<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Replacing subordinate CA certificate with same DN – will it affect existing VPN/SAML certificates? in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Replacing-subordinate-CA-certificate-with-same-DN-will-it-affect/m-p/261780#M1520</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I’d like to double-check the correct procedure for handling a subordinate CA renewal in Check Point management.&lt;/P&gt;&lt;P&gt;Our internal PKI admin has reissued a subordinate CA (*_sub_ca) certificate with &lt;STRONG&gt;the same Distinguished Name (CN=xxx_sub_ca, O=..., C=CZ)&lt;/STRONG&gt; but a new validity period (the old one is still valid until Jan 2026).&lt;/P&gt;&lt;P&gt;In our environment:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;The subordinate CA (*_sub_ca) and the root CA are both imported under &lt;EM&gt;Trusted CA Servers&lt;/EM&gt; and used for &lt;STRONG&gt;VPN certificates&lt;/STRONG&gt; (SAML and SSL VPN, certificate-based authentication).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The new subordinate CA certificate cannot be imported — SmartConsole reports:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;EM&gt;Error: Certificate with the same Distinguished Name already installed for another CA: dpp_sub_ca. Installation failed.&lt;/EM&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;On Cisco ISE, both CAs can coexist, but Check Point blocks this because of the identical DN.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Now, some of our mobile clients (Capsule VPN on Android) already received new user certificates signed by the new subordinate CA, and they can’t authenticate — because the gateway doesn’t trust the new CA yet.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Questions:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Can I safely perform a &lt;STRONG&gt;Replace Certificate&lt;/STRONG&gt; operation on the existing *_sub_ca object (keeping the same DN), so that both old and new client certificates remain trusted?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Will this “replace” operation preserve all existing trust relationships — e.g., issued VPN/SAML certificates that are still valid under the old CA?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Is there any best practice for temporarily supporting both old and new subordinate CA certificates (same DN) in parallel?&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;We are running:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Check Point R82 Management and Gateways&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Capsule VPN on Android/iOS (certificate-based auth)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The old and new subordinate CA have identical DN but different serial numbers and validity ranges.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Any official confirmation or experience from the field would be appreciated before we proceed with the replacement.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Lukáš&lt;/P&gt;</description>
    <pubDate>Tue, 04 Nov 2025 15:57:03 GMT</pubDate>
    <dc:creator>konecnyl</dc:creator>
    <dc:date>2025-11-04T15:57:03Z</dc:date>
    <item>
      <title>Replacing subordinate CA certificate with same DN – will it affect existing VPN/SAML certificates?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Replacing-subordinate-CA-certificate-with-same-DN-will-it-affect/m-p/261780#M1520</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I’d like to double-check the correct procedure for handling a subordinate CA renewal in Check Point management.&lt;/P&gt;&lt;P&gt;Our internal PKI admin has reissued a subordinate CA (*_sub_ca) certificate with &lt;STRONG&gt;the same Distinguished Name (CN=xxx_sub_ca, O=..., C=CZ)&lt;/STRONG&gt; but a new validity period (the old one is still valid until Jan 2026).&lt;/P&gt;&lt;P&gt;In our environment:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;The subordinate CA (*_sub_ca) and the root CA are both imported under &lt;EM&gt;Trusted CA Servers&lt;/EM&gt; and used for &lt;STRONG&gt;VPN certificates&lt;/STRONG&gt; (SAML and SSL VPN, certificate-based authentication).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The new subordinate CA certificate cannot be imported — SmartConsole reports:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;EM&gt;Error: Certificate with the same Distinguished Name already installed for another CA: dpp_sub_ca. Installation failed.&lt;/EM&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;On Cisco ISE, both CAs can coexist, but Check Point blocks this because of the identical DN.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Now, some of our mobile clients (Capsule VPN on Android) already received new user certificates signed by the new subordinate CA, and they can’t authenticate — because the gateway doesn’t trust the new CA yet.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Questions:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Can I safely perform a &lt;STRONG&gt;Replace Certificate&lt;/STRONG&gt; operation on the existing *_sub_ca object (keeping the same DN), so that both old and new client certificates remain trusted?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Will this “replace” operation preserve all existing trust relationships — e.g., issued VPN/SAML certificates that are still valid under the old CA?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Is there any best practice for temporarily supporting both old and new subordinate CA certificates (same DN) in parallel?&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;We are running:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Check Point R82 Management and Gateways&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Capsule VPN on Android/iOS (certificate-based auth)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The old and new subordinate CA have identical DN but different serial numbers and validity ranges.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Any official confirmation or experience from the field would be appreciated before we proceed with the replacement.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Lukáš&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 15:57:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Replacing-subordinate-CA-certificate-with-same-DN-will-it-affect/m-p/261780#M1520</guid>
      <dc:creator>konecnyl</dc:creator>
      <dc:date>2025-11-04T15:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing subordinate CA certificate with same DN – will it affect existing VPN/SAML certificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Replacing-subordinate-CA-certificate-with-same-DN-will-it-affect/m-p/261785#M1521</link>
      <description>&lt;P&gt;Hey Lukas,&lt;/P&gt;
&lt;P&gt;This is way I understand it...&lt;/P&gt;
&lt;P data-start="925" data-end="1020"&gt;If you right-click the existing subordinate CA object and choose &lt;STRONG data-start="990" data-end="1013"&gt;Replace Certificate&lt;/STRONG&gt;, then:&lt;/P&gt;
&lt;OL data-start="1021" data-end="1502"&gt;
&lt;LI data-start="1021" data-end="1117"&gt;
&lt;P data-start="1024" data-end="1117"&gt;The old CA certificate data (public key, validity, serial) will be replaced with the new one.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1118" data-end="1320"&gt;
&lt;P data-start="1121" data-end="1320"&gt;Any &lt;STRONG data-start="1125" data-end="1148"&gt;trust relationships&lt;/STRONG&gt; that rely on that CA object (e.g. VPN certificate validation, SAML trust, Mobile Access portal authentication) will now trust certificates &lt;STRONG data-start="1288" data-end="1319"&gt;chained to the new CA’s key&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1321" data-end="1502"&gt;
&lt;P data-start="1324" data-end="1502"&gt;However — Check Point will &lt;STRONG data-start="1351" data-end="1387"&gt;no longer recognize certificates&lt;/STRONG&gt; that were signed by the &lt;EM data-start="1412" data-end="1422"&gt;previous&lt;/EM&gt; CA key (i.e., old subordinate CA), even if they’re still valid and not expired.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P data-start="1504" data-end="1644"&gt;That’s because the CA’s &lt;STRONG data-start="1528" data-end="1542"&gt;public key&lt;/STRONG&gt; changes, and Check Point validates certificates by chaining to a &lt;EM data-start="1608" data-end="1627"&gt;specific key pair&lt;/EM&gt;, not just by DN.&lt;/P&gt;
&lt;P data-start="1646" data-end="1658"&gt;So in short:&lt;/P&gt;
&lt;P data-start="1646" data-end="1658"&gt;&lt;SPAN&gt;-New client certificates signed by the new subordinate CA → will authenticate fine.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-start="1661" data-end="1876"&gt;-Old certificates signed by the old subordinate CA (same DN, old key) → will fail validation once the replacement is applied.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 18:17:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Replacing-subordinate-CA-certificate-with-same-DN-will-it-affect/m-p/261785#M1521</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-04T18:17:05Z</dc:date>
    </item>
  </channel>
</rss>

