Hey Lukas,
This is way I understand it...
If you right-click the existing subordinate CA object and choose Replace Certificate, then:
-
The old CA certificate data (public key, validity, serial) will be replaced with the new one.
-
Any trust relationships that rely on that CA object (e.g. VPN certificate validation, SAML trust, Mobile Access portal authentication) will now trust certificates chained to the new CA’s key.
-
However — Check Point will no longer recognize certificates that were signed by the previous CA key (i.e., old subordinate CA), even if they’re still valid and not expired.
That’s because the CA’s public key changes, and Check Point validates certificates by chaining to a specific key pair, not just by DN.
So in short:
-New client certificates signed by the new subordinate CA → will authenticate fine.
-Old certificates signed by the old subordinate CA (same DN, old key) → will fail validation once the replacement is applied.
Best,
Andy