Skip to content

Commit 28d352a

Browse files
committed
T7635: Show OpenConnect certificate based authentication mode option in configuration example.
1 parent f39b256 commit 28d352a

File tree

1 file changed

+14
-1
lines changed

1 file changed

+14
-1
lines changed

docs/configuration/vpn/openconnect.rst

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Server Configuration
4747
.. code-block:: none
4848
4949
set vpn openconnect authentication local-users username <user> password <pass>
50-
set vpn openconnect authentication mode <local password|radius>
50+
set vpn openconnect authentication mode <local password|radius|certificate>
5151
set vpn openconnect network-settings client-ip-settings subnet <subnet>
5252
set vpn openconnect network-settings name-server <address>
5353
set vpn openconnect network-settings name-server <address>
@@ -78,6 +78,19 @@ For generating an OTP key in VyOS, you can use the CLI command
7878
7979
generate openconnect username <user> otp-key hotp-time
8080
81+
User Certificate Authentication
82+
===============================
83+
84+
You can configure users to be authenticated by certificate by setting the authentication mode to certificate, and defining what field (by OID) in the certificate will be used to identify the username. Two pre-defined shortcuts for Common Name (OID 2.5.4.3) and User ID (OID 0.9.2342.19200300.100.1.1) have been provide as cn or uid. Otherwise a specific OID value must be provided.
85+
86+
The user's certificate must be signed by the certificate authority defined in the configuration for it to be validated for authentication.
87+
88+
.. code-block:: none
89+
90+
set vpn openconnect authentication mode certificate
91+
set vpn openconnect authentication mode certificate user-identifier-field cn
92+
set vpn openconnect ssl ca-certificate <cert>
93+
8194
************
8295
Verification
8396
************

0 commit comments

Comments
 (0)