Note that if the client certificate is not protected (by a PIN or some other mechanism) then unauthenticated
access to the VCS may be possible. This lack of protection may also apply if the certificates are stored in the
browser, although some browsers do allow you to password protect their certificate store.
Obtaining the username from the certificate
The username is extracted from the client browser's certificate according to the patterns defined in the
Regex and Username format fields on the Certificate-based authentication configuration page:
n In the Regex field, use the (?<name>regex) syntax to supply names for capture groups so that
matching sub-patterns can be substituted in the associated Username format field, for example,
/(Subject:.*, CN=(?<Group1>.*))/m.
The regex defined here must conform to PHP regex guidelines.
n The Username format field can contain a mixture of fixed text and the capture group names used in the
Regex. Delimit each capture group name with #, for example, prefix#Group1#suffix. Each capture
group name will be replaced with the text obtained from the regular expression processing.
You can use the Client certificate testing page to test the outcome of applying different Regex and
Username format combinations to a certificate.
Testing client certificates
The Client certificate testing page (Maintenance > Security certificates > Client certificate testing) is
used to check client certificates before enabling client certificate validation. You can:
n Test whether a client certificate is valid when checked against the VCS's current trusted CA list and, if
loaded, the revocation list (see Managing certificate revocation lists (CRLs) [p.288]).
Cisco VCS Administrator Guide (X8.1.1) Page 292 of 507
Maintenance
About security certificates