<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Install in local root certificate store in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/install-in-local-root-certificate-store/m-p/408068#M1309</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/180879"&gt;@G.Grant&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;On Windows this is stored under the user's certificate store under Trusted Root Certificates. On macOS you'll be able to find it under the System certificates in keychain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/180879"&gt;@G.Grant&lt;/a&gt;&amp;nbsp;wrote:
&lt;P&gt;Also would this be considered a less secure option because you are pushing down a root certificate to the endpoint meaning that they only require a correct username and password to connect.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;Are you using the certificates that you are trying to push as part of your authentication process, because if you are I wouldn't it. We push down our root and intermediate certificates so that users on a BYOD endpoint can navigate to any of our allowed internal resources without certificate errors and so they don't have to manually install our certs. You can have them connect to GlobalProtect and they're automatically ready to access internal websites ect. &lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 20 May 2021 12:55:14 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2021-05-20T12:55:14Z</dc:date>
    <item>
      <title>Install in local root certificate store</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/install-in-local-root-certificate-store/m-p/408051#M1308</link>
      <description>&lt;P&gt;I'm testing this and have questions...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where exactly is the root certificate stored on Windows and Mac when 'Install in local root certificate store' is selected under the agent configuration?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding is that the firewall pushes the root-ca down to the client upon connecting. I can't see any new certificates added in Keychain on Mac or via mmc on Windows.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also would this be considered a less secure option because you are pushing down a root certificate to the endpoint meaning that they only require a correct username and password to connect.&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 12:20:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/install-in-local-root-certificate-store/m-p/408051#M1308</guid>
      <dc:creator>G.Grant</dc:creator>
      <dc:date>2021-05-20T12:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: Install in local root certificate store</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/install-in-local-root-certificate-store/m-p/408068#M1309</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/180879"&gt;@G.Grant&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;On Windows this is stored under the user's certificate store under Trusted Root Certificates. On macOS you'll be able to find it under the System certificates in keychain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/180879"&gt;@G.Grant&lt;/a&gt;&amp;nbsp;wrote:
&lt;P&gt;Also would this be considered a less secure option because you are pushing down a root certificate to the endpoint meaning that they only require a correct username and password to connect.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;Are you using the certificates that you are trying to push as part of your authentication process, because if you are I wouldn't it. We push down our root and intermediate certificates so that users on a BYOD endpoint can navigate to any of our allowed internal resources without certificate errors and so they don't have to manually install our certs. You can have them connect to GlobalProtect and they're automatically ready to access internal websites ect. &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 12:55:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/install-in-local-root-certificate-store/m-p/408068#M1309</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-05-20T12:55:14Z</dc:date>
    </item>
  </channel>
</rss>

