Skip to main content
Skip table of contents

Certificate User Domains

You can use certificates as the authentication method for a new Domain.

Prerequisite

Before you can assign a specific certificate to a new Certificate User as a Client Certificate Chain, you must upload it in the Client Auth Certificates section to make the certificate available for assignment. This step can be performed by a Signum Administrator.

Configure Certificate Users Domain

  1. Create a new Domain in the Access tab, and select Certificate users as the Domain Type.

  2. Configure a Certificate Users domain by selecting your desired settings and clicking Submit:

image-20250611-101813.png

The new domain appears in the list on the Domains tab, where you can create and manage its users.

Creating a Certificate User

  1. Select the new Certificate Users domain from the list of available domains in the Domains tab.

  2. In the popup window for editing the domain, navigate to the Users tab.

  3. Click New to begin creating a new user.

  4. Set the user configuration options in Signum.

  5. You can also set:

Client Certificate Chains

In the Client Certificate Chains setting, define a certificate user by either adding a specific client certificate or adding any client certificate issued by that CA.

Because these entries reference specific certificates, an expired certificate prevents the user from authenticating.

image-20250617-073148.png

Specific Client Certificate

Upload the specific certificate in the Client Auth Certificates section and set in the user configuration. If a specific client certificate is configured, the client needs to present that specific certificate to gain access. Only that certificate is able to act as this user.

CA Chain Certificate

Upload a chain certificate (root or intermediate) and set it in the user configuration.

If you want to ensure only one certificate can act as the defined user, complete the user definition by adding attribute-matching rules that ensure that only one certificate generated by the selected CA is able to act as this user. By selecting only the CA certificates, you would allow any certificate issued by that Authority to connect.

Attribute Matching Rules

In addition to Client Certificate Chains, you can create rules for the user certificate. For example:

  • Thumbprint is equal to 9AF31D5C72AE89478F9BC31277D91A6F2B449E01

  • Subject DN contains CN=John Doe, OU=Engineering

To restrict a client certificate to a particular CA, you could add:

  • Issuer DN is equal to CN=Example CA, O=Example Corp, C=US

A user is authenticated only if the presented certificate meets all defined Attribute Matching Rules.

The available attributes are:

  • Serial number

  • Subject DN

  • Thumbprint

  • SANs

  • Issuer DN

image-20250617-073357.png

Usage Notes

Any certificate configuration, either Specific Client Certificate or CA Chain, may be only be assigned to one user. Assigning the same configuration to more than one user results in a login error message: “The certificate matches more than one user profile. We’re unable to determine which account to use. Please reach out to your administrator.

Both the CA certificate chain and the client authentication certificate can be used in combination with attribute matching rules.

Regardless of the situation, expired certificates do not work.

Some example configurations and the resulting behavior are:

Client Certificate Chains

Attribute Matching Rule

Behavior

CA chain

none

An agent presenting with any certificate issued by the CA will be accepted.

CA chain

✔️

An agent presenting with any certificate issued by the CA will be accepted AND the selected attributes must match.

Client auth cert

none

An agent must present with the specific client certificate.

Client auth cert

✔️

An agent must present with the specific client certificate AND the selected attributes must match.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.