<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GP fails on iOS, connects on Android, Mac and Windows... in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-fails-on-ios-connects-on-android-mac-and-windows/m-p/999935#M6300</link>
    <description>&lt;P&gt;Yes I did, it turned out that iOS requires more chaining than the other platforms (Mac included). My problem was the internal root CA's weren't installed on the gateways, so maybe look out for something that isn't installed somewhere internally, especially if everything is landing on the device itself fine. Androids just needed the device cert and it connected fine, so quite the contrast!&lt;/P&gt;</description>
    <pubDate>Wed, 01 Jan 2025 21:33:43 GMT</pubDate>
    <dc:creator>gsjltd1921x</dc:creator>
    <dc:date>2025-01-01T21:33:43Z</dc:date>
    <item>
      <title>GP fails on iOS, connects on Android, Mac and Windows...</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-fails-on-ios-connects-on-android-mac-and-windows/m-p/586512#M5348</link>
      <description>&lt;P&gt;We're migrating to a new PKI, the Issuing servers are signed by the root and all (3) certificates (Root, Issuing 1 &amp;amp; Issuing 2) are being pushed to the iOS devices via Workspace One. The config is more or less identical to the original PKI (the old PKI was using an 'Interim' Root which is now not being used, although I have pushed that down as I'm hitting a brick wall). The only difference is the new PKI is configured to issue user certs that are sha-512 (the previous is sha-256).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The client provides the error;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt; GlobalProtect service started (client version: 6.1.0-84, OS version: Apple iOS 16.7.5).&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;[Error]: A valid client certificate is required for authentication. If the issue persists, contact your administrator.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The full chain is being installed on the device, the user cert gets installed in the keychain/cert store but for some reason it's just not trusting it, the iOS device logs show the following error:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;trustd[429] &amp;lt;Notice&amp;gt;: cert[0]: MissingIntermediate =(leaf)[force]&amp;gt; 0&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The two issuing / intermediate certs are installed on the device, so I'm really confused as to why it's not connecting.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The PAN GPS logs show:&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;P 591-T20739 02/05/2024 21:28:18:857 Info ( 891): Couldn't find any matching identities. Trying to continue without client cert&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;P 591-T6147 02/05/2024 21:28:18:940 Info ( 565): Finished with PORTAL ADDRESS&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;P 591-T6147 02/05/2024 21:28:18:940 Debug( 505): Client cert error detail is Client cert usage check failed&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;P 591-T6147 02/05/2024 21:28:18:941 Debug( 517): error detail is Client cert usage check failed&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;P 591-T6147 02/05/2024 21:28:18:946 Debug( 396): Received data with length 539&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;P 591-T6147 02/05/2024 21:28:18:946 Debug( 421): m_errorDetails is Client cert usage check failed.&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Any, ANY help would really be appreciated here please&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 15:56:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-fails-on-ios-connects-on-android-mac-and-windows/m-p/586512#M5348</guid>
      <dc:creator>gsjltd1921x</dc:creator>
      <dc:date>2024-05-13T15:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: GP fails on iOS, connects on Android, Mac and Windows...</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-fails-on-ios-connects-on-android-mac-and-windows/m-p/586619#M5351</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/182500879"&gt;@gsjltd1921x&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Make sure&amp;nbsp;&lt;SPAN&gt;that you deploy the client certificates as part of the VPN profile that is pushed from the MDM server. If you deploy client certificates from the MDM server using any other method, the certificates cannot be used by the GlobalProtect app.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/mobile-endpoint-management/manage-the-globalprotect-app-using-workspace-one/configure-workspace-one-for-ios-endpoints/configure-a-user-initiated-remote-access-vpn-configuration-for-ios-endpoints-using-workspace-one" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/mobile-endpoint-management/manage-the-globalprotect-app-using-workspace-one/configure-workspace-one-for-ios-endpoints/configure-a-user-initiated-remote-access-vpn-configuration-for-ios-endpoints-using-workspace-one&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.manageengine.com/mobile-device-management/help/certificate_management/mdm_certificate_repository.html#user" target="_blank"&gt;https://www.manageengine.com/mobile-device-management/help/certificate_management/mdm_certificate_repository.html#user&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hope this helps,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-Kim.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 09:25:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-fails-on-ios-connects-on-android-mac-and-windows/m-p/586619#M5351</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-05-14T09:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: GP fails on iOS, connects on Android, Mac and Windows...</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-fails-on-ios-connects-on-android-mac-and-windows/m-p/586636#M5352</link>
      <description>&lt;P&gt;Hi Kim, the client/user cert gets generated in the request and is pushed down to the device via the MDM profile, I can see the user cert is installed in the keychain (in the same way as the old PKI does), I believe the same CA template is used so everything looks to be matching&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 11:42:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-fails-on-ios-connects-on-android-mac-and-windows/m-p/586636#M5352</guid>
      <dc:creator>gsjltd1921x</dc:creator>
      <dc:date>2024-05-14T11:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: GP fails on iOS, connects on Android, Mac and Windows...</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-fails-on-ios-connects-on-android-mac-and-windows/m-p/999862#M6296</link>
      <description>&lt;P&gt;Hi. I came across the same problem, did you find a solution?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2024 15:22:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-fails-on-ios-connects-on-android-mac-and-windows/m-p/999862#M6296</guid>
      <dc:creator>Jan_Defecinski</dc:creator>
      <dc:date>2024-12-30T15:22:23Z</dc:date>
    </item>
    <item>
      <title>Re: GP fails on iOS, connects on Android, Mac and Windows...</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-fails-on-ios-connects-on-android-mac-and-windows/m-p/999935#M6300</link>
      <description>&lt;P&gt;Yes I did, it turned out that iOS requires more chaining than the other platforms (Mac included). My problem was the internal root CA's weren't installed on the gateways, so maybe look out for something that isn't installed somewhere internally, especially if everything is landing on the device itself fine. Androids just needed the device cert and it connected fine, so quite the contrast!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jan 2025 21:33:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-fails-on-ios-connects-on-android-mac-and-windows/m-p/999935#M6300</guid>
      <dc:creator>gsjltd1921x</dc:creator>
      <dc:date>2025-01-01T21:33:43Z</dc:date>
    </item>
  </channel>
</rss>

