We are setting up AD authentication in our VPN (Cisco MX AnyConnect), its working fine until we enabled a certificate based on the Workstation template from our Windows CA. Self-signed certificate in test is working. We need guidence regarding how to configure the Workstation template for Client Certificate Authentication.
*** From client ****
Date : 08/22/2023
Time : 12:05:14
Type : Error
Source : csc_vpnapi
Description : Function: COpenSSLCertificate::VerifyKeyUsage
File: C:\temp\build\thehoff\Quicksilver_MR20.384855878117\Quicksilver_MR2\vpn\CommonCrypt\Certificates\OpenSSLCertificate.cpp
Line: 1865
Invoked Function: COpenSSLCertUtils::VerifyKeyUsage
Return Code: -31391724 (0xFE210014)
Description: CERTIFICATE_ERROR_VERIFY_KEYUSAGE_FAILED:The certificate did not contain the required Key Usages
******** From certificate in norwegian ***
Enhanced Key Usage (1.3.6.1.5.5.7.3.2)
Digital signatur, Ikke-avvisning, Nøkkelchiffrering (e0)