Certificate information is empty, ERROR: client certificate issuer cannot be empty

Raja Meer Baz Khan 40 Reputation points
2025-03-11T15:25:48.8633333+00:00

I tried to import the certificate into azure VPN after downloading from virtual-network-gateway on Azure. While using and saving the imported .html file in the Azure VPN Client, it is giving the following error, "client certificate issuer cannot be empty"

The field is empty but is there a way to change any settings so the field "client certificate" is not empty when I download the VPN client from Virtual network gateway in Azure?

how do I check its properties to ensure that it has the issuer information filled out. And how to get it fixed?

The certificate is located in Current User\Personal\Certificates. I have Re-download the VPN Client Configuration.

Azure VPN Gateway
Azure VPN Gateway
An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
1,678 questions
0 comments No comments
{count} votes

Accepted answer
  1. Manu Philip 20,086 Reputation points MVP
    2025-03-11T15:36:22.1633333+00:00

    Hi Raja Meer Baz Khan

    You have to open the Self signed certificate in some text reading application and paste the contents. Make sure that you are omitting the first and last line. You will see the certificate content as follows:

    User's image

    Omit -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----lines

    You will see the filed something like as follows

    User's image

    Also, make sure that, you have imported the client certificate in your computer with the following steps

    1. Once the client certificate is exported, locate and copy the .pfx file to the client computer.
    2. On the client computer, double-click the .pfx file to install. Leave the Store Location as Current User, and then select Next.
    3. On the File to import page, don't make any changes. Select Next.
    4. On the Private key protection page, input the password for the certificate, or verify that the security principal is correct, then select Next.
    5. On the Certificate Store page, leave the default location, and then select Next.
    6. Select Finish. On the Security Warning for the certificate installation, select Yes. You can comfortably select 'Yes' for this security warning because you generated the certificate.
    7. The certificate is now successfully imported.

    You may also refer my blog here: Create Point-to-Site -P2S VPN Connection in Azure

    Also

    Hope this helps.


    --please don't forget to upvote and Accept as answer if the reply is helpful--

    1 person found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.