Hi,
Anyone advise any way of doing this, or do we have to just make a decision on whether to store this cert/key in software for ALL machines?
Cheers
James
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Hi,
We have an issue on some older TPM 1.2 devices with user certs being used for always on VPN.
It seems this is an existing issue for RSA algorithms on these older modules, with TPM 2.0 not suffering the same issue.
As we deploy VPN user auth certs via AD CA enrollment, we want to find if there is a way to store this cert/key in software crypto provider, only on those machines that have TPM 1.2 modules.
We can obviously update the cert template to remove the Platform Crypto Provider option, but we would prefer, if possible, to keep TPM 2.0 devices storing the cert in the hardware TPM module.
Many thanks.
James
Hi,
Anyone advise any way of doing this, or do we have to just make a decision on whether to store this cert/key in software for ALL machines?
Cheers
James
We have decided to simply have this particular cert set to store in software provider, rather than hardware, which resolves our issue (albeit not in a perfect way).