<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Panorama managed - Global protect SAML cert renew - IDP xml import wrong expiry in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/panorama-managed-global-protect-saml-cert-renew-idp-xml-import/m-p/1241909#M7124</link>
    <description>&lt;P&gt;Background :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Panorama version 10.2.13-h5 &lt;BR /&gt;PA460's : 10.2.13-h5&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;2x PA460 active/passive HA. Managed by Panorama (9 other firewalls as well, but they don't provide GP portal / config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- SAML cert expires Jan 10th 2026.&lt;/P&gt;
&lt;P&gt;- Followed MS instruction on creating a new cert within MS admin/entra/azure/whatever they call it today.&lt;/P&gt;
&lt;P&gt;- Firewalls did not like importing the cert directly - had this happen before, as well as browser issues causing cert uploads to fail. (I tried chrome, edge, ff, cache cleared and all)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I set up SAML and GP initially (3 years ago) I had to import the xml directly from MS, vice manually adding details. I did this again, creating a new idp server profile &amp;gt; importing xml.&lt;/P&gt;
&lt;P&gt;Once it imports, the cert that is imported has the OLD expire date (even though in MS azure it shows 2028). I will attempt to attach screenshots.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lastly, I cannot remember when I initially set up SAML, do I have to create an intune policy / GPO to install the new SAML cert on each local machine before rolling out the new cert in production? or since it is a trusted CA should that not be needed?&lt;/P&gt;</description>
    <pubDate>Fri, 14 Nov 2025 17:29:55 GMT</pubDate>
    <dc:creator>davies.ryan</dc:creator>
    <dc:date>2025-11-14T17:29:55Z</dc:date>
    <item>
      <title>Panorama managed - Global protect SAML cert renew - IDP xml import wrong expiry</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/panorama-managed-global-protect-saml-cert-renew-idp-xml-import/m-p/1241909#M7124</link>
      <description>&lt;P&gt;Background :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Panorama version 10.2.13-h5 &lt;BR /&gt;PA460's : 10.2.13-h5&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;2x PA460 active/passive HA. Managed by Panorama (9 other firewalls as well, but they don't provide GP portal / config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- SAML cert expires Jan 10th 2026.&lt;/P&gt;
&lt;P&gt;- Followed MS instruction on creating a new cert within MS admin/entra/azure/whatever they call it today.&lt;/P&gt;
&lt;P&gt;- Firewalls did not like importing the cert directly - had this happen before, as well as browser issues causing cert uploads to fail. (I tried chrome, edge, ff, cache cleared and all)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I set up SAML and GP initially (3 years ago) I had to import the xml directly from MS, vice manually adding details. I did this again, creating a new idp server profile &amp;gt; importing xml.&lt;/P&gt;
&lt;P&gt;Once it imports, the cert that is imported has the OLD expire date (even though in MS azure it shows 2028). I will attempt to attach screenshots.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lastly, I cannot remember when I initially set up SAML, do I have to create an intune policy / GPO to install the new SAML cert on each local machine before rolling out the new cert in production? or since it is a trusted CA should that not be needed?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2025 17:29:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/panorama-managed-global-protect-saml-cert-renew-idp-xml-import/m-p/1241909#M7124</guid>
      <dc:creator>davies.ryan</dc:creator>
      <dc:date>2025-11-14T17:29:55Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama managed - Global protect SAML cert renew - IDP xml import wrong expiry</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/panorama-managed-global-protect-saml-cert-renew-idp-xml-import/m-p/1242310#M7134</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/335629"&gt;@davies.ryan&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="143" data-end="397"&gt;I would triple-check which signing certificate is actually being sent inside the SAML metadata. When you import the metadata XML into Panorama/NGFW, it will only use whatever certificate Azure embeds in that file. So this tells me that somewhere within the Azure side, the old cert is still active.&amp;nbsp;&lt;/P&gt;
&lt;P data-start="143" data-end="397"&gt;&lt;BR /&gt;You can also modify the cert within the SAML idp server profile. Once you import that xml data, the data is used to populate the server profile fields. If you open up that profile that has the old cert, you can change the idp cert to the new cert. **But once again, i would triple-check what cert is active on Azure. If metadata still populates with old cert, then its likely the certs will be mismatched.&amp;nbsp;&lt;/P&gt;
&lt;P data-start="143" data-end="397"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="143" data-end="397"&gt;As far as intune/GPO,there's no need to deploy anything to your endpoints. The SAML signing certificate is not&amp;nbsp;a client-side trust cert. It’s used by Azure to sign the SAML assertion and the fw then validates that signature using the cert embedded in the metadata.&lt;/P&gt;
&lt;P data-start="143" data-end="397"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="143" data-end="397"&gt;Hope this helps!! Please keep us updated on what you find.&amp;nbsp;&lt;/P&gt;
&lt;P data-start="143" data-end="397"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="143" data-end="397"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 16:54:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/panorama-managed-global-protect-saml-cert-renew-idp-xml-import/m-p/1242310#M7134</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-11-20T16:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama managed - Global protect SAML cert renew - IDP xml import wrong expiry</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/panorama-managed-global-protect-saml-cert-renew-idp-xml-import/m-p/1242311#M7135</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/335629"&gt;@davies.ryan&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After looking over your screenshots, I do see that the signing certs show that the 2026 cert is active while the 2028 cert is inactive. If you can make the 2028/newer cert active, then that should be presented in the metadata for export.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 16:57:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/panorama-managed-global-protect-saml-cert-renew-idp-xml-import/m-p/1242311#M7135</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-11-20T16:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama managed - Global protect SAML cert renew - IDP xml import wrong expiry</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/panorama-managed-global-protect-saml-cert-renew-idp-xml-import/m-p/1242313#M7136</link>
      <description>&lt;P&gt;I deleted the wrong idp showing 2026 still. Went onto azure, activated the new cert, redownloaded the metadata, and then reactivated the old cert that expires in 2026 (to not disrupt prod atm).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reimported everything and it still shows up as 2026 expiry. I may have to open a case with MS I think.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also tried just uploading the cert, once i imported the new idp profile, but it gave me the issuer/SN error when I tried importing the PEM.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is frustrating lol. Thank you for the help!&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 17:27:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/panorama-managed-global-protect-saml-cert-renew-idp-xml-import/m-p/1242313#M7136</guid>
      <dc:creator>davies.ryan</dc:creator>
      <dc:date>2025-11-20T17:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama managed - Global protect SAML cert renew - IDP xml import wrong expiry</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/panorama-managed-global-protect-saml-cert-renew-idp-xml-import/m-p/1242314#M7137</link>
      <description>&lt;P&gt;Alright, got it fixed and working. You planted that nugget for me to end up figuring it out so thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I ended up having to go into the metadata xml. I opened both certs in a window and compared the hashes to what was in the xml file. I found 3 entries for the old cert and removed them, and made sure the only X509 entries were of the new certs hash. Saved it. When I imported it this time I got the correct certificate expiry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I assume is happening is MS exports all metadata for the application entry within azure/entra including historical certificate information and Pano/Palo couldn't parse through the different X509 entries within the xml, and only used the first cert shown (before I modified the metadata file, for signing, the old cert was listed first in the xml).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can't push changes to prod until I do a change notice to my users. But I have that scheduled for next week and I will update this post if it DOESNT work (I am terrible at remembering to update my KBQs)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the help Jay!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 17:48:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/panorama-managed-global-protect-saml-cert-renew-idp-xml-import/m-p/1242314#M7137</guid>
      <dc:creator>davies.ryan</dc:creator>
      <dc:date>2025-11-20T17:48:16Z</dc:date>
    </item>
  </channel>
</rss>

