<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate profile - option Block session if the certificate was not.. in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/certificate-profile-option-block-session-if-the-certificate-was/m-p/328078#M112</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you ensure that&amp;nbsp;&lt;SPAN&gt;serial number attribute in the subject of the client certificate matches the&amp;nbsp;&lt;/SPAN&gt;&lt;A title="" href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-help/globalprotect/objects-globalprotect-hip-objects/hip-objects-general-tab.html" target="_blank" rel="noopener"&gt;host ID&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;that the GlobalProtect app reports for the endpoint?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/certificate-management/configure-a-certificate-profile" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/certificate-management/configure-a-certificate-profile&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;VRA&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 14 May 2020 22:37:18 GMT</pubDate>
    <dc:creator>vathreya</dc:creator>
    <dc:date>2020-05-14T22:37:18Z</dc:date>
    <item>
      <title>Certificate profile - option Block session if the certificate was not....</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/certificate-profile-option-block-session-if-the-certificate-was/m-p/327497#M105</link>
      <description>&lt;P&gt;Basic GP setup, portal and gateway using certificate authentication only, certificates issues by internal CA, Palo Alto firewall is not involved in the certificate enrollment process.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Certificate profile used is configured with Root and&amp;nbsp;intermediate certificate, set for using CRL and options (block session if certificate status cannot be retrieved within timeout,&amp;nbsp;&lt;SPAN&gt;Block session if the certificate was not issued to the authenticating device and&amp;nbsp;Block sessions with expired certificate) has been selected.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Clients now tries to connect, but fails with message (Client certificate could not be authenticated), if I then remove the option&amp;nbsp;Block session if the certificate was not issued to the authenticating device, then the clients are able to authenticate and connect.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;My question:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is the option "Block session if the certificate was not issued to the authenticating device" only valid e.g can be used if the Palo Alto firewall handles the original certificate enrolment&amp;nbsp;process, and shouldn't be used if this is done using other methods ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 09:37:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/certificate-profile-option-block-session-if-the-certificate-was/m-p/327497#M105</guid>
      <dc:creator>Rene_Belloni</dc:creator>
      <dc:date>2020-05-12T09:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate profile - option Block session if the certificate was not..</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/certificate-profile-option-block-session-if-the-certificate-was/m-p/328078#M112</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you ensure that&amp;nbsp;&lt;SPAN&gt;serial number attribute in the subject of the client certificate matches the&amp;nbsp;&lt;/SPAN&gt;&lt;A title="" href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-help/globalprotect/objects-globalprotect-hip-objects/hip-objects-general-tab.html" target="_blank" rel="noopener"&gt;host ID&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;that the GlobalProtect app reports for the endpoint?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/certificate-management/configure-a-certificate-profile" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/certificate-management/configure-a-certificate-profile&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;VRA&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 22:37:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/certificate-profile-option-block-session-if-the-certificate-was/m-p/328078#M112</guid>
      <dc:creator>vathreya</dc:creator>
      <dc:date>2020-05-14T22:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate profile - option Block session if the certificate was not..</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/certificate-profile-option-block-session-if-the-certificate-was/m-p/329342#M134</link>
      <description>&lt;P&gt;Dear Vathreya&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the reply, yes we added&amp;nbsp;the IPAD UDID into the Common Name in the certificate, but it seems like in GP for IOS in version 5.0, the client isnt able any longer to grap the UDID straight from the IPAD, but needs to be specific configured via VPN profile to map the UDID with Mobile-ID in order to get the correct information sent in the HIP report to the gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/5-0/globalprotect-app-new-features/new-features-released-in-gp-agent-5_0/globalprotect-app-for-ios-user-experience-enhancements/mobile-device-management-changes.html#ide03e60d2-363a-4cec-9fb4-65e65bbb011f_id9b855032-eda8-4143-9da8-b66e22293559" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/5-0/globalprotect-app-new-features/new-features-released-in-gp-agent-5_0/globalprotect-app-for-ios-user-experience-enhancements/mobile-device-management-changes.html#ide03e60d2-363a-4cec-9fb4-65e65bbb011f_id9b855032-eda8-4143-9da8-b66e22293559&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our MDM platform used is Intunes and so far we havent been able to find the ability to perform such a customization of the VPN profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I missed to include information in the orginal post that it was issue with IPAD's&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 09:12:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/certificate-profile-option-block-session-if-the-certificate-was/m-p/329342#M134</guid>
      <dc:creator>Rene_Belloni</dc:creator>
      <dc:date>2020-05-22T09:12:14Z</dc:date>
    </item>
  </channel>
</rss>

