<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure Domain Logon - Certificate is badly signed in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/124767#M8263</link>
    <description>&lt;P&gt;Would recommend opening a TAC here.&lt;/P&gt;</description>
    <pubDate>Fri, 23 Jul 2021 15:45:13 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-07-23T15:45:13Z</dc:date>
    <item>
      <title>Secure Domain Logon - Certificate is badly signed</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/124734#M8260</link>
      <description>&lt;P&gt;Hey Mates,&lt;/P&gt;&lt;P&gt;we are using Remote Access VPN with 3rd party CA (Windows PKI) on a 80.20 setup.&lt;/P&gt;&lt;P&gt;When clients try to use the secure logon to connect prior to Windows login, the users get a failed connection with the error message "Certificate is badly signed". As soon, as the windows login is over, the Remote Access login works just fine.&lt;/P&gt;&lt;P&gt;Also, we switched our CA a while ago. This problem only happens with Certificates from the new CA, with certificates from the old ca domain logon works&lt;/P&gt;&lt;P&gt;I dont really understand how to read the "Certificate is badly signed" message&lt;/P&gt;&lt;P&gt;What does this mean? How can it be badly signed and then it is accepted 2 minutes later? Is this a CRL problem?&lt;/P&gt;&lt;P&gt;I would appreciate some input, if anybody had such an issue before&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jul 2021 05:49:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/124734#M8260</guid>
      <dc:creator>Alias</dc:creator>
      <dc:date>2021-07-23T05:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Domain Logon - Certificate is badly signed</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/124740#M8261</link>
      <description>&lt;P&gt;Did you import the CA key and all the intermediate certificates into the CA key store on the client?&lt;BR /&gt;When you imported the CA key into the gateway, did you also include any intermediate certificates?&lt;BR /&gt;At least from a few TAC cases, this seems to be one potential reason for the issue.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jul 2021 07:10:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/124740#M8261</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-23T07:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Domain Logon - Certificate is badly signed</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/124749#M8262</link>
      <description>&lt;P&gt;Hey Phoneboy,&lt;/P&gt;&lt;P&gt;thank you for your reply&lt;/P&gt;&lt;P&gt;Yes, the CAs are correctly implemented on the clients and the gateway. Just for my own understanding, if it weren't correctly configured, the VPN shouldnt work at all?&lt;/P&gt;&lt;P&gt;I deactived the CRL checking on the gateway as described in&amp;nbsp;sk21156 to see if it is a CRL problem, but it still doesn't work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jul 2021 08:10:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/124749#M8262</guid>
      <dc:creator>Alias</dc:creator>
      <dc:date>2021-07-23T08:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Domain Logon - Certificate is badly signed</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/124767#M8263</link>
      <description>&lt;P&gt;Would recommend opening a TAC here.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jul 2021 15:45:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/124767#M8263</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-23T15:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Domain Logon - Certificate is badly signed</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/124919#M8264</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;yeah, I am afraid I have to.&lt;/P&gt;&lt;P&gt;I tried a couple of things and I suspect it has to do with another issue I had a while ago with renewing a CA and posted here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Remote-Access-VPN/How-to-implement-a-renewed-3rd-Party-Issuing-CA-Cert/m-p/119385#M5189" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Remote-Access-VPN/How-to-implement-a-renewed-3rd-Party-Issuing-CA-Cert/m-p/119385#M5189&lt;/A&gt;&lt;/P&gt;&lt;P&gt;We'll see. Thanks for your help&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;D&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jul 2021 12:34:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/124919#M8264</guid>
      <dc:creator>Alias</dc:creator>
      <dc:date>2021-07-26T12:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Domain Logon - Certificate is badly signed</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/160936#M8265</link>
      <description>&lt;P&gt;We have the same issue but only for a few laptops with 86.60. We have opened a case howerver would like to know if there was a solution.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 17:45:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/160936#M8265</guid>
      <dc:creator>514numbers</dc:creator>
      <dc:date>2022-11-01T17:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Domain Logon - Certificate is badly signed</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/172451#M8267</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;The fix for the "&lt;SPAN&gt;Certificate is badly signed&lt;/SPAN&gt;" issue will be available in coming E87.20 (should be GA within few weeks). If for some reason it doesn't help in your specific configuration, please open support case and refer this ID: "ESVPN-3747".&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2023 09:36:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Domain-Logon-Certificate-is-badly-signed/m-p/172451#M8267</guid>
      <dc:creator>AndreiR</dc:creator>
      <dc:date>2023-02-23T09:36:18Z</dc:date>
    </item>
  </channel>
</rss>

