<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate VPN authentication against LDAP using userPrincipalName (R80.10) in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29698#M13508</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you're using a 3rd Party Certificate, it might be overriding the configuration.&lt;/P&gt;&lt;P&gt;sk115637&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 3rd party Root CA has two parameters that define the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;user fetch&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;process:&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;EM&gt;use_cn_to_fetch_user&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(default: false)&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;EM&gt;use_principal_name&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(default: false)&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;BR /&gt;***If one of this two parameters are enabled (value=true) then the certificate parsing rules defined in the realm relevant for the VPN blade will not be applied after the certificate chain is completed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Jul 2018 03:04:58 GMT</pubDate>
    <dc:creator>SSlater</dc:creator>
    <dc:date>2018-07-30T03:04:58Z</dc:date>
    <item>
      <title>Certificate VPN authentication against LDAP using userPrincipalName (R80.10)</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29691#M13501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anyone tried and succeeded in this?&lt;/P&gt;&lt;P&gt;Since R80.10, sk61060 is no longer applicable and the relevant configuration is performed directly on the gateway object in VPN CLients -&amp;gt; Authentication. In the personal certificate i have&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Fetch Username From: Subject Alternative Name.UPN&lt;/STRONG&gt; in the Login option&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Common lookup type: User-Principal-Name / UPN (userPrincipalName)&lt;/STRONG&gt; in the User Directories&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first part seems to be working OK. I can verify in the logs that UPN is extracted from the certificate but it is not matched against an UPN in LDAP. Login fails with unknown user. If i change everything to default (DN based), it works OK.&lt;/P&gt;&lt;P&gt;If i change the &lt;STRONG&gt;Fetch Username From&lt;/STRONG&gt; part to DN, and leave the lookup to be UPN based, authentication succeeds. Looks like the lookup is always DN based, no matter what is selected. I even tried to use custom lookup with userPrincipalName, but the behavior is the same.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am currently testing this on R80.10 with Jumbo Hotfix Accumulator Take 91&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ETA:&lt;/P&gt;&lt;P&gt;Tried with Hotfix Accumulator Take 103 (latest). No change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am currently running some packet capture of the FW-DC communication an concluded that the above configuration results in LDAP search based on sAMAccountName instead on userPrincipalName&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="j-img-floatstart image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/66297_Clipboard01_LDAP_sAMAccountName.jpg" style="float: left;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2018 20:15:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29691#M13501</guid>
      <dc:creator>Damjan_Janev</dc:creator>
      <dc:date>2018-06-09T20:15:25Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate VPN authentication against LDAP using userPrincipalName (R80.10)</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29692#M13502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even though the R80.10 GUI has an option for this, can you verify the settings are set as described in sk61060 with GUIdbedit?&lt;/P&gt;&lt;P&gt;I'm thinking alternative_subject_field, but maybe the other parameters as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2018 01:57:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29692#M13502</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-06-10T01:57:02Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate VPN authentication against LDAP using userPrincipalName (R80.10)</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29693#M13503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I finally managed to make it work by using a combination of SmartConsole configuration for the username extraction part and GuiDBEdit configuration for the lookup part, but i don't think that this is the way it was intended to work. Even that took some trial and error to make it work.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2018 10:56:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29693#M13503</guid>
      <dc:creator>Damjan_Janev</dc:creator>
      <dc:date>2018-06-10T10:56:49Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate VPN authentication against LDAP using userPrincipalName (R80.10)</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29694#M13504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Aaaaaaand, that is not the end of my worries. I am experiencing, a similar issue when connection with Capsule Connect on IOS. This time, even the certificate parsing is stuck to default (DN). I have modified every sk61060 related item that seemed relevant to the mobile clients, but with no success.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2018 13:49:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29694#M13504</guid>
      <dc:creator>Damjan_Janev</dc:creator>
      <dc:date>2018-06-10T13:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate VPN authentication against LDAP using userPrincipalName (R80.10)</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29695#M13505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Possibly this SK?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk99035" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk99035"&gt;LDAP users connecting from Check Point Capsule Connect / VPN client cannot authenticate using certificate&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Otherwise it's probably worth a TAC case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2018 01:27:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29695#M13505</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-06-11T01:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate VPN authentication against LDAP using userPrincipalName (R80.10)</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29696#M13506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ended up with a TAC case. Lets see what happens next.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2018 06:40:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29696#M13506</guid>
      <dc:creator>Damjan_Janev</dc:creator>
      <dc:date>2018-06-12T06:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate VPN authentication against LDAP using userPrincipalName (R80.10)</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29697#M13507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have exactly same issue. Can you post the solution or SR number?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2018 14:24:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29697#M13507</guid>
      <dc:creator>OliverBayerlein</dc:creator>
      <dc:date>2018-07-25T14:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate VPN authentication against LDAP using userPrincipalName (R80.10)</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29698#M13508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you're using a 3rd Party Certificate, it might be overriding the configuration.&lt;/P&gt;&lt;P&gt;sk115637&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 3rd party Root CA has two parameters that define the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;user fetch&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;process:&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;EM&gt;use_cn_to_fetch_user&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(default: false)&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;EM&gt;use_principal_name&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(default: false)&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;BR /&gt;***If one of this two parameters are enabled (value=true) then the certificate parsing rules defined in the realm relevant for the VPN blade will not be applied after the certificate chain is completed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2018 03:04:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29698#M13508</guid>
      <dc:creator>SSlater</dc:creator>
      <dc:date>2018-07-30T03:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate VPN authentication against LDAP using userPrincipalName (R80.10)</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29699#M13509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The certificate parsing seems to work OK, according to the GUI settings. The subsequent LDAP search is not working properly.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2018 06:42:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/29699#M13509</guid>
      <dc:creator>Damjan_Janev</dc:creator>
      <dc:date>2018-07-30T06:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate VPN authentication against LDAP using userPrincipalName (R80.10)</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/60388#M13510</link>
      <description>&lt;P&gt;Did you ever get this solution working?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I am experiencing the same thing thing.&lt;/P&gt;&lt;P&gt;I have been able to make it all work(including Capsule VPN logins using 3rd party certificate),&amp;nbsp; In a test environment, using a combination of modifying VPN Client Authentication fields in Smart Dashboard, and editing the VPN realm using guidbedit.&lt;/P&gt;&lt;P&gt;But the the steps I had to take are not very intuitive, and took days of troubleshooting.&lt;BR /&gt;&lt;BR /&gt;I was just wondering if TAC ever gave a reason, or better solution that didn't involve guidbedit, of if this was resolved in maybe R80.30?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2019 12:54:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/60388#M13510</guid>
      <dc:creator>Scott_Bily</dc:creator>
      <dc:date>2019-08-15T12:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate VPN authentication against LDAP using userPrincipalName (R80.10)</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/160100#M13511</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you describe what fields you have changed in guidbedit. I am experiencing the same problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;</description>
      <pubDate>Fri, 21 Oct 2022 06:27:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Certificate-VPN-authentication-against-LDAP-using/m-p/160100#M13511</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2022-10-21T06:27:16Z</dc:date>
    </item>
  </channel>
</rss>

