Client Certificate Enforcement can be used by organizations to make sure that the end user can only connect to the VPN from the specific device which have the client certificate installed. Besides normal authentication which includes username and password, client software, on user machine, is subjected to present the client certificate to the VPN server to prove the authenticity. This will restrict users to connect from other devices which don't have the client certificate installed. Client certificate is verified against the root certificate installed on the VPN sever under CA certificate category.
When we have Client certificate added on the client side and Root certificate added on the SSL-VPN Server and we enable client certificate enforcement at the domain. It works well on each platform, except IOS and MAC when TLS 1.3 is enabled. The issue occurs with TLS 1.3Â enabled on SSL-VPN Server. Reason being Client Certificate will not work on iOS/macOS due to the OS limitation using TLS1.3.
Login to the administrative console of SMA.
1) Under System.

2) Go to Administration.
3) Under Global SSL/TLS Settings, Uncheck TLS 1.3.

NOTE: Â Changing TLS settings will restart the web services and other associated services, hence cause the existing connections to drop.Â
With these changes Certificate enforcement will work as expected on IOS and MAC using Mobile Connect.