<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Comp certificate expired, how to allow users to log in in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/591305#M5536</link>
    <description>&lt;P&gt;Hi, Just realised have not posted how we dealt with it, so just as a closure:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have decided easiest way would be to remove cert from authentication requirements for brief moments when we have that issue, so have set "user credentials OR device cert required", allowed user to log in, then recreated cert once user was&amp;nbsp; in.&lt;/P&gt;
&lt;P&gt;After that I just changed that back to "creds AND cert required". Few minutes of lowered protection, but solved that problem just fine.&lt;/P&gt;</description>
    <pubDate>Sun, 07 Jul 2024 07:37:12 GMT</pubDate>
    <dc:creator>R.Tryba</dc:creator>
    <dc:date>2024-07-07T07:37:12Z</dc:date>
    <item>
      <title>Comp certificate expired, how to allow users to log in</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/578261#M5015</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Few of my users have not connected to GP (and to AD) for extended period of time and their computer certificate has expired.&lt;/P&gt;
&lt;P&gt;They are remote, so coming to office would be problematic - continent-size problematic &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I was under impression, that when i change Authentication profile from&amp;nbsp;"Require username AND device cert" to "Require username OR device cert", I will be able to allow them to connect&amp;nbsp; - that way their comp cert would renew and they'd be ok going forward.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But I was wrong, GP client was not willing to connect.&amp;nbsp; i know there is a way, as previous Manager was allowing it through, but at that time I was not working on Palo's, so not sure what else I need to amend to make it happen..&lt;/P&gt;</description>
      <pubDate>Sun, 25 Feb 2024 08:57:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/578261#M5015</guid>
      <dc:creator>R.Tryba</dc:creator>
      <dc:date>2024-02-25T08:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: Comp certificate expired, how to allow users to log in</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/578349#M5024</link>
      <description>&lt;P&gt;did you change this setting on both the portal AND the gateway? Make sure you're allowing it on both for those users to be able to connect&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 14:05:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/578349#M5024</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-02-26T14:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: Comp certificate expired, how to allow users to log in</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/578521#M5028</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have today, have also as per other suggestion I saw somewhere to remove a cert profile from portal - nothing worked, it has thou for one sec showed me MFA prompt for user..&amp;nbsp; &amp;nbsp; but at the end it refused to connect anyway - with same "Client certificate not found" message..&lt;/P&gt;
&lt;P&gt;Logging call with my Palo Support company for it, but any other suggestion welcome..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any way I can generate a machine cert on my CA and install it on remote comp?&amp;nbsp; &amp;nbsp;Problem is that I use a specific template for it and unsure if it would work if problematic machine has no access to internal CA..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any other way of generating maybe self-signed cert on palo firewall (or Panorama) to allow it through?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 18:04:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/578521#M5028</guid>
      <dc:creator>R.Tryba</dc:creator>
      <dc:date>2024-02-27T18:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: Comp certificate expired, how to allow users to log in</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/578650#M5033</link>
      <description>&lt;P&gt;Have you checked the certificate profile to see if any options here are ticked&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Mick_Ball_1-1709128311313.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57898i61D3DB67A970A75B/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Mick_Ball_1-1709128311313.png" alt="Mick_Ball_1-1709128311313.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 13:51:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/578650#M5033</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2024-02-28T13:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: Comp certificate expired, how to allow users to log in</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/578653#M5035</link>
      <description>&lt;P&gt;Can you not email a new certificate to the users device or do they have no connection without GlobalProtect?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 14:03:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/578653#M5035</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2024-02-28T14:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: Comp certificate expired, how to allow users to log in</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/591305#M5536</link>
      <description>&lt;P&gt;Hi, Just realised have not posted how we dealt with it, so just as a closure:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have decided easiest way would be to remove cert from authentication requirements for brief moments when we have that issue, so have set "user credentials OR device cert required", allowed user to log in, then recreated cert once user was&amp;nbsp; in.&lt;/P&gt;
&lt;P&gt;After that I just changed that back to "creds AND cert required". Few minutes of lowered protection, but solved that problem just fine.&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jul 2024 07:37:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comp-certificate-expired-how-to-allow-users-to-log-in/m-p/591305#M5536</guid>
      <dc:creator>R.Tryba</dc:creator>
      <dc:date>2024-07-07T07:37:12Z</dc:date>
    </item>
  </channel>
</rss>

