<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Endpoint Security VPN client : enforce both RSA authentication and certificate check in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-VPN-client-enforce-both-RSA-authentication-and/m-p/28764#M669</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking for a possibility to get the following working:&lt;/P&gt;&lt;P&gt;- RSA authentication to identify the user and check if user is authorized or not to connect remotely&lt;/P&gt;&lt;P&gt;- additionally a certificate should be checked to verify if this is effectively a managed workstation of our company.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Machine authentication seems to be an option, only after installing a custom patch. Could we enforce the certificate check using an other method?&lt;/P&gt;&lt;P&gt;Tried looking for some doc on these features but came up empty.&lt;/P&gt;&lt;P&gt;Any one who can point us in the right direction?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the post on E80.89 release I noticed a screenshot stating 'certificate check passed, additional authentication required with a username/pwd field displayed =&amp;gt; exactly what we want (if additional authentication can be done by RSA then)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 30 Jan 2019 14:12:05 GMT</pubDate>
    <dc:creator>Kenny_De_Man</dc:creator>
    <dc:date>2019-01-30T14:12:05Z</dc:date>
    <item>
      <title>Endpoint Security VPN client : enforce both RSA authentication and certificate check</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-VPN-client-enforce-both-RSA-authentication-and/m-p/28764#M669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking for a possibility to get the following working:&lt;/P&gt;&lt;P&gt;- RSA authentication to identify the user and check if user is authorized or not to connect remotely&lt;/P&gt;&lt;P&gt;- additionally a certificate should be checked to verify if this is effectively a managed workstation of our company.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Machine authentication seems to be an option, only after installing a custom patch. Could we enforce the certificate check using an other method?&lt;/P&gt;&lt;P&gt;Tried looking for some doc on these features but came up empty.&lt;/P&gt;&lt;P&gt;Any one who can point us in the right direction?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the post on E80.89 release I noticed a screenshot stating 'certificate check passed, additional authentication required with a username/pwd field displayed =&amp;gt; exactly what we want (if additional authentication can be done by RSA then)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 14:12:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-VPN-client-enforce-both-RSA-authentication-and/m-p/28764#M669</guid>
      <dc:creator>Kenny_De_Man</dc:creator>
      <dc:date>2019-01-30T14:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Security VPN client : enforce both RSA authentication and certificate check</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-VPN-client-enforce-both-RSA-authentication-and/m-p/28765#M670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The client (from E80.71 above) supports this option.&lt;/P&gt;&lt;P&gt;It requires a specific gateway hotfix to activate.&lt;/P&gt;&lt;P&gt;See:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk121173" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk121173"&gt;Machine Certificate Installation on Security Gateway for Authentication to VPN Clients&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You're encouraged to reach out to your local Check Point office.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jan 2019 03:19:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-VPN-client-enforce-both-RSA-authentication-and/m-p/28765#M670</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-31T03:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Security VPN client : enforce both RSA authentication and certificate check</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-VPN-client-enforce-both-RSA-authentication-and/m-p/28766#M671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Dameon!&amp;nbsp;&lt;/P&gt;&lt;P&gt;No way to enforce this without the custom HF?&amp;nbsp;&lt;/P&gt;&lt;P&gt;For instance by using an other certificate or check? Our company is part of a group and all soft has to be group validated first &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://community.checkpoint.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&amp;nbsp;Will set us back a couple of months... We used to rely on SCV checks but:&amp;nbsp;&lt;/P&gt;&lt;P&gt;-rather basic security (processes can be spoofed, so can reg keys,...)&amp;nbsp;&lt;/P&gt;&lt;P&gt;- they don’t seem to be enforced properly on the W10 wks we are planning to roll out &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://community.checkpoint.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jan 2019 06:06:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-VPN-client-enforce-both-RSA-authentication-and/m-p/28766#M671</guid>
      <dc:creator>Kenny_De_Man</dc:creator>
      <dc:date>2019-01-31T06:06:31Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Security VPN client : enforce both RSA authentication and certificate check</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-VPN-client-enforce-both-RSA-authentication-and/m-p/28767#M672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Authenticating with a machine certificate requires the custom hotfix, sorry.&lt;/P&gt;&lt;P&gt;Instead of using SCV, which is actually a legacy feature, you should try the Endpoint Compliance feature.&lt;/P&gt;&lt;P&gt;It offers similar checks to SCV and should work on Windows 10.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jan 2019 06:47:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-VPN-client-enforce-both-RSA-authentication-and/m-p/28767#M672</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-31T06:47:24Z</dc:date>
    </item>
  </channel>
</rss>

