- Products
- Learn
- Local User Groups
- Partners
- More
Secure Your AI Transformation
9 April @ 12pm SGT / 3pm CET / 2PM EDT
AI Security Masters E6: When AI Goes Wrong -
Hallucinations, Jailbreaks, and the Curious Behavior of AI Agents
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
I know it can be done using ICA mgmt tool, but will check tomorrow using smart console in the lab.
Andy
I totally forgot I upgraded my lab mgmt to R82, but either way, those options are bit different, I cant see anywhere that lets you export the cert from smart console. Maybe someone else can confirm for you.
Andy
Thanks for your answer
But how to for ldap user use 2 factor auth with password + certificate ?
I will do some more tests Sunday and let you know.
Andy
Hey, sorry for the delay, will check this later today.
Andy
Im really struggling to find a way to do this from smart console (not even sure if its possible)...
Andy
Thanks for your answer
M.b. another way ?
Not by smartconsole?
R81.20
Maybe this?
Andy
https://support.checkpoint.com/results/sk/sk179785
way like sk179785 not work in this case
becouse sk179785 get me GW certificate (in smartConsole gw and servers -> gw -> IPSec VPN -> Repository of certificates available to the gateway)
but I'm need p12 file for LDAP user (smartdashboard -> mobile access -> client certifiactes)
need second factor like certificate for remote acces in client for ldap user
how to do it ?
ok
vpn client do it (get cert from gw) automatic when enroll cert by first connect
but if in enroll procedure cert wasnt installed, dont now how to export p12 file
need recreate new certificate and its work
thanks
I assume the enrollment process actually generates the certificate on the client itself.
Which means there is nothing to export from the management.
If the enrollment process fails, you will need to issue another enrollment to the user.
If that process continues to fail, please consult with TAC.
All that means is the management has the user's public key, which is expected.
Without the private key, which is generated and stored only on the client itself, it is not useful to provide an export.
Storing these private certificates centrally presents an unnecessary security risk.
Even in cases where we have to manage a private key (e.g. Site-to-Site VPNs authenticated with certificates), a new certificate can easily be generated as needed.
To maintain security, when a new certificate is generated, the old one is marked as revoked in the CRL.
As such, we do not permit export of certificates after the initial generation.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 10 | |
| 9 | |
| 8 | |
| 7 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 3 | |
| 3 |
Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 14 Apr 2026 @ 03:00 PM (PDT)
Renton, WA: Securing The AI Transformation and Exposure ManagementThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY