NOC authentication
Setting up the certificates
D-6
Authenticating with the login application
The connection between the login application and the controller is secured using SSL. When
establishing the SSL connection with the controller, the login application must supply its SSL
certificate. In a standard SSL setup, the controller uses the CA for this certificate to validate
the certificate’s identity and authenticate the login application.
However, the controller does not want to accept SSL connections from just any remote
entity with a valid certificate. Rather, it only wants to accept connections from a specific
entity: the login application.
To uniquely identify the login application, the ssl-noc-certificate attribute is defined in the
RADIUS profile for the controller. This attribute contains the URL of the login application’s
SSL certificate. When the login application presents its SSL certificate, the controller
retrieves ssl-noc-certificate and checks to make sure that they match.
For further authentication, a second attribute, ssl-noc-ca-certificate, is defined in the
RADIUS profile for the controller. This attribute contains the URL of the public key of the
certificate authority (CA) that signed the login application’s SSL certificate. The controller
uses the public key to determine if the login application’s SSL certificate can be trusted.
Authenticating the controller
To identify itself, the controller uses the SSL certificate configured on the Security >
Certificate Stores page or via the ssl-certificate attribute.
For added security, the login application could also check that this SSL certificate has been
signed by the certificate authority for which the login application has the public key
certificate. The default certificate installed on the controller is not signed by a well-known CA
and cannot be used for this purpose. Instead, a new certificate must be installed on the
controller. This certificate could be signed by a well-known certificate authority or your own
CA.
NOC authentication list
Additional security is provided via the Security list on the Public access > Web server page.
You use this list to define the set of remote IP addresses that the controller accepts
authentication requests from. If a request is received from an address not in this list, it is
discarded.
Setting up the certificates
This section presents an overview of the certificates you need to install to secure
communication between the remote login page and the controller. For detailed discussion of
the issues, see Addressing security concerns on page D-5.