Implementing a client certificate authentication for MIP Classification/Decryption profiles on Enforce
search cancel

Implementing a client certificate authentication for MIP Classification/Decryption profiles on Enforce

book

Article ID: 398677

calendar_today

Updated On:

Products

Data Loss Prevention Data Loss Prevention Enforce

Issue/Introduction

You want to implement a client certificate authentication for MIP Classification/Decryption profiles on Enforce, which was introduced with 16.1.

Environment

16.1

Resolution

Note: this instruction covers the topic of implementing a self sign certificate. If your organization needs to use a certificate issued by your own CA, contact your PKI team in order to issue a valid certificate and use it in Azure Portal and Enforce UI accordingly.

  1. Configure an app for a classification profile Authorize Symantec Data Loss Prevention on the Microsoft Azure Portal and/or decryption profile Enabling MPIP on the Azure Portal for Detection Servers. You can skip the part about creating a client secret.
  2. On any host, open Powershell and create and export your public certificate (replace {certificateName} with your certificate name, e.g. Enforce):

    $certname = "{certificateName}"
    $cert = New-SelfSignedCertificate -Subject "CN=$certname" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature -KeyLength 2048 -KeyAlgorithm RSA -HashAlgorithm SHA256

  3. Export your public certificate by running the below command (adjust FilePath location accordingly to your needs):

    Export-Certificate -Cert $cert -FilePath "C:\Users\admin\Desktop\$certname.cer"

  4. On Azure Portal, under the section Certificates & secrets of the app created in step 1, click on Certificates > Upload certificate and import a certificate exported in step 3.
  5. Go back to host with Powershell, and export your public certificate with its private key created in step 2. First, set the password (replace {myPassword} with your own password):

    $mypwd = ConvertTo-SecureString -String "{myPassword}" -Force -AsPlainText

    and export the certificate to PFX format (adjust FilePath location accordingly to your needs):

    Export-PfxCertificate -Cert $cert -FilePath "C:\Users\admin\Desktop\$certname.pfx" -Password $mypwd

  6. Login to the Enforce console and navigate to System > Settings > MIP Credential Profiles.
  7. Start configuring your desired profile and when selecting Application Certificate option, use a PFX certificate created and a password from step 5 and save the profile.

 

Additional Information