This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SSL Client automated install over SCOM

Is SSL VPN client any way connected with user x.509 certificate?

Can we deploy and install one SSL Client over SCOM or other automated client install sw or user MUST connect with it’s account to WebPortal?


This thread was automatically locked due to age.
Parents
  • I finally figured out how to deploy the Sophos VPN Client used with XG firewalls to computers ahead of time, while still allowing users to log into the Client Portal, download their configuration, and paste it into the config folder without requiring membership in the local Administrators group.

    1) Extract the Publisher Certificate from the client executable with 7-Zip:
        a. Log into the Sophos Client Portal and click "SSL VPN > Download Client and Configuration for Windows"
        b. In the File Explorer location that you downloaded the file, right click the executable and extract all contents to a folder
        c. Navigate into that folder, then open the "driver" folder and double click the "tap0901.cat" file
        d. Click "View Signature", then "View Certificate", then the "Details" tab, then "Copy to File...", Next, Next, click "Browse..." to choose a filename and location to save the certificate file.
        e. Close all windows.
    2) Add that certificate to the Trusted Publishers on all of the relevant domain-joined PCs using Group Policy
        a. In your policy, drill down to "Computer Configuration" > Policies > Windows Settings > Security Settings > Public Key Policies > Trusted Publishers"
        b. Right click that "Trusted Publishers" folder and click "Import...", click Next, browse to the certificate that you extracted in step 1, click Next and Finish.
        c. Wait 24 hours for all of the computers in the scope of this policy to receive the certificate when Group Policy checks in on their PC
    3) Use PDQ Deploy to perform the following two steps:
        a. Install the client and configuration that you downloaded in step 1 with the /S parameter
        b. Run an icacls command to change the permissions of the config folder to allow members of the local Users group to Modify:
        icacls "C:\Program Files (x86)\Sophos\Sophos SSL VPN Client\config" /grant Users:(OI)(CI)M /T
    4) Then, when users are ready, they log into the Sophos Client Portal with their AD credentials, click “SSL VPN > Download Configuration for Other OSs”, copy the file, navigate to the config folder in step 3.b, delete the old config file, paste in the one they just downloaded, then empty the trash.
    5) Connect to the VPN with their AD credentials. It works!

Reply
  • I finally figured out how to deploy the Sophos VPN Client used with XG firewalls to computers ahead of time, while still allowing users to log into the Client Portal, download their configuration, and paste it into the config folder without requiring membership in the local Administrators group.

    1) Extract the Publisher Certificate from the client executable with 7-Zip:
        a. Log into the Sophos Client Portal and click "SSL VPN > Download Client and Configuration for Windows"
        b. In the File Explorer location that you downloaded the file, right click the executable and extract all contents to a folder
        c. Navigate into that folder, then open the "driver" folder and double click the "tap0901.cat" file
        d. Click "View Signature", then "View Certificate", then the "Details" tab, then "Copy to File...", Next, Next, click "Browse..." to choose a filename and location to save the certificate file.
        e. Close all windows.
    2) Add that certificate to the Trusted Publishers on all of the relevant domain-joined PCs using Group Policy
        a. In your policy, drill down to "Computer Configuration" > Policies > Windows Settings > Security Settings > Public Key Policies > Trusted Publishers"
        b. Right click that "Trusted Publishers" folder and click "Import...", click Next, browse to the certificate that you extracted in step 1, click Next and Finish.
        c. Wait 24 hours for all of the computers in the scope of this policy to receive the certificate when Group Policy checks in on their PC
    3) Use PDQ Deploy to perform the following two steps:
        a. Install the client and configuration that you downloaded in step 1 with the /S parameter
        b. Run an icacls command to change the permissions of the config folder to allow members of the local Users group to Modify:
        icacls "C:\Program Files (x86)\Sophos\Sophos SSL VPN Client\config" /grant Users:(OI)(CI)M /T
    4) Then, when users are ready, they log into the Sophos Client Portal with their AD credentials, click “SSL VPN > Download Configuration for Other OSs”, copy the file, navigate to the config folder in step 3.b, delete the old config file, paste in the one they just downloaded, then empty the trash.
    5) Connect to the VPN with their AD credentials. It works!

Children
No Data