Connect Client - questions about client certificates
Posted: Wed Oct 20, 2021 8:30 pm
I have a couple of issue I need to address / figure out before we can complete our migration away from our previous vpn product to OpenVPN Connect.
First has to do with client certificates. Our authentication scheme is username + password and client certificate (this satisfies our cyber security policy of using two factors of authentication). I am able to get this up and running on a Windows workstation without much difficulty. The end user simply keys in user name and password, then the server authenticates the client certificate. Easy peasy. However, ideally, I would like to run OpenVPN Connect as a service in the background that automatically connects at boot without any end user intervention or action needed.
I presume that with a username/password factor involved, this wouldn't work, or wouldn't work well at any rate. My questions are 1) is there a way to do this with username + password as one of my factors and 2) is there an alternative to username + password and client certificate? Is there something else I could use besides the username + password factor?
Second issue also relates to client certificates. In an OVPN profile, I can instruct the client software to read certificates from the Windows Certificate Store using the "cryptoapicert" directive. In OpenVPN Connect 3, this searches for a client certificate located in the OpenVPN Certificate Store linked to an end user's Windows account (I presume, but don't know for certain, that if OpenVPN Connect 3 is running as a background service, it would search the local Administrator account's OpenVPN Certificate Store). I would prefer not to go through the steps of deploying certificates to individual Windows accounts if I can avoid it, and we are not even slightly interested in deploying ADCS at this time to do it automatically. Is there a way to get OpenVPN Connect 3 to search the local machine's OpenVPN Certificate Store?
In terms of this last issue, I am finding that OpenVPN Connect 2 is a better product. It searches the local machine's certificate store and it doesn't search a special store called OpenVPN Client Certificates. It simply searches the Personal certificate store for the local machine. This is a much better, much simpler arrangement that should've been maintained with OpenVPN Connect 3. In my opinion of course.
First has to do with client certificates. Our authentication scheme is username + password and client certificate (this satisfies our cyber security policy of using two factors of authentication). I am able to get this up and running on a Windows workstation without much difficulty. The end user simply keys in user name and password, then the server authenticates the client certificate. Easy peasy. However, ideally, I would like to run OpenVPN Connect as a service in the background that automatically connects at boot without any end user intervention or action needed.
I presume that with a username/password factor involved, this wouldn't work, or wouldn't work well at any rate. My questions are 1) is there a way to do this with username + password as one of my factors and 2) is there an alternative to username + password and client certificate? Is there something else I could use besides the username + password factor?
Second issue also relates to client certificates. In an OVPN profile, I can instruct the client software to read certificates from the Windows Certificate Store using the "cryptoapicert" directive. In OpenVPN Connect 3, this searches for a client certificate located in the OpenVPN Certificate Store linked to an end user's Windows account (I presume, but don't know for certain, that if OpenVPN Connect 3 is running as a background service, it would search the local Administrator account's OpenVPN Certificate Store). I would prefer not to go through the steps of deploying certificates to individual Windows accounts if I can avoid it, and we are not even slightly interested in deploying ADCS at this time to do it automatically. Is there a way to get OpenVPN Connect 3 to search the local machine's OpenVPN Certificate Store?
In terms of this last issue, I am finding that OpenVPN Connect 2 is a better product. It searches the local machine's certificate store and it doesn't search a special store called OpenVPN Client Certificates. It simply searches the Personal certificate store for the local machine. This is a much better, much simpler arrangement that should've been maintained with OpenVPN Connect 3. In my opinion of course.