<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Globalprotect - machine/device cert for Portal and Gateway &amp;quot;certificate profiles&amp;quot; - how to best distribute in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-machine-device-cert-for-portal-and-gateway-quot/m-p/587882#M5386</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Yes, you can use your Windows CA server for GlobalProtect certificates. To do this, create a certificate template on your Windows CA for machine certificates, then use Group Policy to auto-enroll these certificates to all relevant PCs. Export the subordinate CA certificate from your Windows CA and import it into your Palo&amp;nbsp;&lt;A href="https://www-adpvantage.com/" target="_self"&gt;ADPVantage&lt;/A&gt; Alto firewall as a trusted root CA. Configure the certificate profile on the GlobalProtect portal and gateway to use the certificates signed by the Windows CA. This method leverages existing trust within your domain and simplifies certificate deployment.&lt;/P&gt;</description>
    <pubDate>Sat, 25 May 2024 04:23:02 GMT</pubDate>
    <dc:creator>kurdt784</dc:creator>
    <dc:date>2024-05-25T04:23:02Z</dc:date>
    <item>
      <title>Globalprotect - machine/device cert for Portal and Gateway "certificate profiles" - how to best distribute</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-machine-device-cert-for-portal-and-gateway-quot/m-p/587830#M5385</link>
      <description>&lt;P&gt;I have successfully configured a working POC for exactly how I want our users to connect to Globalprotect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a SAML authentication profile configured for both the Portal and Gateway each each with the same certificate profile configured.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I created the "machinecert" using the firewall as a CA and manually installed the cert.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When it comes time to mass deploy the cert, I'm unsure of which method to choose as I don't know all the pros/cons. It should suffice to simply use a GPO and install the machinecert on all PCs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But it also seems like it may be a better idea to use the Windows CA server we already have. For the SSL decryption we used that server to create a subordinate CA authority and when we imported that certificate to the Palo Alto we were able to then used a certificate signed by the subordinate certificate and it was inherently trusted by all of our Windows PCs since they were part of the domain. This way, we didn't need to push out any kind of certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So my question is if I can also use the Windows CA server in a similar way to be used for the certificate profile? If yes, I have not come across a guide specific to this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2024 21:00:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-machine-device-cert-for-portal-and-gateway-quot/m-p/587830#M5385</guid>
      <dc:creator>asiewert</dc:creator>
      <dc:date>2024-05-23T21:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect - machine/device cert for Portal and Gateway "certificate profiles" - how to best distribute</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-machine-device-cert-for-portal-and-gateway-quot/m-p/587882#M5386</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Yes, you can use your Windows CA server for GlobalProtect certificates. To do this, create a certificate template on your Windows CA for machine certificates, then use Group Policy to auto-enroll these certificates to all relevant PCs. Export the subordinate CA certificate from your Windows CA and import it into your Palo&amp;nbsp;&lt;A href="https://www-adpvantage.com/" target="_self"&gt;ADPVantage&lt;/A&gt; Alto firewall as a trusted root CA. Configure the certificate profile on the GlobalProtect portal and gateway to use the certificates signed by the Windows CA. This method leverages existing trust within your domain and simplifies certificate deployment.&lt;/P&gt;</description>
      <pubDate>Sat, 25 May 2024 04:23:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-machine-device-cert-for-portal-and-gateway-quot/m-p/587882#M5386</guid>
      <dc:creator>kurdt784</dc:creator>
      <dc:date>2024-05-25T04:23:02Z</dc:date>
    </item>
  </channel>
</rss>

