- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
I know it can be done using ICA mgmt tool, but will check tomorrow using smart console in the lab.
Andy
I totally forgot I upgraded my lab mgmt to R82, but either way, those options are bit different, I cant see anywhere that lets you export the cert from smart console. Maybe someone else can confirm for you.
Andy
Thanks for your answer
But how to for ldap user use 2 factor auth with password + certificate ?
I will do some more tests Sunday and let you know.
Andy
Hey, sorry for the delay, will check this later today.
Andy
Im really struggling to find a way to do this from smart console (not even sure if its possible)...
Andy
Thanks for your answer
M.b. another way ?
Not by smartconsole?
R81.20
way like sk179785 not work in this case
becouse sk179785 get me GW certificate (in smartConsole gw and servers -> gw -> IPSec VPN -> Repository of certificates available to the gateway)
but I'm need p12 file for LDAP user (smartdashboard -> mobile access -> client certifiactes)
need second factor like certificate for remote acces in client for ldap user
how to do it ?
ok
vpn client do it (get cert from gw) automatic when enroll cert by first connect
but if in enroll procedure cert wasnt installed, dont now how to export p12 file
need recreate new certificate and its work
thanks
I assume the enrollment process actually generates the certificate on the client itself.
Which means there is nothing to export from the management.
If the enrollment process fails, you will need to issue another enrollment to the user.
If that process continues to fail, please consult with TAC.
All that means is the management has the user's public key, which is expected.
Without the private key, which is generated and stored only on the client itself, it is not useful to provide an export.
Storing these private certificates centrally presents an unnecessary security risk.
Even in cases where we have to manage a private key (e.g. Site-to-Site VPNs authenticated with certificates), a new certificate can easily be generated as needed.
To maintain security, when a new certificate is generated, the old one is marked as revoked in the CRL.
As such, we do not permit export of certificates after the initial generation.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
10 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY