-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[HELP] ERR_SSL_CLIENT_AUTH_NO_COMMON_ALGORITHMS Auth provider certificate #227
Comments
Hello, Regards, |
It sounds like there is disagreement between the ciphers enabled on the client vs server. |
Hello, I solved it by disabling TLS 1.3 on Windows Server 2022 where AMS is installed. Thanks @red-erik for the tip |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. |
Hello, Regards, |
Hi @red-erik We can't reproduce this in our lab. Server 2022 using mTLS is working fine out of the box. Are there any other circumstances in play here? I'm not sure what we are missing from our environment that means we are not seeing this. |
Hello, Regards, |
Hello, Regards, |
Shouldn't the Win10 client and 2022 server negotiate TLS 1.2 between them though? TLS 1.3 should only be used when both sides support it. Or is TLS 1.2 disabled on the 2022 server? |
Hello, |
I tried a few different combinations of things, and still can't reproduce this in the lab. I'm not really sure where to go next on this one. Would you be comfortable sharing screen shots of IIS crypto from a client and server combination that are not working https://www.nartac.com/Products/IISCrypto Need to see the schannel and cipher suites pages from both client and server. What's the certificate type? RSA 2048? |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. |
ERR_SSL_CLIENT_AUTH_NO_COMMON_ALGORITHMS Auth provider certificate
AMS Server: Version 2.0.9514.0
AMS OS version: Windows Server 2022 (21H2)
Client Edge version 122.0.2365.52
Configuring: User Authentication --> Authentication provider --> Smart card or other certificate, we receive the following Edge error:
Hmmm… can't reach this page
It looks like the webpage at ...... might be having issues,
or it may have moved permanently to a new web address.
ERR_SSL_CLIENT_AUTH_NO_COMMON_ALGORITHMS
The same configuration on another AMS installation on Windows Server 2019 works fine.
Thanks
The text was updated successfully, but these errors were encountered: