- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello,
is it possible to connect VPN clients with device certificate which is enrolled by Intune in Azure cloud solution.
Specifically, we have established SCEPman service which is intergrated with Intune in Azure. This service enroll device certificate on all our clients (MacOS,Windows,Android and IOS).
I have been research on SK but only founded intergration device certification on-premise AD.
Kind Regards
Sasa
You have to import the CA so the GW will know and use it, see sk103885: How to change the certificate presented by Security Gateway to Remote Access clients.
Hello, but on this tab I have only this option
This gateway authenticates with this certificate - defaultCert.
How/Where I can upload to see appropriate certificate?
Thanks
Sasa
For device certificate authentication you must be on R80.40 or above gateway.
You would still need to import a copy of the public CA key from whatever is providing the certificates to your clients.
This is necessary so the device certificate can be validated.
Hello,
yes, version R80.40 is on gateway. Just to be sure, adding/importing public CA is doing on Trusted CA and on IPSec VPN I should add created CA which will replace existing deafultCert.
After validatation, client should be able connect to VPN (with device certificate), right?
Kind Regards
Sasa
The defaultCert comes from the ICA, so you can't really delete it.
It's also the gateway certificate, not the certificate authority itself.
You have to create an OPSEC CA object where you import the relevant public key.
(That's what it used to be called, it's a Trusted CA object in R80.40)
If you want user group information, the gateway will need to be connected to an LDAP server of some sort.
Thanks for feedback.
So, conclusion is: gateway can not check/validate device certificate directly to Intune if it does not communicate with LDAP in any way.LDAP is mandatory.
Please correct me if I am wrong.
Kind Regards
Sasa
Certificate validation either requires LDAP or HTTPS for CRL checking.
Group information for users requires LDAP.
Hi Sasa, did you implement this project? everything works? i would like to do same thing. How did you configure client? like "Personal certificate"?
thanks
Hi Sergo89,
unfortunately not. Riht now, we are using "Personal Certificate".
@PhoneBoy is there any progress regarding Device Certificate without LDAP? We are on R81 version CP
Sasa
Thanks Sasa,
could you advise how to configure "Personal cert"? i couldnt find normal step by step description.
first step (i guess) i have install local cert from domain CA, what's next? and how to get certs for each remote client (or it will be just one cert)?
thanks
In terms of validating the certificate, the relevant CA key as to be configured as trusted.
Based on the other responses in this thread, you have not done this yet.
Once you do this, you can issue certificates from your Certificate Authority.
If you want to treat some users differently in your access policy, we need some way to differentiate the users.
That either means:
Nothing has changed here.
Hi, did you succeed in any way? i also have scepman (including radius); my clients connect via capsule (now user and password); i would like to raise the security level but without changing the client
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
3 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY