[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

How does authentication happen in a Certificate based VPN connection.

Posted on 2011-03-11
4
Medium Priority
?
357 Views
Last Modified: 2012-05-11
How does authentication happen in a Certificate based VPN connection.

This is the scenario in our company

There is a Microsoft CA server which issues certificates to the AD users.

A user was terminated . We disabled his AD account. Does the VPN certificate locally stored on the user's computer be enough to connect to our Network, till the certificate expires.

do we need to revoke his certificate manually from CA server.
0
Comment
Question by:Ramanand_R_Uni
  • 2
  • 2
4 Comments
 
LVL 9

Accepted Solution

by:
x3man earned 1000 total points
ID: 35108068
Won't the user still need to pass their credentials when connecting to the VPN? In which case the user will not be able to connect as you have disabled their account. The certificate will still be a valid certificate but as it also requires a valid user account then it won't allow access on it's own.
0
 

Author Comment

by:Ramanand_R_Uni
ID: 35108866
The AD account is already disabled. The employee is terminated and we don't want him to access our network anymore. So as per your suggestion user should not be able to connect to VPN
0
 

Author Comment

by:Ramanand_R_Uni
ID: 35108880
The way our VPN works is just with the certificate. user doesn't have any other credentials to enter while connect. Its just a one click connect with a a certificate authentication
0
 
LVL 9

Expert Comment

by:x3man
ID: 35109174
Sounds like it would be a good idea to revoke the certificate.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Experts Exchange expands question security options for members.
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question