You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#314 added a new option --client-cert-issuer-cn to enable searching the macOS Keychain or Windows certificate store for a client certificate. This search is based on the Common Name of the CA that issued the client certificate.
Note that this option has not yet been included in a pomerium-cli release.
Per conversation with @arulthileeban, this option alone is not sufficient for their deployment. Instead they require some way to select between multiple certificates issued by the same CA (where only one particular certificate should be used with Pomerium).
I propose we replace the --client-cert-issuer-cn option with an expanded set of options:
--client-cert-from-store would enable the overall feature of searching the OS certificate store.
If this option is provided by itself, pomerium-cli would search for a matching certificate based on the advertised CA names from the TLS handshake. This default behavior would likely be sufficient for many client certificate deployments.
Two additional options could by used in combination with this first option, to provide additional filtering capabilities:
--client-cert-issuer would filter matching certificates based on one attribute of the certificate's Issuer name.
So instead of the previous option --client-cert-issuer-cn "Trusted CA Name" you would set --client-cert-issuer "CN=Trusted CA Name". Only the most commonly-used name attributes would be supported (e.g. CN, O, OU, C, ST, L).
--client-cert-subject would likewise filter matching certificates based on one attribute of the certificate's Subject name.
For example, --client-cert-subject "OU=Organizational Unit Name".
@calderonth, I believe you are also interested in using client certificates with Pomerium. If you anticipate needing to use client certificates with pomerium-cli, please let me know if you have any feedback on this idea. Thanks!
The text was updated successfully, but these errors were encountered:
Background:
#314 added a new option
--client-cert-issuer-cn
to enable searching the macOS Keychain or Windows certificate store for a client certificate. This search is based on the Common Name of the CA that issued the client certificate.Note that this option has not yet been included in a pomerium-cli release.
Per conversation with @arulthileeban, this option alone is not sufficient for their deployment. Instead they require some way to select between multiple certificates issued by the same CA (where only one particular certificate should be used with Pomerium).
I propose we replace the
--client-cert-issuer-cn
option with an expanded set of options:--client-cert-from-store
would enable the overall feature of searching the OS certificate store.If this option is provided by itself, pomerium-cli would search for a matching certificate based on the advertised CA names from the TLS handshake. This default behavior would likely be sufficient for many client certificate deployments.
Two additional options could by used in combination with this first option, to provide additional filtering capabilities:
--client-cert-issuer
would filter matching certificates based on one attribute of the certificate's Issuer name.So instead of the previous option
--client-cert-issuer-cn "Trusted CA Name"
you would set--client-cert-issuer "CN=Trusted CA Name"
. Only the most commonly-used name attributes would be supported (e.g.CN
,O
,OU
,C
,ST
,L
).--client-cert-subject
would likewise filter matching certificates based on one attribute of the certificate's Subject name.For example,
--client-cert-subject "OU=Organizational Unit Name"
.@calderonth, I believe you are also interested in using client certificates with Pomerium. If you anticipate needing to use client certificates with pomerium-cli, please let me know if you have any feedback on this idea. Thanks!
The text was updated successfully, but these errors were encountered: