Solved

How does authentication happen in a Certificate based VPN connection.

Posted on 2011-03-11
4
346 Views
Last Modified: 2012-05-11
How does authentication happen in a Certificate based VPN connection.

This is the scenario in our company

There is a Microsoft CA server which issues certificates to the AD users.

A user was terminated . We disabled his AD account. Does the VPN certificate locally stored on the user's computer be enough to connect to our Network, till the certificate expires.

do we need to revoke his certificate manually from CA server.
0
Comment
Question by:Ramanand_R_Uni
  • 2
  • 2
4 Comments
 
LVL 9

Accepted Solution

by:
x3man earned 250 total points
ID: 35108068
Won't the user still need to pass their credentials when connecting to the VPN? In which case the user will not be able to connect as you have disabled their account. The certificate will still be a valid certificate but as it also requires a valid user account then it won't allow access on it's own.
0
 

Author Comment

by:Ramanand_R_Uni
ID: 35108866
The AD account is already disabled. The employee is terminated and we don't want him to access our network anymore. So as per your suggestion user should not be able to connect to VPN
0
 

Author Comment

by:Ramanand_R_Uni
ID: 35108880
The way our VPN works is just with the certificate. user doesn't have any other credentials to enter while connect. Its just a one click connect with a a certificate authentication
0
 
LVL 9

Expert Comment

by:x3man
ID: 35109174
Sounds like it would be a good idea to revoke the certificate.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SonicWALL SIP Transformation Problem 4 55
Unable to RDP to windows 10 pro machine 15 75
Radius Debug Error 16 59
More Than One Website On Same DMZ Server 3 55
Three simple tips to quickly and efficiently back up and protect the contents of your PC and Mac®.
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now