CWP pkix.keyUsagePolicy - Default gateway policy value change , does it impact key enforcement policy
search cancel

CWP pkix.keyUsagePolicy - Default gateway policy value change , does it impact key enforcement policy

book

Article ID: 402567

calendar_today

Updated On:

Products

CA API Gateway

Issue/Introduction

For one of our client certificates, we are facing the following error:
<164>Jun 2 15:03xxxxxxxx SSG[645]: WARNING com.l7tech.external.assertions.xmlsec.server.ServerNonSoapVerifyElementAssertion: request_id=00000194f91ce281-4fd9af4: Api=XXXXXXXXXXXXXX.com [/samlsp*]: 4: Unable to verify elements(s): Certificate key usage or extended key usage disallowed by key usage enforcement policy for activity: verifyXml.  Exception caught! 

The error should be resolved by customizing the Cluster Wide Property pkix.keyUsagePolicy. But doing so, there should be no changes to the other clients or other gateway policy behaviors.

What are the details of the default enforcement policy delivered with the Gateway?

There's a desire to add the following rule to the default enforcement policy delivered with the Gateway:
<permit action="verifyXml"><req>1.3.6.1.5.5.7.3.2</req></permit>

This should permit our client certificate that contains a "critical" extendedKeyUsage value of "1.3.6.1.5.5.7.3.2" for verifyXml action.

 

Environment

API Gateway 10.1

Resolution

Adding the property does not have any impact on the default key enforcement policy.

 

Additional Information