Certificate Technology On Junos Pulse Secure Access
Certificate Technology On Junos Pulse Secure Access
Certificate Technology On Junos Pulse Secure Access
Introduction: ........................................................................................................................................ 1
Creating a Certificate signing request (CSR): ................................................................................... 1
Import Intermediate CAs: …………………………………………………………………………………3
Using Trusted Client CA on Juno Pulse Secure Access device: .................................................... 5
Import Trusted Client CA Certificates ............................................................................................... 5
Configuring Options for Trusted Client CA Certificates: ................................................................. 6
Configure Certificate Server …………………………………….…………………………………………………………… 8
Configure Certificate Restrictions ……………………………………………………………………………………...…. 9
Using Trusted Server CAs................................................................................................................. 10
Uploading Trusted Server CA Certificates ………………………………………..…………………………………. 11
Using Code-signing Certificates....................................................................................................... 12
Importing a Code-Signing CA Certificate ……………………………..……………………………………………….12
Certificates Troubleshooting tips: ................................................................................................... 14
Introduction:
A device certificate helps to secure network traffic to and from a Junos Pulse Secure Access using a
combination of X.509 certificates and symmetric key encryption.
When you initialize a Junos Pulse Secure Access device, a temporary self-signed certificate will be created
locally that enables users to immediately begin using the device. Please note, encryption with the self-signed
certificate is perfectly safe, but users will be prompted with a security alert each time they sign in to the device
because the certificate is not issued by a trusted certificate authority (CA).
For production purposes, we recommend to obtain a digital certificate from a public certificate authority (like
VeriSign, Thawte, etc.). Signed device certificate can be added to Junos Pulse Secure Access device by
creating a certificate signing request (CSR) through the administrator web interface, then send the request to
a CA for processing. W hen a CSR is created through the admin web interface, a private key is created locally
that corresponds to the CSR. If the CSR is deleted, the private key will be deleted as well, and prohibit
installation of the signed certificate that matches the CSR.
1. In the administrator web interface, navigate to System > Configuration > Certificates > Device
Certificates.
2. Click New CSR.
3. Enter the required information (CN and Organization are required fields) and click Create CSR. The
Certificate Signing Request page appears with encoded text.
Ensure to copy the begin and end lines and submit it to your certificate authority in one of the following ways:
• Save the text as a .cert file and attach it to an email message to the CA.
• Paste the text into an email message to the CA
• Paste the text into a W eb form provided by the CA
Note: When submitting a certificate signing request (CSR) to a CA authority, you may be asked to specify
the type of Web server. Select apache_modssl (if more than one option with apache_modssl is available,
choose any). Also, if prompted for the certificate format to download, select X.509 or Base-64 format.
5. When you receive the signed certificate from the CA, perform the following steps below:
a. In the administrator Console, navigate to System > Configuration > Certificates > Device Certificates
b. Click Pending Certificate Signing Request link.
c. Browse to the certificate file you received from the CA (cert.cer) and click Import
If the certificate is issued from an intermediate certificate, you will need to import the intermediate CAs under
Intermediate Devices CAs. Within a certificate hierarchy, one or more intermediate certificates may be issued
from a single root certificate. The root certificate is issued by a root certificate authority (CA) and is self-
signed. Each intermediate certificates is issued by the certificate above it in the chain.
1. In the administrator web interface, navigate to System > Configuration > Certificates > Device
Certificates.
2. Click Intermediate Device CAs.
Note: Ensure certificates are added starting from the top-down (Root > Intermediate). Check for certificate
validity and replace any expired certificates
When validating a client-side CA certificate, Junos Pulse Secure Access device validates the certificate is a
valid (not expired) and signed by a certificate authority in the Trusted Client CA list. Junos Pulse Secure
Access device will validate all certificates in hierarchy until it reaches the root CA, checking the validity of
each issuer as it goes up the CA chain order.
CRL (Certificate Revocation List) - A certificate revocation list (CRL) is a mechanism for cancelling a client-
side certificate. As the name implies, a CRL is a list of revoked certificates published by a CA or delegated
CRL issuer. The system supports base CRLs, which include all of the company’s revoked certificates in a
single, unified list.
To configure CRL client certificate status checking, perform the following steps:
1. From the Trusted Client CA list, click on the CA certificate which signs the end user certificates.
2. Under client certificate status checking, select the radio button Use CRLs (Certificate Revocation Lists).
3. Click Save Changes
4. Under CRL Settings, select CRL Checking Options.
5. From the Use drop-down, select CDP(s) specified in client certificates
6. Click Save Changes
In rare instances, the CDP may not be given in the client certificates. In this scenario, change from CDP(s)
specified in client certificates to Manually configured CDP. For CDP information, please reach out to your
certificate authority administrator to confirm the CDP URL and LDAP credentials (if LDAP is utilized)
Note: The above example is only to perform CRL checking for client certificates. In rare situation, if CRL
checking is required for each CA in the hierarchy, you will need to configure CRL check for each CA and
select CDP(s) specified in the Trusted Client CA.
OCSP (Online Certificate Status Protocol) - The Online Certification Status Protocol (OCSP) is a service
that enables you to verify client certificates. When OCSP is enabled, the system becomes a client of an
OCSP responder and forwards validation requests for users based on client certificate. The OCSP responder
maintains a store of CA-published certificate revocation lists (CRLs) and maintains an up-to-date list of valid
and invalid certificates. After the OCSP responder receives a validation request, it validates the status of the
certificate using its own authentication database, or it calls upon the OCSP responder that originally issued
the certificate to validate the request. After formulating a response, the OCSP responder returns the signed
response, and the original certificate is either approved or rejected.
To configure OCSP client certificate status checking, perform the following steps:
1. From the Trusted Client CA list, click on the CA certificate which signs the end user certificates.
2. Under client certificate status checking, select the radio Use OCSP
3. Click Save Changes
4. Under OCSP Settings, click OCSP Options
5. From the Use drop-down, click Responder(s) specified in the client certificates
Additional configuration may be required if the OCSP response does not included the OCSP responder
certificate or the response is not signed by a CA certificate. For more details, refer to Configuring Options for
Trusted Client CA Certificates (Figure 7 and Figure 8)
Additional Recommendations:
By default, Trusted for Client Authentication and Participate in Client Certificate Negotiation are enabled after
importing any CA certificate. The recommendation is to disable Participate in Client Certificate Negotiation
for all CA certificates in the hierarchy except the CA certificate which signs all end user certificates. This will
ensure end users will only be able to select certificates signed by the signing CA certificate instead of all
potential certificates signed by the top level root and its intermediate CAs.
3. In the Name field, enter a friendly name for the certificate server
4. In the User Name template, enter the variable where the user name is contained. By default, <certDN.CN>
will be the using the common name field in the end user certificate.
Note: To add role mapping rules based on certificate expressions, refer to Specifying Role Mapping Rules
for an Authentication Realm documentation.
A client certificate can be used to restrict access to the Junos Pulse Secure Access (Realm restriction) and
resource access (Role restriction).
• Administrators > Admin Realms > SelectRealm> Authentication Policy > Certificate
• Users > User Realms > SelectRealm > Authentication Policy > Certificate
Select Only allow users with a client-side certificate signed by a Trusted Client CAs to sign in.
If the machine does not possess a valid client certificate, the end user will be able to access the sign-in page,
but the Junos Pulse Secure Access device will not submit the user’s credentials to the authentication server.
To role map using certificate attributes, select Allow all users and remember certificate information while
user is signed in.
1. Navigate to Users > User Realms > SelectRealm > Role Mapping > New Rule
2. From the Rule Based on drop down, select Certificate
3. Click Update
4. In the Attribute field, enter the corresponding certificate attribute used to map the role
For a list of possible certificate attributes, refer to System Variables and Examples document.
• Administrators > Admin Roles > SelectRole > General > Restrictions > Certificate
• Users > User Roles > SelectRole > General > Restrictions > Certificate
Select Only allow users with a client-side certificate signed by a Certificate Authority..
If the machine does not possess a valid client certificate, the end user will not be mapped the user to that role.
By default, all trusted root CAs from Internet Explorer 7.0 and Windows XP Service Pack 2 are preinstalled on
all Junos Pulse Secure Access software versions. Trusted Server CA are utilized by the Junos Pulse Secure
Access web server to trust incoming SSL connections from external end users and backend resources.
Normally, Trusted Server CA list does not need to be updated unless one of the following conditions are met:
• Public / Private CA has provided an updated root and intermediate certificates for your device certificate
• Device certificate has been issued from a new Private CA
• Junos Pulse Secure Access device is making a secure connection (SSL) to a backend resource that is
issued from a Private CA
To upload CA certificates:
1. Select System > Configuration > Certificates > Trusted Server CAs
Note: When import a certificate hierarchy, certificates should be imported starting from the top down.
After the recent changes with Java 7 Update 51, all java applets are required to be signed by a trusted
certificate authority. Due to the changes, a code-signing certificate is recommended to be installed on the
Junos Pulse Secure Access device if one of the following conditions are met:
• End users are accessing signed java applets through (web) core access or rewrite engine
• End users are downloading Juniper components (Host Checker, Network Connect, etc.) via Java
When the Junos Pulse Secure Access rewrites a signed Java applet, it re-signs the applet with a self-signed
certificate by default. This certificate will not be trusted and will cause Java to block the java applet.
B. Javasoft Certificate
1. Access the Junos Pulse Secure Access administrator page.
2. Navigate to System > Configuration > Certificates > Code-Signing
Certificates > Import Certificates
3. For Keystore File, browse to the location of the Java keystore
4. For Password key, enter the Java keystore password.
5. Click Import.
3. Navigate to Users > Resource Policies > Java > Code-Signing (If Java does not appear, click
Customize in the upper right hand corner and select the checkbox for Java and Code-Signing)
4. Click New Policy
1. Certificate authentication is failing with the message “Missing or invalid certificates”, check the user access logs
and confirm if the same error appears.
a. If the same message appears, enable debug logging at level 10 with the following event codes
“Certificate,CRL,OCSP,SSL”. Open a JTAC case and provide a system snapshot include debug logs
and system configuration.
b. If no message appears, no client certificate was provided to the Junos Pulse Secure Access device.
Ensure the following conditions are met:
i. Certificate is not expired
ii. Certificate has the key usage of Client Authentication
iii. Certificate is signed by a certificate authority that exists in the Trusted Client CAs list
2. No certificate prompt appears when multiple client certificate are installed, confirm if Participate in Client
Certificate Negotiation is enabled on the signing CA.
3. Multiple certificates appear from different signing CA, but from the same root, disable Participate in Client
Certificate Negotiation from all CAs in the hierarchy except the correct signing CA.
Code-Signing issues
Troubleshooting approach:
The above files will help JTAC to further determine the cause of the above issue.