Hi,

On Tue, Jul 23, 2019 at 9:50 AM Stefan Szabo via Openvpn-users
<openvpn-users@lists.sourceforge.net> wrote:
>
> hi,
>
> is there any posibility to restrict users connecting to openvpn server, 
> permit only those who uses devices provided by company?and how can be 
> acomplished this?
> after check the cert and also LDAP goup to perform another check(post-auth) 
> and use something like mac address or anything else to identify the device 
> used if its provided by company or not.
>
> I've found something here, but I'm afraid for this is only available with 
> license subscription only:
> https://openvpn.net/vpn-server-resources/access-server-post-auth-script-host-checking/


You can use --push-peer-info in the client config to make the client
send the mac address of its default gateway interface to the server
(see --push-peer-info in the man page). But, as JJK said, MAC can be
cloned/faked, so not very reliable.

For Windows clients, upload the client certificate and key (as
non-exportable) to the Windows certificate store and use the
--cytpoapicert option. That would be a more reliable way of ensuring
connections come from devices that you setup.


Selva


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to