FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
dwickramasinghe1
Article Id 382297
Description This article describes how to troubleshoot the 'IKE authentication credentials are unacceptable' error on the Windows Native VPN Client when attempting to connect to an IKEv2 IPsec tunnel on FortiGate
Scope FortiGate, FortiOS, IPsec, Windows Native VPN Client.
Solution

FortiGate supports Windows Native Client IPsec connections using IKEv2. FortiGate can use certificate-based authentication to allow the endpoint to connect successfully.

This article assumes that the FortiGate VPN wizard has already been utilized to create an IKEv2 Native VPN tunnel, and the endpoints are correctly configured with the IKEv2 Native VPN settings.

In some cases, it's possible to run into the following error:

   Error:
   'IKE authentication credentials are unacceptable'


IKEErrorNative.jpg
This error usually occurs when the Windows Device does not trust the IPsec gateway certificate due to one of the reasons below:

  1. The CA certificate used to sign the IPsec gateway certificate is missing from the Windows certificate store when a private CA is used.
  2. The intermediate CA certificate is missing on the FortiGate when the IPsec gateway certificate is signed by a public CA.
  3. The FQDN/IP configured on the Windows client does not match the IPsec gateway certificate.

 

Solution 1 - IPsec Gateway Certificate signed by a private CA.

 

Check for the configured IPsec gateway certificate under: FortiGate GUI -> VPN -> VPN Tunnels -> Select the desired tunnel and take note of the configured 'signature' name.

IKEV2CertificateLocation.jpg

After verifying the configured IPsec certificate, navigate to the FortiGate certificate store under: FortiGate GUI -> System -> Certificates > Select the IPsec gateway certificate and take note of the 'Issuer' (CA) field.

 

CAcertificateField.jpg
After confirming the CA for the IPsec gateway certificate, obtain the CA file and upload the CA file to the Microsoft certificate store on the Windows Endpoint:

CertificateCA.jpg
Once the CA certificate has been uploaded to the Trusted Root Certificate Authorities store, restart the endpoint and attempt the connection again. The connection should succeed after making these changes.

ITworkd!.jpg

 

Solution 2 - IPsec gateway certificate signed by a public CA.

 

In most cases, when buying a certificate from a public CA, it will be signed by an intermediate CA. During the connection, the Windows client will first attempt to validate the certificate presented by the IPsec gateway, and it expects to receive the full certificate trust chain. FortiGates include many root CA certificates from well-known certificate authorities, just as most modern operating systems like Windows and macOS do, however, they do not include intermediate CA certificates. If any certificate in the trust chain is missing, the validation will fail, and the error 'IKE authentication credentials are unacceptable' will appear.

 

Below is an example using a certificate signed by DigiCert.
The best way to view the full certificate trust chain is to first download the certificate onto a PC, then navigate the FortiGate GUI to System -> Certificate, highlight the relevant certificate, and select 'Download'.

 
 
Screenshot 2025-12-05 135930.jpg

 

Once downloaded, open the certificate and check the Certification Path section to see all intermediate CAs in the trust chain.

 
Screenshot 2025-12-05 140726.png


In this case, the issue was resolved by importing the intermediate CA certificate 'DigiCert EV RSA CA G2' onto the FortiGate.

To import a CA certificate, follow the steps described in the Administration Guide CA certificate | Fortinet Document Library.

Normally, the full certificate chain is provided as part of the certificate bundle when acquiring a certificate from a public CA. If it is not included, the Certificate Authority’s website will typically have a download section where all required intermediate and root CA certificates can be downloaded.

 

Solution 3 - FQDN/IP in VPN configuration on the Windows client is not matching with the certificate.


When configuring the VPN connection on the client side, it is important to use an FQDN in the '
Server name or address' field that matches the CN or one of the SAN entries on the certificate presented by the IPsec gateway.

Screenshot 2025-12-05 144421.png


Related document:
Windows IKEv2 native VPN with user certificate | FortiGate / FortiOS 7.6.2 | Fortinet Document Libra...