Hi,
I’ve been working on setting up Machine and Personal certificates authentication for Remote Access VPN users for our customer and both are working fine.
As part of the testing however, the customer disabled the test Active Directory(AD) user account, but the user was still able to authenticate the VPN for more than an hour after the account was disabled. I found that if I installed the Security Policy as part of disabling/enabling an AD user account the changes were immediate, but the customer understandably thinks that disabling an AD account should be sufficient to immediately revoke a user’s access.
I’m not concerned with any sessions that might already be active as these can be disconnected. I’m only interested in preventing new Remote Access connections immediately after the AD account has been disabled.
Does anyone know how to change this behaviour so that after an AD account has been disabled, it cannot be used to authenticate the Remote Access VPN?
For info the this is a distributed install running R81.10 Take 66 and EndPoint Security VPN E86.60.
Ref: Remote Access Clients for Windows 24/10/2022 Page 61.
Regards,
Glen.