I've decided to create a second VPN for users that need to connect from a device not owned by our company, and therefore not controlled by our security apps. This VPN uses udp/1195
There are a couple of places this can be problematic certificate wise.
I would suggest that the 2nd OpenVPN server needs it's own certificate.
As long as the new Cert. is created using the same CA used for the first server, you should be OK with your current setup.
You may need to enable "Allow Duplicate-cn" if you're trying to connect to both servers using the same client (that may or may not sense in your setup).
You might want to go so far as to create a new CA as well as a new server Cert for the second instance.
If you do, you'll need dedicated client certs for the 2nd server.
In many scenarios, that's a good thing (if only for enforcing separation of who's connecting and from where).