<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Azure &amp;quot;az&amp;quot; command and decryption in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1237882#M6285</link>
    <description>&lt;P&gt;Hello, All.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Working on Windows. A few days ago, tried to understand why the Microsoft Azure CLI "az" command line program was not working with decryption behind our PAN OS 10.2.10.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Azure CLI is a python tool. I am currently running v2.77 (latest)&lt;/LI&gt;
&lt;LI&gt;I added the root CA to&amp;nbsp;&lt;SPAN&gt;C:\Program Files\Microsoft SDKs\Azure\CLI2\Lib\site-packages\certifi\cacert.pem&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;This is Microsoft's recommended solution, but this latest version of Python / Azure CLI checks the certificate validity also on the&amp;nbsp;&lt;SPAN&gt;Authority Key Identifier (AKI).&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;The error message seems "obvious":&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;Before adding the "root CA" to its trusted store: "[SSL: CERTIFICATE_VERIFY_FAILED] &lt;STRONG&gt;certificate verify failed: self-signed certificate in certificate chain&lt;/STRONG&gt; (_ssl.c:1032)"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;After adding the "root CA" to its trusted store: "[SSL: CERTIFICATE_VERIFY_FAILED] &lt;STRONG&gt;certificate verify failed: &lt;FONT color="#FF0000"&gt;Missing Authority Key Identifier&lt;/FONT&gt;&lt;/STRONG&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;I searched on public posts, and pre 2024, it seems that updating the python trust store or bypassing security was possible. Not anymore with this latest version of Azure CLI.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Our friends Copilot and Gemini helped me in finding this "reason" for the problem I am facing. But I am surprised that nobody else posted anything about this though.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Don't you guys face the same issue? The way I see it, it is impossible to solve since the decryption mechanism does not publish the&amp;nbsp;&lt;SPAN&gt;Authority Key Identifier in fear of breaking a client's verifications... Or why the PA firewall does not update the AKI to match its Forward Trust Certificate's&amp;nbsp;Server Key Identifier?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Any input is welcome.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cheers.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Sep 2025 20:44:23 GMT</pubDate>
    <dc:creator>Rievax</dc:creator>
    <dc:date>2025-09-12T20:44:23Z</dc:date>
    <item>
      <title>Azure "az" command and decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1237882#M6285</link>
      <description>&lt;P&gt;Hello, All.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Working on Windows. A few days ago, tried to understand why the Microsoft Azure CLI "az" command line program was not working with decryption behind our PAN OS 10.2.10.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Azure CLI is a python tool. I am currently running v2.77 (latest)&lt;/LI&gt;
&lt;LI&gt;I added the root CA to&amp;nbsp;&lt;SPAN&gt;C:\Program Files\Microsoft SDKs\Azure\CLI2\Lib\site-packages\certifi\cacert.pem&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;This is Microsoft's recommended solution, but this latest version of Python / Azure CLI checks the certificate validity also on the&amp;nbsp;&lt;SPAN&gt;Authority Key Identifier (AKI).&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;The error message seems "obvious":&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;Before adding the "root CA" to its trusted store: "[SSL: CERTIFICATE_VERIFY_FAILED] &lt;STRONG&gt;certificate verify failed: self-signed certificate in certificate chain&lt;/STRONG&gt; (_ssl.c:1032)"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;After adding the "root CA" to its trusted store: "[SSL: CERTIFICATE_VERIFY_FAILED] &lt;STRONG&gt;certificate verify failed: &lt;FONT color="#FF0000"&gt;Missing Authority Key Identifier&lt;/FONT&gt;&lt;/STRONG&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;I searched on public posts, and pre 2024, it seems that updating the python trust store or bypassing security was possible. Not anymore with this latest version of Azure CLI.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Our friends Copilot and Gemini helped me in finding this "reason" for the problem I am facing. But I am surprised that nobody else posted anything about this though.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Don't you guys face the same issue? The way I see it, it is impossible to solve since the decryption mechanism does not publish the&amp;nbsp;&lt;SPAN&gt;Authority Key Identifier in fear of breaking a client's verifications... Or why the PA firewall does not update the AKI to match its Forward Trust Certificate's&amp;nbsp;Server Key Identifier?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Any input is welcome.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cheers.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 20:44:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1237882#M6285</guid>
      <dc:creator>Rievax</dc:creator>
      <dc:date>2025-09-12T20:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: Azure "az" command and decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1237889#M6287</link>
      <description>&lt;P&gt;You are encountering an [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Missing Authority Key Identifier error with the Azure CLI (v2.77) on Windows when it's operating behind a Palo Alto Networks firewall performing SSL decryption. This issue arises because the latest Python versions used by the Azure CLI have stricter certificate validation, requiring the Authority Key Identifier (AKI) to be present in the certificate chain. The Palo Alto firewall, during decryption and re-signing of the certificate, does not include this AKI in the new certificate it presents to the client. This breaks the chain of trust for the Azure CLI's validation process, which expects the AKI to match the Subject Key Identifier (SKI) of the issuing certificate, a detail that is lost in the decryption and re-signing process. While adding the root CA to the cacert.pem file addresses the initial "self-signed certificate" error, it cannot&amp;nbsp;fix the missing AKI, as this is a fundamental part of the re-signing behavior of the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Sep 2025 05:57:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1237889#M6287</guid>
      <dc:creator>rachel33berry</dc:creator>
      <dc:date>2025-09-13T05:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: Azure "az" command and decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1237969#M6293</link>
      <description>&lt;P&gt;Hello&amp;nbsp;rachel33berry,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the answer and rephrasing my message (too keep the discussion alive?) with a technical explanation instead of empiric description.&lt;/P&gt;
&lt;P&gt;Posting in LIVEcommunity was my effort in sharing the behavior while no recent post were found on the subject - Azure CLI behing very important for many enterprises nowadays.&lt;/P&gt;
&lt;P&gt;I was expected more input from the community on "how" they now workaround this issue other that disabling decryption for everything Azure... like maybe instruct Python's "certifi" module to ignore the missing AKI match.&lt;/P&gt;
&lt;P&gt;Since Palo Alto "tried" to support for parsing the Server Key Identified (SKID) and Authority Key Identifier (AKID) extensions (PanOS 10.1.7 and 10.2.2 in 2022), this is not an unknown issue.&lt;/P&gt;
&lt;P&gt;I am missing something?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 13:07:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1237969#M6293</guid>
      <dc:creator>Rievax</dc:creator>
      <dc:date>2025-09-15T13:07:01Z</dc:date>
    </item>
    <item>
      <title>Re: Azure "az" command and decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1239369#M6369</link>
      <description>&lt;P&gt;You may want to take a look at the published bug ID:&amp;nbsp;&lt;STRONG class="ph b"&gt;PAN-278150&lt;/STRONG&gt;&lt;BR /&gt;Palo claims to have fixes this issue in the below versions (and likely others):&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/pan-os-11-1-10-known-and-addressed-issues/pan-os-11-1-10-h1-addressed-issues" target="_blank"&gt;PAN-OS 11.1.10-h1 Addressed Issues&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-10-known-and-addressed-issues/pan-os-10-2-10-h18-addressed-issues" target="_blank"&gt;PAN-OS 10.2.10-h18 Addressed Issues&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We ran into this same issue with Azure CLI and Python 3.13 and this was where Palo TAC pointed us.&amp;nbsp; Haven't upgraded yet, so I can't speak to whether this actually solves the issue yet.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 18:47:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1239369#M6369</guid>
      <dc:creator>ericmont123</dc:creator>
      <dc:date>2025-10-03T18:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Azure "az" command and decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1252868#M6866</link>
      <description>&lt;P&gt;Bringing back an old thread but one that I've just bumped into, turns out that even on a patched firewall you still need to run a command to get the key identifier field back in. See&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA1Ki000000k9ddKAA" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA1Ki000000k9ddKAA&lt;/A&gt;&amp;nbsp;for more.&lt;/P&gt;
&lt;P&gt;Command is:&lt;/P&gt;
&lt;P&gt;debug dataplane set ssl-decrypt akid-disable no&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 15:53:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1252868#M6866</guid>
      <dc:creator>JamesPreston</dc:creator>
      <dc:date>2026-04-23T15:53:18Z</dc:date>
    </item>
    <item>
      <title>Re: Azure "az" command and decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1253292#M6884</link>
      <description>&lt;P&gt;I also can confirm on 12.1.6 you still need to issue the debug command in order to resolve this decryption issue.&amp;nbsp; &amp;nbsp;This is completely contrary to what the documentation states.&amp;nbsp; I found that you can check to see if its configured using the following command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;firewall-01(active)&amp;gt; show system state filter cfg.ssl-*&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cfg.ssl-decrypt.akid-disable: False&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for this &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/106473"&gt;@JamesPreston&lt;/a&gt;, you saved me a bunch of time because of your contribution.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 19:39:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-quot-az-quot-command-and-decryption/m-p/1253292#M6884</guid>
      <dc:creator>mlinsemier</dc:creator>
      <dc:date>2026-04-29T19:39:11Z</dc:date>
    </item>
  </channel>
</rss>

