HCHTech
Well-Known Member
- Reaction score
- 4,034
- Location
- Pittsburgh, PA - USA
In my end of the SMB pool, most of my clients don't have servers. When we setup WFH for someone we:
1. Configure SSLVPN on their firewall (we're a Sonicwall shop), enabling 2FA for each SSLVPN user
2. Configure NetBIOS over VPN so users can connect to machine names instead of IP addresses
3. Export certificates for each employee's office computer
4. Setup an A record for something like remote.theirdomain.com and point it to their public IP
5. Purchase a cert for remote.theirdomain.com and install it on the firewall
6. Install the VPN client on the (almost always BYOD) employees' home computers
7. Configure 2FA for the VPN connection on an authenticator app on the employee's mobile
8. Import the certificate for each employee's work machine onto their home computer
9. Configure and save on the home computer an RDP connection to the work computer using the machine name and their username
This allows secure, 2FA connections without certificate warnings. This does require extra work exporting and importing certificates, though, every time either the home computer or the work computer for an employee is replaced. Since I mostly deal with small clients, though, this extra work isn't a deal breaker.
Because this is the method I know, I have also used it with clients that do have on prem servers, even though the more-acceptable method is to setup a local certificate authority, which somehow automagically handles certificates for any domain-joined computer.
I'm wondering at what level (client size, other determinates?) it really makes sense setup and maintain a certificate authority, how much work that really is, and what the pros and cons of that are. I've been thinking about this for my largest client, who is approaching 50 employees. We're replacing about 2 workstations a month on average now, so there has been more of the certificate work than normal because of that pace.
1. Configure SSLVPN on their firewall (we're a Sonicwall shop), enabling 2FA for each SSLVPN user
2. Configure NetBIOS over VPN so users can connect to machine names instead of IP addresses
3. Export certificates for each employee's office computer
4. Setup an A record for something like remote.theirdomain.com and point it to their public IP
5. Purchase a cert for remote.theirdomain.com and install it on the firewall
6. Install the VPN client on the (almost always BYOD) employees' home computers
7. Configure 2FA for the VPN connection on an authenticator app on the employee's mobile
8. Import the certificate for each employee's work machine onto their home computer
9. Configure and save on the home computer an RDP connection to the work computer using the machine name and their username
This allows secure, 2FA connections without certificate warnings. This does require extra work exporting and importing certificates, though, every time either the home computer or the work computer for an employee is replaced. Since I mostly deal with small clients, though, this extra work isn't a deal breaker.
Because this is the method I know, I have also used it with clients that do have on prem servers, even though the more-acceptable method is to setup a local certificate authority, which somehow automagically handles certificates for any domain-joined computer.
I'm wondering at what level (client size, other determinates?) it really makes sense setup and maintain a certificate authority, how much work that really is, and what the pros and cons of that are. I've been thinking about this for my largest client, who is approaching 50 employees. We're replacing about 2 workstations a month on average now, so there has been more of the certificate work than normal because of that pace.