Point-to-site (P2S) Azure VPN
It seems there’s still some bugs to be worked out by the Azure guys with this point-to-site Azure VPN feature.
I have been wanting a secure way to access my Azure virtual machines for some time and I only just noticed they added this feature (still in Preview) a few months back. So I went about setting it up.
I had seemingly followed all the official guides. Got past all the the hurdles for the certificate creation stuff using the makecert tool (why doesn’t Azure offer to do all this for you? It’s not like everybody that uses Azure has a Visual Studio command shell installed on their PC!)
I then downloaded the 64-bit VPN Package for my Virtual Network. Installed it. Tried to connect and it was throwing this bizarre error:
A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
After some playing around it turned out that the VPN Package installer has a serious bug in it whereby it simply doesn’t install the Azure Gateway’s certificate into your certificate store. Luckily I had a copy of WinRAR on my machine and so I extracted the installer to take a peek inside and sure enough it contains a .cer certificate file. So I did WinKey+R, mmc, and added a Certificates snap-in for the Local Machine (not Current User!). Then navigated to the Trusted Root Certificates Authorities, right-click and choose the Import task. Find the .cer file you extracted from the VPN Package installer and install it.
Now retry the Azure VPN Connection and the error should go away and you’ll log straight in!
THANK YOU VERY MUCH!!!
Thanks. Never would have figured this out on my own.
Thank you!
[…] The workaround fix I found on my own was to extract a .cer from the installer .exe downloaded from Azure and to manually import this into the “Local Machine | Trusted Root Certification Authorities | Certificates” cert store; credit: Nathan Evans […]
Thank you !!!!