top of page
Search
katiguthridge464pc

No Client Certificate Presented For Af Portal On Mac: A Simple and Effective Method



In addition to the connector, you need to install the proper middleware app that can communicate with smart cards and offer client certificates that can authenticate you to HTTPS websites. Google has partnered with Drivelock to bring support for a wide range of cards and profiles, including PIV and CAC, onto ChromeOS. You can install the app by going to the entry on the Chrome Web Store and clicking on Install.




No Client Certificate Presented For Af Portal On Mac



We'll go through different scenarios that you might run into and how to troubleshoot those scenarios. We'll then address error codes and explain likely causes for certain error codes you might be seeing with mutual authentication. All client certificate authentication failures should result in an HTTP 400 error code.


Double check that the self-signed certificate that you're using has the extension BasicConstraintsOid = "2.5.29.19" which indicates the subject can act as a CA. This will ensure that the certificate used is a CA certificate. For more information about how to generate self-signed client certificates, check out trusted client certificates.


This is seen when the client doesn't send a client certificate when sending a request to the Application Gateway. This could happen if the client sending the request to the Application Gateway isn't configured correctly to use client certificates. One way to verify that the client authentication setup on Application Gateway is working as expected is through the following OpenSSL command:


-The site's fingerprint has changed from the original one.-The site presents itself as xx.yy.com and not as 1.1.1.1"I've made sure that the vpn site is setup on the client with dns name and also made sure that the root ca for entrust in the trust store on the client.My question is the following: Is there any way to not get this prompt after renewing the certificate? My thought is that you should not learn your users to press "trust and continue" on this message, if that one day an attacker is the one changing the cert.Wouldn't this prompt be the same as if you got prompted with a certificate warning whenever facebook or chekpoint renews their ssl certificates?Hope to hear from you!brJørgen


As soon as you change the registry, the client will have wrong finger print for the current certificate.You dont know the fingerprint for the new cert until you change it in management.This means that all clients have to be online between cert change and policy push, so that you can push the registry setting.If not the clients that were offline will not get the registry change and will be prompted either way.So I think we still would have the same issue with this, at least to some extent.


Did some more testing on this now, seems like you can just delete the "accepted_cn" key. It does not give you the prompt whenever it does not have a finger print already stored.Seems like the vpn client does not care about the certificate being verified by trusted CA or not.Tested by deleting the entrust root and intermediate ca from the trust store on the machine and the client did not care.


"My name is Gil, I will be assisting you throughout this ticket.I've noticed that sk66263 was already suggested to Jorgen at the CheckMates thread.That is indeed the answer I would have given out as well.As for the fact that the client cares about fingerprint only - that is true but only after the client has saved its first fingerprint to the registry.But at the very first connection by the client when it is first installed, the registry is empty, and then it does consider factors such as Subject and Issuer.The whole point of the fingerprint being stored at the registry is so that the client will "remember" the decision to trust that certificate and won't keep pestering the user to approve the cert again or not.From that point, if a new certificate is presented to the client, it will NOT trust the certificate regardless if all its fields are legit - and the reason will be that the fingerprint is different than what it "remembers".Now about distributing the fingerprints via GPO - even if users are offline, is it not possible to "queue" the push until they are online?Remember that indeed you will know what fingerprint to push after you renew the certificate in the MGMT server, but it won't actually be replaced until the policy is pushed, giving you some time to prepare.Additionally, once you have the new fingerprint in hand, the employees can be updated via email that should they see the "trust" message with the mentioned fingerprint, it's fine to approve it.Hope this helps a little!Please let me know if you have further questions.BR,Gil Fridman"


This is the RfC#1751 encoded representation of the SHA-1 fingerprint of the Root-CA of the certificate used for this portal (platform portal for legacy IP-Sec-VPN blade only, Mobile Access Blade Portal for MOB). Please verify this. Sometimes, it seems to be the fingerprint from intermediate instead of root CA.If this fingerprint changes, there is popup for your users. This means renewals of portal cert do not trigger popups for users, when the CA cert keeps the same. Of course, also CA cert expires eventually. This reduces your problem a little.


This is the RfC#1751 encoded representation of the SHA-1 fingerprint of the certificate configured in SmartConsole -> IPSec-VPN .Changing this cert does not seem to trigger a user popup. Warning: This expirience was from an environment without MOB, only Legacy IPSec-VPN blade for Remote Access with Endpoint Security VPN client.


To use mutual certificate authentication, select Use mutual authentication, and then for Client certificate ARN, specify the ARN of the client certificate that's provisioned in AWS Certificate Manager (ACM).


If the server and client certificates have been issued by the same Certificate Authority (CA), you can use the server certificate ARN for both server and client. If the client certificate was issued by a different CA, then the client certificate ARN should be specified.


If your certificate has no IP SAN, but DNS SANs (or if no DNS SAN, a Common Name in the Subject DN), you can get this to work by making your client use a URL with that host name instead (or a host name for which the cert would be valid, if there are multiple possible values). For example, if you cert has a name for www.example.com, use 2ff7e9595c


1 view0 comments

Recent Posts

See All

Comments


bottom of page