<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic EndPoint Security VPN 85.30 &amp;amp; SmartCard certificate MacOS Monterey Certificate Chain issue in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/EndPoint-Security-VPN-85-30-amp-SmartCard-certificate-MacOS/m-p/136247#M4927</link>
    <description>&lt;P&gt;I'm running into a client side certificate chain issue with a private PKI card. The keychain contains all root and intermediate CA's and it looks like the E85.30 client is not able to utilize it for smartcard validation. Did anybody run into this and how did you solve it? The client does work fine with other methods of authentication (radius/local accounts etc).&lt;/P&gt;&lt;P&gt;Debug logs don't show anything more than the displayed certificate chain message.&lt;/P&gt;&lt;P&gt;MacOS Versions tested:&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Catalina&lt;BR /&gt;- Big Sur&lt;BR /&gt;- Monterery&lt;/P&gt;&lt;P&gt;The smart card is exposed to MacOS using Gemalto SafeNet authentication clients and works fine in other applications.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EndPoint Security VPN 85.30 MacOS Monterery.png" style="width: 649px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14543iAA275C2C917B0A94/image-size/large?v=v2&amp;amp;px=999" role="button" title="EndPoint Security VPN 85.30 MacOS Monterery.png" alt="EndPoint Security VPN 85.30 MacOS Monterery.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Dec 2021 08:54:55 GMT</pubDate>
    <dc:creator>rliessum</dc:creator>
    <dc:date>2021-12-14T08:54:55Z</dc:date>
    <item>
      <title>EndPoint Security VPN 85.30 &amp; SmartCard certificate MacOS Monterey Certificate Chain issue</title>
      <link>https://community.checkpoint.com/t5/Endpoint/EndPoint-Security-VPN-85-30-amp-SmartCard-certificate-MacOS/m-p/136247#M4927</link>
      <description>&lt;P&gt;I'm running into a client side certificate chain issue with a private PKI card. The keychain contains all root and intermediate CA's and it looks like the E85.30 client is not able to utilize it for smartcard validation. Did anybody run into this and how did you solve it? The client does work fine with other methods of authentication (radius/local accounts etc).&lt;/P&gt;&lt;P&gt;Debug logs don't show anything more than the displayed certificate chain message.&lt;/P&gt;&lt;P&gt;MacOS Versions tested:&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Catalina&lt;BR /&gt;- Big Sur&lt;BR /&gt;- Monterery&lt;/P&gt;&lt;P&gt;The smart card is exposed to MacOS using Gemalto SafeNet authentication clients and works fine in other applications.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EndPoint Security VPN 85.30 MacOS Monterery.png" style="width: 649px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14543iAA275C2C917B0A94/image-size/large?v=v2&amp;amp;px=999" role="button" title="EndPoint Security VPN 85.30 MacOS Monterery.png" alt="EndPoint Security VPN 85.30 MacOS Monterery.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 08:54:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/EndPoint-Security-VPN-85-30-amp-SmartCard-certificate-MacOS/m-p/136247#M4927</guid>
      <dc:creator>rliessum</dc:creator>
      <dc:date>2021-12-14T08:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: EndPoint Security VPN 85.30 &amp; SmartCard certificate MacOS Monterey Certificate Chain issue</title>
      <link>https://community.checkpoint.com/t5/Endpoint/EndPoint-Security-VPN-85-30-amp-SmartCard-certificate-MacOS/m-p/136679#M4933</link>
      <description>&lt;P&gt;Unless&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5692"&gt;@AndreiR&lt;/a&gt;&amp;nbsp;has a suggestion, recommend a TAC case.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 19:43:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/EndPoint-Security-VPN-85-30-amp-SmartCard-certificate-MacOS/m-p/136679#M4933</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-12-17T19:43:39Z</dc:date>
    </item>
    <item>
      <title>Re: EndPoint Security VPN 85.30 &amp; SmartCard certificate MacOS Monterey Certificate Chain issue</title>
      <link>https://community.checkpoint.com/t5/Endpoint/EndPoint-Security-VPN-85-30-amp-SmartCard-certificate-MacOS/m-p/136980#M4939</link>
      <description>&lt;P&gt;I can follow the TAC route. Was hoping somebody else had run into this and was active here as well.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Dec 2021 12:48:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/EndPoint-Security-VPN-85-30-amp-SmartCard-certificate-MacOS/m-p/136980#M4939</guid>
      <dc:creator>rliessum</dc:creator>
      <dc:date>2021-12-22T12:48:00Z</dc:date>
    </item>
  </channel>
</rss>

