Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
SasaSamardzic
Explorer

VPN connection - device sertificate

Hello,

is it possible to connect  VPN clients with device certificate which is enrolled by Intune in Azure cloud solution.

Specifically, we have established SCEPman service which is intergrated with Intune in Azure. This service enroll device certificate on all our clients (MacOS,Windows,Android and IOS).

I have been research on SK but only founded intergration device certification on-premise AD.

 

Kind Regards

Sasa 

0 Kudos
15 Replies
G_W_Albrecht
Legend Legend
Legend

You have to import the CA so the GW will know and use it, see sk103885: How to change the certificate presented by Security Gateway to Remote Access clients.

CCSE / CCTE / CTPS / CCME / CCSM Elite / SMB Specialist
0 Kudos
SasaSamardzic
Explorer

Hello, but on this tab I have only this option 

This gateway authenticates with this certificate - defaultCert.

How/Where I can upload to see appropriate certificate?

Thanks

Sasa

0 Kudos
PhoneBoy
Admin
Admin

For device certificate authentication you must be on R80.40 or above gateway.
You would still need to import a copy of the public CA key from whatever is providing the certificates to your clients.
This is necessary so the device certificate can be validated.

0 Kudos
SasaSamardzic
Explorer

Hello,

yes, version R80.40 is on gateway. Just to be sure, adding/importing public CA is doing on Trusted CA and on IPSec VPN I should add created CA which will replace existing deafultCert.

After validatation, client should be able connect to VPN (with device certificate), right?

 

Kind Regards

Sasa

0 Kudos
PhoneBoy
Admin
Admin

The defaultCert comes from the ICA, so you can't really delete it.
It's also the gateway certificate, not the certificate authority itself.
You have to create an OPSEC CA object where you import the relevant public key.
(That's what it used to be called, it's a Trusted CA object in R80.40)

Screen Shot 2020-11-29 at 7.51.39 PM.png

0 Kudos
SasaSamardzic
Explorer

Hello,

we did all steps above.

My question is does certificate must be connected to on premise LDAP server or not?

We would use cloud based radius server integrated with microsoft Intune service.

Also please see attachment VPN_clients.png

 

Kind Regards

Sasa

0 Kudos
PhoneBoy
Admin
Admin

If you want user group information, the gateway will need to be connected to an LDAP server of some sort.

0 Kudos
SasaSamardzic
Explorer

Thanks for feedback.

So, conclusion is: gateway can not check/validate device certificate directly to Intune if it does not communicate with LDAP in any way.LDAP is mandatory.

Please correct me if I am wrong.

Kind Regards

Sasa

 

0 Kudos
PhoneBoy
Admin
Admin

Certificate validation either requires LDAP or HTTPS for CRL checking.
Group information for users requires LDAP. 

0 Kudos
Sergo89
Collaborator

Hi Sasa, did you implement this project? everything works? i would like to do same thing. How did you configure client? like "Personal certificate"?

thanks

0 Kudos
SasaSamardzic
Explorer

Hi Sergo89,

unfortunately not. Riht now, we are using "Personal Certificate".

@PhoneBoy  is there any progress regarding Device Certificate without LDAP? We are on R81 version CP

 

Sasa

 

0 Kudos
Sergo89
Collaborator

Thanks Sasa,

could you advise how to configure "Personal cert"? i couldnt find normal step by step description.

first step (i guess) i have install local cert from domain CA, what's next? and how to get certs for each remote client (or it will be just one cert)?

thanks

0 Kudos
PhoneBoy
Admin
Admin

In terms of validating the certificate, the relevant CA key as to be configured as trusted.
Based on the other responses in this thread, you have not done this yet. 
Once you do this, you can issue certificates from your Certificate Authority. 

If you want to treat some users differently in your access policy, we need some way to differentiate the users. 
That either means:

  • Creating each user locally with the appropriate authentication method and adding them to a group
  • Using LDAP

Nothing has changed here.

0 Kudos
SasaSamardzic
Explorer

@PhoneBoy  Thanks

@Sergo89  Link bellow describe PKI.When every users get private certificate, additional configuration on CP is need (communication with local AD), on Autchentication tab for VPN clients create new connection with certificate 

https://social.technet.microsoft.com/wiki/contents/articles/11750.adcs-step-by-step-guide-single-tie...

 

0 Kudos
michele
Explorer

Hi, did you succeed in any way? i also have scepman (including radius); my clients connect via capsule (now user and password); i would like to raise the security level but without changing the client

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events