Home > Configuration > SSL > addsslaction

addsslaction

Use this method to creates a new SSL action. An SSL action defines SSL settings that you can apply to the selected requests. You associate an action with one or more policies. Data in client connection requests or responses is compared to a rule (expression) specified in the policy, and the action is applied to connections that match the rule.

Syntax



Parameters

name

Name for the SSL action. Must begin with an ASCII alphanumeric or underscore (_) character, and must contain only ASCII alphanumeric, underscore, hash (#), period (.), space, colon (:), at (@), equals (=), and hyphen (-) characters. Cannot be changed after the action is created. The following requirement applies only to the Citrix ADC CLI: If the name includes one or more spaces, enclose the name in double or single quotation marks (for example, "my action" or 'my action').
This is mandatory parameter.

clientauth

Perform client certificate authentication.

clientcertverification

Client certificate verification is mandatory or optional.
Default value = CERT_MANDATORY.

ssllogprofile

The name of the ssllogprofile.

clientcert

Insert the entire client certificate into the HTTP header of the request being sent to the web server. The certificate is inserted in ASCII (PEM) format.

certheader

Name of the header into which to insert the client certificate.

clientcertserialnumber

Insert the entire client serial number into the HTTP header of the request being sent to the web server.

certserialheader

Name of the header into which to insert the client serial number.

clientcertsubject

Insert the client certificate subject, also known as the distinguished name (DN), into the HTTP header of the request being sent to the web server.

certsubjectheader

Name of the header into which to insert the client certificate subject.

clientcerthash

Insert the certificate's signature into the HTTP header of the request being sent to the web server. The signature is the value extracted directly from the X.509 certificate signature field. All X.509 certificates contain a signature field.

certhashheader

Name of the header into which to insert the client certificate signature (hash).

clientcertfingerprint

Insert the certificate's fingerprint into the HTTP header of the request being sent to the web server. The fingerprint is derived by computing the specified hash value (SHA256, for example) of the DER-encoding of the client certificate.

certfingerprintheader

Name of the header into which to insert the client certificate fingerprint.

certfingerprintdigest

Digest algorithm used to compute the fingerprint of the client certificate.

clientcertissuer

Insert the certificate issuer details into the HTTP header of the request being sent to the web server.

certissuerheader

Name of the header into which to insert the client certificate issuer details.

sessionid

Insert the SSL session ID into the HTTP header of the request being sent to the web server. Every SSL connection that the client and the Citrix ADC share has a unique ID that identifies the specific connection.

sessionidheader

Name of the header into which to insert the Session ID.

cipher

Insert the cipher suite that the client and the Citrix ADC negotiated for the SSL session into the HTTP header of the request being sent to the web server. The appliance inserts the cipher-suite name, SSL protocol, export or non-export string, and cipher strength bit, depending on the type of browser connecting to the SSL virtual server or service (for example, Cipher-Suite: RC4- MD5 SSLv3 Non-Export 128-bit).

cipherheader

Name of the header into which to insert the name of the cipher suite.

clientcertnotbefore

Insert the date from which the certificate is valid into the HTTP header of the request being sent to the web server. Every certificate is configured with the date and time from which it is valid.

certnotbeforeheader

Name of the header into which to insert the date and time from which the certificate is valid.

clientcertnotafter

Insert the date of expiry of the certificate into the HTTP header of the request being sent to the web server. Every certificate is configured with the date and time at which the certificate expires.

certnotafterheader

Name of the header into which to insert the certificate's expiry date.

owasupport

If the appliance is in front of an Outlook Web Access (OWA) server, insert a special header field, FRONT-END-HTTPS: ON, into the HTTP requests going to the OWA server. This header communicates to the server that the transaction is HTTPS and not HTTP.

forward

This action takes an argument a vserver name, to this vserver one will be able to forward all the packets.

cacertgrpname

This action will allow to pick CA(s) from the specific CA group, to verify the client certificate.

ocspstapling

This option is used to enable ocspStapling parameter for the SSL connection.

ocspcertvalidation

This option is used to check the revocation status of client/server certificate in SSL handshake using OCSP.

ocspcache

Enable cache of OCSP response. Caching of response received from the OCSP responder enables faster response to the client and reduces the load on the OCSP responder.
Default value = DISABLED.

Return Value

Returns simpleResult

See Also