Solved

How does authentication happen in a Certificate based VPN connection.

Posted on 2011-03-11
4
348 Views
Last Modified: 2012-05-11
How does authentication happen in a Certificate based VPN connection.

This is the scenario in our company

There is a Microsoft CA server which issues certificates to the AD users.

A user was terminated . We disabled his AD account. Does the VPN certificate locally stored on the user's computer be enough to connect to our Network, till the certificate expires.

do we need to revoke his certificate manually from CA server.
0
Comment
Question by:Ramanand_R_Uni
  • 2
  • 2
4 Comments
 
LVL 9

Accepted Solution

by:
x3man earned 250 total points
ID: 35108068
Won't the user still need to pass their credentials when connecting to the VPN? In which case the user will not be able to connect as you have disabled their account. The certificate will still be a valid certificate but as it also requires a valid user account then it won't allow access on it's own.
0
 

Author Comment

by:Ramanand_R_Uni
ID: 35108866
The AD account is already disabled. The employee is terminated and we don't want him to access our network anymore. So as per your suggestion user should not be able to connect to VPN
0
 

Author Comment

by:Ramanand_R_Uni
ID: 35108880
The way our VPN works is just with the certificate. user doesn't have any other credentials to enter while connect. Its just a one click connect with a a certificate authentication
0
 
LVL 9

Expert Comment

by:x3man
ID: 35109174
Sounds like it would be a good idea to revoke the certificate.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Public Printing Options 3 46
VPN Server config in Modem 5 23
SAP HANA vulnerability threat report. 2 18
Exchange2013 MAPI 6 13
One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question