- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
I’ve been working on setting up Machine and Personal certificates authentication for Remote Access VPN users for our customer and both are working fine.
As part of the testing however, the customer disabled the test Active Directory(AD) user account, but the user was still able to authenticate the VPN for more than an hour after the account was disabled. I found that if I installed the Security Policy as part of disabling/enabling an AD user account the changes were immediate, but the customer understandably thinks that disabling an AD account should be sufficient to immediately revoke a user’s access.
I’m not concerned with any sessions that might already be active as these can be disconnected. I’m only interested in preventing new Remote Access connections immediately after the AD account has been disabled.
Does anyone know how to change this behaviour so that after an AD account has been disabled, it cannot be used to authenticate the Remote Access VPN?
For info the this is a distributed install running R81.10 Take 66 and EndPoint Security VPN E86.60.
Ref: Remote Access Clients for Windows 24/10/2022 Page 61.
Regards,
Glen.
Most probably, this is related to the re-authentication timeouts and password caching. Please look into the RAS Admin Guide, "Remote Access Advanced Configuration" chapter.
Sorry, I misread your post. You are using a personal certificate, which is only checked vs AD after the CRL cache expires. The default time for the CRL cache is 60 min, which is consistent with your symptoms. Policy push is flashing the CRL cache. All described is an expected behavior related to the authentication scheme in use.
There are a few alternatives:
1. Using AD username/password authentication
2. Reducing CRL cache timeout.
3. Pushing the policy.
Hi Val,
I know from testing that when an AD account is disabled the Personal Certificate in the AD Certificate Authority is still valid and not revoked. I'm unsure from the AD/CA perspective how a seemingly (Valid) Personal Certificate is then added to the CRL list which in turn is then updated and cached on the gateway.
I’ve checked and the CRL in our customers environment is configured to fetch a new CRL after 24 hours. I'll try reducing the CRL cache to 30 minutes to see if the behaviour changes.
Thanks for the info.
Glen.
Uh right, it could be 24 hours. As I said before, if your customer is expecting the users to be cut immediately after account suspension, a personal certificate is not a good option.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 3 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY