<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyconnect Client SSL authentication with Windows CA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-client-ssl-authentication-with-windows-ca/m-p/5055552#M1110608</link>
    <description>&lt;P&gt;I have the same Problem on a FTD managed by FDM, I installed the root &amp;amp; servercertificate from MS CA. Also I installed it onthe client PC but the result is allways Certificate Validation Failure... Any idea????&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Apr 2024 12:36:45 GMT</pubDate>
    <dc:creator>BURKHARD LANDWEHR</dc:creator>
    <dc:date>2024-04-03T12:36:45Z</dc:date>
    <item>
      <title>Anyconnect Client SSL authentication with Windows CA</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-ssl-authentication-with-windows-ca/m-p/4734372#M1095717</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;I have am using FMC and FTD version 7.2 and I have a working configuration using SAML authentication. I'm trying to add Certificate authentication, but I'm having a problem validating the certificate installed on my client machine. First a couple facts.&lt;/P&gt;&lt;P&gt;1. I have a windows CA that has pushed out computer certificates to all of my domain computers.&amp;nbsp;&lt;BR /&gt;2. In my remote access vpn config, I have installed a public certificate vpn.mydomain.com.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe my problem is that the FTD is trying to match the public cert with my computer's private cert and giving me an error "Certificate Validation Failure". Is there a way to present the vpn.mydomain.com website with a public certificate while my clients use the private cert? I plan to add another connection profile for vendors and I don't want to require certificates for them.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 00:12:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-ssl-authentication-with-windows-ca/m-p/4734372#M1095717</guid>
      <dc:creator>sanchezeldorado</dc:creator>
      <dc:date>2022-12-08T00:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client SSL authentication with Windows CA</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-ssl-authentication-with-windows-ca/m-p/4734671#M1095722</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1051209"&gt;@sanchezeldorado&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Yes, it is possible to use public CA signed certificate for your FTD devices, to identify FTD on the Internet, and at the same time to use private CA signed device certificate, to identify clients to your FTD. You can see config guide &lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ftd-6-6-anyconnect-client-with-machine-certificate-ad/ta-p/4280528" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Based on your error desciption, it looks to me like your FTD doesn't have private CA chain, so it can't validate client certificate, or client is not using private CA certificate to identify itself, so FTD doesn't trust offered one.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 08:48:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-ssl-authentication-with-windows-ca/m-p/4734671#M1095722</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-12-08T08:48:42Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client SSL authentication with Windows CA</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-ssl-authentication-with-windows-ca/m-p/4736581#M1095825</link>
      <description>&lt;P&gt;Thank you for the input. Unfortunately, it looks like I won't have the ability to get this configured. Have a good day!&lt;/P&gt;</description>
      <pubDate>Sun, 11 Dec 2022 15:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-ssl-authentication-with-windows-ca/m-p/4736581#M1095825</guid>
      <dc:creator>sanchezeldorado</dc:creator>
      <dc:date>2022-12-11T15:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client SSL authentication with Windows CA</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-ssl-authentication-with-windows-ca/m-p/5055552#M1110608</link>
      <description>&lt;P&gt;I have the same Problem on a FTD managed by FDM, I installed the root &amp;amp; servercertificate from MS CA. Also I installed it onthe client PC but the result is allways Certificate Validation Failure... Any idea????&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 12:36:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-ssl-authentication-with-windows-ca/m-p/5055552#M1110608</guid>
      <dc:creator>BURKHARD LANDWEHR</dc:creator>
      <dc:date>2024-04-03T12:36:45Z</dc:date>
    </item>
  </channel>
</rss>

