Tutorial: How to Replace 1024-bit VPN Certificates for Access Server
This tutorial will help you replace outdated 1024-bit certificates with more secure ones, ensuring long-term compatibility and security for your VPN clients.
Overview
This tutorial explains how to replace insecure 1024-bit VPN certificates with stronger ones for Access Server. With Access Server versions 2.9.2 and newer, you may encounter a warning message about legacy 1024-bit CA certificates, which are no longer considered secure. This guide will help you create a new CA certificate, migrate your VPN clients, and remove old certificates in a way that minimizes disruption to your users.
An installed Access Server version 2.9.2 or newer.
Console access and get root privileges.
A server configuration backup.
Understanding that changes will temporarily disconnect VPN clients.
Sign in to your Admin Web UI.
Click Configuration > CA Management.
Select the Create New CA tab.
Enter a common name.
Select the signing algorithm (recommended: secp384r1).
Click Create New CA.
Caution
This action forces a service restart, temporarily disconnecting VPN clients. After the restart, Access Server will accept clients using old and new certificates.
Notice
Most VPN clients will continue using their old certificates until new profiles are downloaded. Below are several ways users can migrate.
Option 1: Import a new profile in OpenVPN Connect
Open OpenVPN Connect.
Click the Add icon.
Enter your Access Server's URL.
Enter your username and password.
Click Import.
Option 2: Download a profile from the Client Web UI
Sign in to the Client Web UI (your server's IP or hostname without
/admin
).Download a connection (.ovpn) profile.
Open OpenVPN Connect.
Click Add icon, then File.
Drag and drop the .ovpn profile or browse for it on your device.
Option 3: Download pre-configured OpenVPN Connect from the Client Web UI
Sign in to the Client Web UI.
Download OpenVPN Connect for your specific platform.
Notice
Once all users have migrated to new profiles, the warning message regarding the 1024-bit CA will disappear when the old CA is deleted. Before removing it, verify that all users have switched to the new CA.
Sign in to the Admin Web UI.
Click Configuration > CA Management.
Locate the old CA and click View Profiles.
This takes you to the User Profiles page but only displays results for the specific CA certificate.
Expand the username to check the Last Used dates to ensure users no longer use old profiles.
If all users have migrated, you can safely delete the old CA.
Click Configuration > CA Management to return to the CA page.
Click Delete next to the old CA.
In the notification windows, check the box to delete this CA and all associated user profiles.
Click Delete and then Update Running Server.