Hey Mates,
we are using Remote Access VPN with 3rd party CA (Windows PKI) on a 80.20 setup.
When clients try to use the secure logon to connect prior to Windows login, the users get a failed connection with the error message "Certificate is badly signed". As soon, as the windows login is over, the Remote Access login works just fine.
Also, we switched our CA a while ago. This problem only happens with Certificates from the new CA, with certificates from the old ca domain logon works
I dont really understand how to read the "Certificate is badly signed" message
What does this mean? How can it be badly signed and then it is accepted 2 minutes later? Is this a CRL problem?
I would appreciate some input, if anybody had such an issue before
Cheers