<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN connection - device sertificate in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103513#M9576</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;is it possible to connect&amp;nbsp; VPN clients with device certificate which is enrolled by Intune in Azure cloud solution.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Specifically, we have established SCEPman service which is intergrated with Intune in Azure.&lt;/SPAN&gt;&amp;nbsp;This service enroll device certificate on all our clients (MacOS,Windows,Android and IOS).&lt;/P&gt;&lt;P&gt;I have been research on SK but only founded intergration device certification on-premise AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Sasa&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 27 Nov 2020 09:50:18 GMT</pubDate>
    <dc:creator>SasaSamardzic</dc:creator>
    <dc:date>2020-11-27T09:50:18Z</dc:date>
    <item>
      <title>VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103513#M9576</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;is it possible to connect&amp;nbsp; VPN clients with device certificate which is enrolled by Intune in Azure cloud solution.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Specifically, we have established SCEPman service which is intergrated with Intune in Azure.&lt;/SPAN&gt;&amp;nbsp;This service enroll device certificate on all our clients (MacOS,Windows,Android and IOS).&lt;/P&gt;&lt;P&gt;I have been research on SK but only founded intergration device certification on-premise AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Sasa&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2020 09:50:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103513#M9576</guid>
      <dc:creator>SasaSamardzic</dc:creator>
      <dc:date>2020-11-27T09:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103527#M9577</link>
      <description>&lt;P&gt;You have to import the CA so the GW will know and use it, see &lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103885&amp;amp;partition=Basic&amp;amp;product=IPSec" target="_blank"&gt;sk103885: How to change the &lt;STRONG&gt;certificate&lt;/STRONG&gt; presented by Security Gateway to Remote Access clients.&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2020 12:03:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103527#M9577</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-11-27T12:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103533#M9578</link>
      <description>&lt;P&gt;Hello, but on this tab I have only this option&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;This gateway authenticates with this certificate - defaultCert.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;How/Where I can upload to see appropriate certificate?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thanks&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Sasa&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2020 12:47:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103533#M9578</guid>
      <dc:creator>SasaSamardzic</dc:creator>
      <dc:date>2020-11-27T12:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103571#M9579</link>
      <description>&lt;P&gt;For device certificate authentication you must be on R80.40 or above gateway.&lt;BR /&gt;You would still need to import a copy of the public CA key from whatever is providing the certificates to your clients.&lt;BR /&gt;This is necessary so the device certificate can be validated.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Nov 2020 02:46:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103571#M9579</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-28T02:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103618#M9580</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;yes, version R80.40 is on gateway. Just to be sure, adding/importing public CA is doing on Trusted CA and on IPSec VPN I should add created CA which will replace existing deafultCert.&lt;/P&gt;&lt;P&gt;After validatation, client should be able connect to VPN (with device certificate), right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Sasa&lt;/P&gt;</description>
      <pubDate>Sun, 29 Nov 2020 19:38:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103618#M9580</guid>
      <dc:creator>SasaSamardzic</dc:creator>
      <dc:date>2020-11-29T19:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103626#M9581</link>
      <description>&lt;P&gt;The defaultCert comes from the ICA, so you can't really delete it.&lt;BR /&gt;It's also the gateway certificate, not the certificate authority itself.&lt;BR /&gt;You have to create an OPSEC CA object where you import the relevant public key.&lt;BR /&gt;(That's what it used to be called, it's a Trusted CA object in R80.40)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-11-29 at 7.51.39 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9350i72A7F3CD99E9110D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-11-29 at 7.51.39 PM.png" alt="Screen Shot 2020-11-29 at 7.51.39 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2020 03:53:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103626#M9581</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-30T03:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103665#M9582</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;we did all steps above.&lt;/P&gt;&lt;P&gt;My question is does certificate must be connected to on premise LDAP server or not?&lt;/P&gt;&lt;P&gt;We would use cloud based radius server integrated with microsoft Intune service.&lt;/P&gt;&lt;P&gt;Also please see attachment VPN_clients.png&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Sasa&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2020 08:55:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103665#M9582</guid>
      <dc:creator>SasaSamardzic</dc:creator>
      <dc:date>2020-11-30T08:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103796#M9583</link>
      <description>&lt;P&gt;If you want user group information, the gateway will need to be connected to an LDAP server of some sort.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2020 22:38:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103796#M9583</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-30T22:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103841#M9584</link>
      <description>&lt;P&gt;Thanks for feedback.&lt;/P&gt;&lt;P&gt;So, conclusion is: gateway can not check/validate device certificate directly to Intune&amp;nbsp;&lt;SPAN&gt;if it does not communicate with LDAP in any way&lt;/SPAN&gt;.LDAP is mandatory.&lt;/P&gt;&lt;P&gt;Please correct me if I am wrong.&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Sasa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2020 09:47:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103841#M9584</guid>
      <dc:creator>SasaSamardzic</dc:creator>
      <dc:date>2020-12-01T09:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103910#M9585</link>
      <description>&lt;P&gt;Certificate validation either requires LDAP or HTTPS for CRL checking.&lt;BR /&gt;Group information for users requires LDAP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2020 17:00:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/103910#M9585</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-01T17:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/158072#M9586</link>
      <description>&lt;P&gt;Hi Sasa, did you implement this project? everything works? i would like to do same thing. How did you configure client? like "Personal certificate"?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2022 18:40:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/158072#M9586</guid>
      <dc:creator>Sergo89</dc:creator>
      <dc:date>2022-09-26T18:40:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/158443#M9587</link>
      <description>&lt;P&gt;Hi Sergo89,&lt;/P&gt;&lt;P&gt;unfortunately not. Riht now, we are using "Personal Certificate".&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; is there any progress regarding Device Certificate without LDAP? We are on R81 version CP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sasa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 12:50:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/158443#M9587</guid>
      <dc:creator>SasaSamardzic</dc:creator>
      <dc:date>2022-09-29T12:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/158459#M9588</link>
      <description>&lt;P&gt;Thanks Sasa,&lt;/P&gt;&lt;P&gt;could you advise how to configure "Personal cert"? i couldnt find normal step by step description.&lt;/P&gt;&lt;P&gt;first step (i guess) i have install local cert from domain CA, what's next? and how to get certs for each remote client (or it will be just one cert)?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 14:44:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/158459#M9588</guid>
      <dc:creator>Sergo89</dc:creator>
      <dc:date>2022-09-29T14:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/158462#M9589</link>
      <description>&lt;P&gt;In terms of validating the certificate, the relevant CA key as to be configured as trusted.&lt;BR /&gt;Based on the other responses in this thread, you have not done this yet.&amp;nbsp;&lt;BR /&gt;Once you do this, you can issue certificates from your Certificate Authority.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to treat some users differently in your access policy, we need some way to differentiate the users.&amp;nbsp;&lt;BR /&gt;That either means:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Creating each user locally with the appropriate authentication method and adding them to a group&lt;/LI&gt;
&lt;LI&gt;Using LDAP&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Nothing has changed here.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 14:57:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/158462#M9589</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-09-29T14:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/158485#M9590</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; Thanks&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/39515"&gt;@Sergo89&lt;/a&gt;&amp;nbsp; Link bellow describe PKI.When every users get private certificate, additional configuration on CP is need (communication with local AD), on Autchentication tab for VPN clients create new connection with certificate&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://social.technet.microsoft.com/wiki/contents/articles/11750.adcs-step-by-step-guide-single-tier-pki-hierarchy-deployment.aspx" target="_blank"&gt;https://social.technet.microsoft.com/wiki/contents/articles/11750.adcs-step-by-step-guide-single-tier-pki-hierarchy-deployment.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 06:39:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/158485#M9590</guid>
      <dc:creator>SasaSamardzic</dc:creator>
      <dc:date>2022-09-30T06:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection - device sertificate</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/184548#M9591</link>
      <description>&lt;P&gt;Hi, did you succeed in any way? i also have scepman (including radius); my clients connect via capsule (now user and password); i would like to raise the security level but without changing the client&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 13:02:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-connection-device-sertificate/m-p/184548#M9591</guid>
      <dc:creator>michele</dc:creator>
      <dc:date>2023-06-22T13:02:51Z</dc:date>
    </item>
  </channel>
</rss>

