When a P2S VPN gateway is configured to require certificate authentication, each client computer must have a client certificate installed locally. This article helps you install a client certificate locally on a client computer. You can also use Intune to install certain VPN client profiles and certificates.
For information about generating certificates, see the Generate certificates section of the Point-to-site configuration article.
macOS VPN clients are supported for the Resource Manager deployment model only. They are not supported for the classic deployment model.
The Linux client certificate is installed on the client as part of the client configuration. There are a few different methods to install certificates. You can use strongSwan steps, or OpenVPN client.
To continue configuration, go back to the client that you were working on. You can use this table to easily locate the link:
Authentication | Tunnel type | Client OS | VPN client |
---|---|---|---|
Certificate | |||
IKEv2, SSTP | Windows | Native VPN client | |
IKEv2 | macOS | Native VPN client | |
IKEv2 | Linux | strongSwan | |
OpenVPN | Windows | Azure VPN client OpenVPN client | |
OpenVPN | macOS | OpenVPN client | |
OpenVPN | iOS | OpenVPN client | |
OpenVPN | Linux | Azure VPN Client OpenVPN client | |
Microsoft Entra ID | |||
OpenVPN | Windows | Azure VPN client | |
OpenVPN | macOS | Azure VPN Client | |
OpenVPN | Linux | Azure VPN Client |
Continue with the Point-to-Site configuration steps to Create and install VPN client configuration files. Use the links in the VPN client table.