What Username do AWS VPN Client need when using password-encrypted private key certificate?

0

We have a Client VPN Endpoint and want to use password encrypted private key certificates. When using Windows "aws vpn client", a pop-up asks username and password. What username should we specify? The CN of the certificate? Anything else? The password is the password we specified when creating client certificate with EasyRSA

Thanks.

已提问 2 年前1591 查看次数
4 回答
1

I am using the aws vpn client for macos. I had the same client connection behavior, a popup asking for username/password for an endpoint configured for mutual tls. I used the same ACM-created server cert as the client cert, as it was a POC. (I would think an ACM-created client cert will work just fine.) The root cause was that I had not decrypted the private key with the passphrase. After downloading from the ACM, run this: openssl rsa -in private_key.txt -out decrypted_private_key.txt. Then cat the decrypted file and put it's contents in the client config file <key> </key> block.

已回答 1 年前
1

I have the same behavior. What worked for me was to decrypt de private key with : openssl rsa -in private_key.txt -out decrypted_private_key.txt and put the content of decrypted_private_key.txt into <key></key> of the vpn client config file.

已回答 1 年前
0

Hello there

Client VPN offers the following types of client authentication:

-Active Directory authentication (user-based)
-Mutual authentication (certificate-based)
-Single sign-on (SAML-based federated authentication) (user-based)
         

You will only be prompted for username/password if you are using user based authentication methods (AD or SAML)

With Active Directory authentication, clients are authenticated against existing Active Directory groups ,so clients have to enter credentials for existing AD groups.For SAML, the credentials are stored by their IdPs.

I would like to mention that using ACM and ACM Private CA for mutual authentication isn't currently supported for use with the AWS provided client for the Client VPN application[2].However you can connect using any other OpenVPN-based client application.

Reference:

[1]https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/client-authentication.html

[2]https://aws.amazon.com/premiumsupport/knowledge-center/client-vpn-authenticate-private-ca-acm/

已回答 2 年前
0

The above solutions work! Thanks to those who provided the fixes above.

However, they require distributing unencrypted key material in the configuration file, making life harder for admins of small projects that don't have AD or SAML built yet. Tunnelblick has no problem supporting encrypted secrets, why not the AWS VPN Client?

ottomon
已回答 1 年前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则