- CheckMates
- :
- Products
- :
- Quantum
- :
- Remote Access VPN
- :
- Re: VPN connection - device sertificate
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
VPN connection - device sertificate
Hello,
is it possible to connect VPN clients with device certificate which is enrolled by Intune in Azure cloud solution.
Specifically, we have established SCEPman service which is intergrated with Intune in Azure. This service enroll device certificate on all our clients (MacOS,Windows,Android and IOS).
I have been research on SK but only founded intergration device certification on-premise AD.
Kind Regards
Sasa
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You have to import the CA so the GW will know and use it, see sk103885: How to change the certificate presented by Security Gateway to Remote Access clients.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello, but on this tab I have only this option
This gateway authenticates with this certificate - defaultCert.
How/Where I can upload to see appropriate certificate?
Thanks
Sasa
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
For device certificate authentication you must be on R80.40 or above gateway.
You would still need to import a copy of the public CA key from whatever is providing the certificates to your clients.
This is necessary so the device certificate can be validated.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
yes, version R80.40 is on gateway. Just to be sure, adding/importing public CA is doing on Trusted CA and on IPSec VPN I should add created CA which will replace existing deafultCert.
After validatation, client should be able connect to VPN (with device certificate), right?
Kind Regards
Sasa
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The defaultCert comes from the ICA, so you can't really delete it.
It's also the gateway certificate, not the certificate authority itself.
You have to create an OPSEC CA object where you import the relevant public key.
(That's what it used to be called, it's a Trusted CA object in R80.40)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
we did all steps above.
My question is does certificate must be connected to on premise LDAP server or not?
We would use cloud based radius server integrated with microsoft Intune service.
Also please see attachment VPN_clients.png
Kind Regards
Sasa
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If you want user group information, the gateway will need to be connected to an LDAP server of some sort.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks for feedback.
So, conclusion is: gateway can not check/validate device certificate directly to Intune if it does not communicate with LDAP in any way.LDAP is mandatory.
Please correct me if I am wrong.
Kind Regards
Sasa
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Certificate validation either requires LDAP or HTTPS for CRL checking.
Group information for users requires LDAP.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Sasa, did you implement this project? everything works? i would like to do same thing. How did you configure client? like "Personal certificate"?
thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Sergo89,
unfortunately not. Riht now, we are using "Personal Certificate".
@PhoneBoy is there any progress regarding Device Certificate without LDAP? We are on R81 version CP
Sasa
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks Sasa,
could you advise how to configure "Personal cert"? i couldnt find normal step by step description.
first step (i guess) i have install local cert from domain CA, what's next? and how to get certs for each remote client (or it will be just one cert)?
thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
In terms of validating the certificate, the relevant CA key as to be configured as trusted.
Based on the other responses in this thread, you have not done this yet.
Once you do this, you can issue certificates from your Certificate Authority.
If you want to treat some users differently in your access policy, we need some way to differentiate the users.
That either means:
- Creating each user locally with the appropriate authentication method and adding them to a group
- Using LDAP
Nothing has changed here.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi, did you succeed in any way? i also have scepman (including radius); my clients connect via capsule (now user and password); i would like to raise the security level but without changing the client