values
	    user or cert. A typical search base is: ou=people,dc=company,dc=com. You must specify a user base when
	    you create an SSL client certificate configuration object. The default value is none.

       user-class
	    Specifies the object class in the LDAP database to which the user must belong to be authenticated. The
	    default value is none.

       user-key
	    Specifies the key that denotes a user ID in the LDAP database (for example, the common key for the user
	    option is uid). You must specify a user key when you create an SSL client certificate configuration
	    object.

       valid-groups
	    Specifies a space-delimited list of the names of groups to which the client must belong in order to be
	    authorized (matches against the group key in the group subtree). The client needs to be a member of only
	    one of the groups in the list. The default value is none.

       valid-roles
	    Specifies a space-delimited list of the valid roles that clients must have to be authorized. The default
	    value is none.

SEE ALSO
       create, delete, edit, glob, list, ltm auth profile, ltm virtual, modify, regex, show, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or
       mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
       other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2008-2013, 2015. All rights reserved.

BIG-IP						      2015-07-22			      ltm auth ssl-cc-ldap(1)