<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to identify pinned certificates? in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-identify-pinned-certificates/m-p/507624#M190</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/30703"&gt;@Sly_Cooper&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I am guessing you mean if application is used pinned certificate, not the site.&lt;/P&gt;
&lt;P&gt;Pinned certificate means that the application which is initiating the traffic and trying to reach the public server has some additional check and expect the server to reply with specific certificate, or at least with cert that is signed only by specific CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately if it is not explicetly mentioned in the application documentation the only way is to try it.&lt;/P&gt;
&lt;P&gt;Try to use the application with decryption enabled, if there is a problem, try to disable the decryption, if it works add it as permanent exception.&lt;/P&gt;</description>
    <pubDate>Fri, 01 Jul 2022 07:48:09 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2022-07-01T07:48:09Z</dc:date>
    <item>
      <title>How to identify pinned certificates?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-identify-pinned-certificates/m-p/507307#M185</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I find out if the site is using pinned certificate so that I can exclude the site from SSL decryption?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2022 02:37:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-identify-pinned-certificates/m-p/507307#M185</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2022-06-30T02:37:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to identify pinned certificates?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-identify-pinned-certificates/m-p/507624#M190</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/30703"&gt;@Sly_Cooper&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I am guessing you mean if application is used pinned certificate, not the site.&lt;/P&gt;
&lt;P&gt;Pinned certificate means that the application which is initiating the traffic and trying to reach the public server has some additional check and expect the server to reply with specific certificate, or at least with cert that is signed only by specific CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately if it is not explicetly mentioned in the application documentation the only way is to try it.&lt;/P&gt;
&lt;P&gt;Try to use the application with decryption enabled, if there is a problem, try to disable the decryption, if it works add it as permanent exception.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jul 2022 07:48:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-identify-pinned-certificates/m-p/507624#M190</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-07-01T07:48:09Z</dc:date>
    </item>
  </channel>
</rss>

