Skip to content

Commit 6db4d23

Browse files
committed
new article
1 parent fbfae09 commit 6db4d23

File tree

2 files changed

+36
-1
lines changed

2 files changed

+36
-1
lines changed

articles/virtual-wan/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@
205205
- name: Linux - OpenSSL
206206
href: ../vpn-gateway/point-to-site-certificates-linux-openssl.md
207207
- name: Linux - strongSwan
208-
href: ../vpn-gateway/vpn-gateway-certificates-point-to-site-linux.md
208+
href: point-to-site-certificates-linux-strongswan.md
209209
- name: Install client certificates
210210
href: install-client-certificates.md
211211
- name: Configure P2S - Microsoft Entra ID authentication
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
title: 'Generate and export certificates for User VPN P2S: Linux - strongSwan'
3+
description: Learn how to create a self-signed root certificate, export the public key, and to generate client certificates using the Linux (strongSwan) CLI.
4+
titleSuffix: Azure Virtual WAN
5+
author: cherylmc
6+
ms.service: azure-virtual-wan
7+
ms.custom: linux-related-content
8+
ms.topic: how-to
9+
ms.date: 03/20/2025
10+
ms.author: cherylmc
11+
12+
# The note "Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable." is in the vpn-gateway-strongswan-certificates-include file.
13+
---
14+
# User VPN - Generate and export certificates - Linux (strongSwan)
15+
16+
This article shows you how to create a self-signed root certificate and generate client certificates using strongSwan. The steps in this exercise help you create certificate **.pem** files. If you need *.pfx* and *.cer* files instead, see the [Windows- PowerShell](certificates-point-to-site.md) instructions.
17+
18+
For point-to-site connections, each VPN client must have a client certificate installed locally to connect. Additionally, the root certificate public key information must be uploaded to Azure. For more information, see [P2S User VPN configuration - certificate authentication](virtual-wan-point-to-site-portal.md#p2sconfig).
19+
20+
## <a name="install"></a>Install strongSwan
21+
22+
The following steps help you install strongSwan.
23+
24+
[!INCLUDE [strongSwan Install](../../includes/vpn-gateway-strongswan-install-include.md)]
25+
26+
## <a name="cli"></a>Linux CLI instructions (strongSwan)
27+
28+
The following steps help you generate and export certificates using the Linux CLI (strongSwan).
29+
For more information, see [Additional instructions to install the Azure CLI](/cli/azure/install-azure-cli-apt).
30+
31+
[!INCLUDE [strongSwan certificates](../../includes/vpn-gateway-strongswan-certificates-include.md)]
32+
33+
## Next steps
34+
35+
Continue with your point-to-site configuration. See [Configure P2S VPN clients: certificate authentication - Linux](point-to-site-vpn-client-certificate-ike-linux.md).

0 commit comments

Comments
 (0)