<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262738#M51567</link>
    <description>&lt;P&gt;Did it now work with or without the AIA info without warning message?&lt;/P&gt;</description>
    <pubDate>Thu, 13 Nov 2025 11:31:55 GMT</pubDate>
    <dc:creator>Vincent_Bacher</dc:creator>
    <dc:date>2025-11-13T11:31:55Z</dc:date>
    <item>
      <title>LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262644#M51552</link>
      <description>&lt;P&gt;Hello everyone!&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I want to enable LDAPS port 636 for Identity Awareness on my R82 Lab gateway. It currently works with LDAP. However, when fetching server data and the CA fingerprint, I get the following message:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;Manual fetch will be needed when the LDAP server certificate is renewed. LDAPS connections from the gateway will be downgraded to the legacy certificate validation. Reason: The LDAP server certificate should contain Authority Information Access extention with URI with http scheme&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Screenshot_5.png" style="width: 516px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32081iC6D89FD48F0323A5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot_5.png" alt="Screenshot_5.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;What should I do to properly configure LDAPS on the R82? Is there a guide for this?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2025 14:22:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262644#M51552</guid>
      <dc:creator>SkochilovIgnat</dc:creator>
      <dc:date>2025-11-12T14:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262721#M51562</link>
      <description>&lt;P&gt;The starting point for configuring the Account Unit is here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_SecurityManagement_AdminGuide/Content/Topics-SECMG/Account-Units.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_SecurityManagement_AdminGuide/Content/Topics-SECMG/Account-Units.htm&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 03:19:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262721#M51562</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-11-13T03:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262723#M51563</link>
      <description>&lt;P&gt;Let me see if I can replicate this in my lab.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 03:50:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262723#M51563</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-13T03:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262726#M51564</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is very interesting, since we are using Identity Awareness intensively.&lt;BR /&gt;Your message states: &lt;STRONG&gt;“The LDAP server certificate should contain an Authority Information Access extension with a URI using the HTTP scheme.”&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I verified this on our LDAP server using:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;LI-CODE lang="markup"&gt;openssl s_client -connect &amp;lt;ldapserver&amp;gt;:636 -showcerts &amp;lt;/dev/null 2&amp;gt;/dev/null \
  | openssl x509 -noout -text&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On this server, the relevant AIA → CA Issuers entry is indeed missing.&lt;/P&gt;&lt;P&gt;After investigating further, it appears that Check Point uses LDAPS with certificate chain retrieval.&lt;BR /&gt;When the LDAP server presents its certificate, Check Point expects the Authority Information Access (AIA) extension to include an HTTP URL where the issuing CA certificate can be downloaded, for example:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;        X509v3 extensions:
            Authority Information Access:
                CA Issuers - URI:http://ca.domain.com/ca.crt&lt;/LI-CODE&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;If this extension is missing, Check Point shows the warning.&lt;BR /&gt;&lt;BR /&gt;For me, this means that without the AIA extension, Check Point simply falls back on legacy certificate verification without downloading the CA certificate via the extension and then performing the verification. LDAPS still works, but Check Point no longer uses AIA-based chain retrieval and therefore operates in legacy mode.&lt;/P&gt;&lt;P&gt;Can anyone confirm this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 07:11:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262726#M51564</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2025-11-13T07:11:37Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262733#M51565</link>
      <description>&lt;P&gt;I tried setting up a CA server. In the AIA extension settings, I left only the HTTP link to the root certificate in the list and checked the box to include this option to AIA extension of issued certificates.&lt;/P&gt;&lt;P&gt;After running the `cpopenssl s_client -connect 10.10.34.41:636 -showcerts &amp;lt;/dev/null 2&amp;gt;/dev/null | cpopenssl x509 -noout -text` command, I saw that the certificate information was now displayed as follows:&lt;BR /&gt;Authority Information Access:&lt;BR /&gt;CA Issuers - URI:&lt;A href="http://SRV121.chkplab.local/CertEnroll/SRV121.chkplab.local_chkplab-SRV121-CA(1).crt" target="_blank"&gt;http://SRV121.chkplab.local/CertEnroll/SRV121.chkplab.local_chkplab-SRV121-CA(1).crt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I checked this link and the certificate is available, but I still get this warning in the Smart Console.&lt;BR /&gt;I will continue to search for a solution to the problem, if I succeed, I will write about it here.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 09:59:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262733#M51565</guid>
      <dc:creator>SkochilovIgnat</dc:creator>
      <dc:date>2025-11-13T09:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262737#M51566</link>
      <description>&lt;P&gt;I found the place where I made a mistake.&lt;/P&gt;&lt;P&gt;I forgot to specify the DNS server, so when fetching the certificate, the CheckPoint couldn't correctly interpret the link because of the domain name in it. When I specified the correct DNS server on the gateway and SMS, everything worked and the warning didn't occur.&lt;/P&gt;&lt;P&gt;However, I think the settings I described above are also necessary.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 11:27:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262737#M51566</guid>
      <dc:creator>SkochilovIgnat</dc:creator>
      <dc:date>2025-11-13T11:27:47Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262738#M51567</link>
      <description>&lt;P&gt;Did it now work with or without the AIA info without warning message?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 11:31:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262738#M51567</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2025-11-13T11:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262739#M51568</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Currently, it works with AIA info, when I disable the option to include http URI in AIA extension, warning returns. So this information is needed.&lt;BR /&gt;&lt;BR /&gt;Now, when I press the fetch button, the information is pulled and the CA field is automatically filled, no warning.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 11:40:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262739#M51568</guid>
      <dc:creator>SkochilovIgnat</dc:creator>
      <dc:date>2025-11-13T11:40:45Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262743#M51569</link>
      <description>&lt;P&gt;Great job!&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 12:08:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262743#M51569</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-13T12:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262744#M51570</link>
      <description>&lt;P&gt;Hey, I helped out just a little bit too. &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 12:33:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262744#M51570</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2025-11-13T12:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262747#M51571</link>
      <description>&lt;P&gt;Of course you did, Vin, you ALWAYS do! &lt;span class="lia-unicode-emoji" title=":raising_hands:"&gt;🙌&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 12:50:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/262747#M51571</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-13T12:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/267361#M52840</link>
      <description>&lt;P&gt;I am facing same problem after upgrade to R82 but my&amp;nbsp;Authority Information Access has only LDAP URI:&lt;BR /&gt;&lt;BR /&gt;Authority Information Access:&lt;BR /&gt;CA Issuers - URI:ldap:///CN=xxxxxx,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=xxxxxx,DC=com?cACertificate?base?objectClass=certificationAuthority&lt;BR /&gt;&lt;BR /&gt;So not sure how I can fetch the fingerprint or at least get it manually to input into the Server field.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ldaps.JPG" style="width: 490px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32722iC2890CF1DDA3BC71/image-size/large?v=v2&amp;amp;px=999" role="button" title="ldaps.JPG" alt="ldaps.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jan 2026 16:22:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/267361#M52840</guid>
      <dc:creator>George_Sas</dc:creator>
      <dc:date>2026-01-14T16:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/267366#M52841</link>
      <description>&lt;P&gt;Solved.&lt;BR /&gt;I had to add to &lt;STRONG&gt;HTTP AIA&lt;/STRONG&gt;&amp;nbsp;my CA and re issue the certificates to all DC's , then I could fetch the thumbprints.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;On the Root CA server:&lt;/P&gt;&lt;P&gt;Open Certification Authority&lt;/P&gt;&lt;P&gt;Right-click the CA name → Properties&lt;/P&gt;&lt;P&gt;Go to the Extensions tab&lt;/P&gt;&lt;P&gt;From Select extension, choose:&lt;BR /&gt;Authority Information Access (AIA)&lt;BR /&gt;Click Add… and enter something like:&lt;BR /&gt;&lt;A href="http://pki.yourdomain.com/CertEnroll/%1_%3%4.crt" target="_blank" rel="noopener"&gt;http://pki.yourdomain.com/CertEnroll/%1_%3%4.crt&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Select :&lt;BR /&gt;Include in the AIA extension of issued certificates&lt;BR /&gt;Include in the online certificate status protocol (OCSP) extension (optional)&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jan 2026 17:43:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/267366#M52841</guid>
      <dc:creator>George_Sas</dc:creator>
      <dc:date>2026-01-14T17:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/267367#M52842</link>
      <description>&lt;P&gt;Thanks for letting us know!&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jan 2026 17:45:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/267367#M52842</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-14T17:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/267370#M52844</link>
      <description>&lt;P&gt;I went from 81.10 to R82 (forced by a new 2570 gateway that came with R82) and in 81.10 all worked fine without AIA in the certificates.&lt;BR /&gt;Seems R82 forces many things and changed many things in Smart Console and Smart Dashboard.&lt;BR /&gt;&lt;BR /&gt;Before R82 I could fetch the thumbprints just fine without any HTTP in my CA URI. Anyway I guess is a good step forward as Windows Server 2025 seems to require this. On Windows 2022 on DC's at the moment.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jan 2026 18:07:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/267370#M52844</guid>
      <dc:creator>George_Sas</dc:creator>
      <dc:date>2026-01-14T18:07:19Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/267371#M52845</link>
      <description>&lt;P&gt;Very good to know. Appreciate you letting us know all those details&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/17933"&gt;@George_Sas&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jan 2026 18:08:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/267371#M52845</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-14T18:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/271445#M103503</link>
      <description>&lt;P&gt;Hi George,&lt;/P&gt;
&lt;P&gt;I have two questions:&lt;/P&gt;
&lt;P&gt;Q1: Is the DER format acceptable, or only PEM format supported?&lt;/P&gt;
&lt;P&gt;Q2: In TIER 2&amp;nbsp; PKI setup, the LDAPs cert is issued by the intermediate CA.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;From Select extension, choose:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Authority Information Access (AIA)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Click Add… and enter something like:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;A href="http://pki.yourdomain.com/CertEnroll/%1_%3%4.crt" target="_blank" rel="noopener nofollow noreferrer"&gt;http://pki.yourdomain.com/CertEnroll/%1_%3%4.crt&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;In this case the .crt (that you mentoned above) must be a the Root CA or can it be the intermediate CA as well?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Akos&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2026 11:48:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/271445#M103503</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2026-02-20T11:48:17Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS connections from the gateway will be downgraded to the legacy certificate validation.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/275169#M104815</link>
      <description>&lt;P&gt;1. None of them. When you press the fetch certificate it will just fetch it from server and check against the CA specified in the certificate. As it is my internal root CA everything is seamless as long as the CRL URLs are in order.&lt;/P&gt;&lt;P&gt;2. Does not matter which CA issues the certificate as long as the management server can get in touch with it and verify the validity.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 10:32:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/LDAPS-connections-from-the-gateway-will-be-downgraded-to-the/m-p/275169#M104815</guid>
      <dc:creator>George_Sas</dc:creator>
      <dc:date>2026-04-09T10:32:11Z</dc:date>
    </item>
  </channel>
</rss>

