<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Decryption policies and Short-Lived Certificates in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/decryption-policies-and-short-lived-certificates/m-p/1251785#M6822</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/283870"&gt;@itassetbenilde&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are the browsers going to start enforcing the 47-day rule, also?&amp;nbsp; I haven't heard that, but I could have missed it.&amp;nbsp; If it is just the public CAs, it doesn't affect decryption certificates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More and more CAs support ACME.&amp;nbsp; There are numerous scripts that simplify the process:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CA&lt;/P&gt;
&lt;P&gt;&amp;nbsp; |&lt;/P&gt;
&lt;P&gt;Certbot or acme.sh&lt;/P&gt;
&lt;P&gt;&amp;nbsp; |&lt;/P&gt;
&lt;P&gt;PAN-OS API&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/pulse/can-we-configure-palo-alto-firewalls-automatically-obtain-joe-brunner-qrxoe/" target="_blank" rel="noopener"&gt;https://www.linkedin.com/pulse/can-we-configure-palo-alto-firewalls-automatically-obtain-joe-brunner-qrxoe/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://medium.com/palo-alto-networks-developer-blog/costless-automated-trusted-certificates-on-palo-alto-networks-firewalls-5b2930b2893f" target="_blank" rel="noopener"&gt;https://medium.com/palo-alto-networks-developer-blog/costless-automated-trusted-certificates-on-palo-alto-networks-firewalls-5b2930b2893f&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/coopertownsend/pan-certbot" target="_blank" rel="noopener"&gt;https://github.com/coopertownsend/pan-certbot&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/830285149"&gt;@abayoumi21&lt;/a&gt;&amp;nbsp;mentioned, using the same name should simplify the process.&amp;nbsp; If that doesn't work, changing the certificate in the SSL/TLS Service Profile is the next easiest.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would imagine that many CAs will allow you to renew the cert with the same private key, which would be easier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Update:&amp;nbsp; This is a good discussion -&amp;gt;&amp;nbsp;&lt;A href="https://www.reddit.com/r/paloaltonetworks/comments/1ksg6bp/automating_certificate_renewals/" target="_blank"&gt;https://www.reddit.com/r/paloaltonetworks/comments/1ksg6bp/automating_certificate_renewals/&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Apr 2026 19:53:44 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2026-04-07T19:53:44Z</dc:date>
    <item>
      <title>Decryption policies and Short-Lived Certificates</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/decryption-policies-and-short-lived-certificates/m-p/1251704#M6814</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So basically, certificate validity will be shortened gradually until it is down to 47 days. The prospect of importing and reconfiguring our decryption policies that often is not very appealing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem i see is that, while we can automate certificate renewal on the servers, and the actual import process using CLI/API, there's still a crucial handover of&amp;nbsp; private keys and certificates from servers to NGFW needed before we can import anything to the NGFW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our certificate provider does have APIs to retrieve certificates, but then we'd still need to coordinate which specific certificate to import for which server/decryption policy rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there an "official" solution/workaround from PA? Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 04:34:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/decryption-policies-and-short-lived-certificates/m-p/1251704#M6814</guid>
      <dc:creator>itassetbenilde</dc:creator>
      <dc:date>2026-04-07T04:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption policies and Short-Lived Certificates</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/decryption-policies-and-short-lived-certificates/m-p/1251732#M6817</link>
      <description>&lt;P class=""&gt;&lt;SPAN&gt;One practical approach is to automate the certificate lifecycle using Let’s Encrypt with Certbot, combined with Ansible to handle the import and update process on the firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;Explanation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;You are correct that certificate lifetimes are being reduced (towards ~47 days) as part of industry efforts to improve security and reduce the risk of certificate compromise.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;In this context, &lt;/SPAN&gt;&lt;SPAN&gt;Let's Encrypt&lt;/SPAN&gt;&lt;SPAN&gt; has become widely adopted due to its support for automated certificate issuance and renewal using the ACME protocol.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;Proposed Solution&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;A practical and scalable approach is to combine:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Certbot (ACME client)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; – to automate certificate issuance and renewal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Ansible&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; – to automate the import and update process on the firewall&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Workflow:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;&lt;SPAN&gt;Let’s Encrypt
     │
Certbot (auto-renewal)
     │
Post-renew hook
     │
Ansible Playbook
     │
PAN-OS API
     │
Firewall (certificate replaced)&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;How It Works&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN&gt;Certbot automatically renews certificates from Let’s Encrypt.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;After renewal, a &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;post-renew hook&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; is triggered.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;The hook executes an &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Ansible playbook&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Ansible uploads the new certificate and private key to the firewall via API.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;The certificate is replaced using the same name, so &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;no changes are required in decryption policies&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;Key Benefits&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• Fully automated certificate lifecycle&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• No manual re-import every renewal cycle&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Scalable and suitable for short-lived certificates&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Reduces operational overhead significantly&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;Summary&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;Using Let’s Encrypt with Certbot for automated renewal, combined with Ansible to push certificates to the firewall via API, is an effective workaround to handle short-lived certificates and reduce manual operational effort.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 09:13:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/decryption-policies-and-short-lived-certificates/m-p/1251732#M6817</guid>
      <dc:creator>abayoumi21</dc:creator>
      <dc:date>2026-04-07T09:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption policies and Short-Lived Certificates</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/decryption-policies-and-short-lived-certificates/m-p/1251785#M6822</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/283870"&gt;@itassetbenilde&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are the browsers going to start enforcing the 47-day rule, also?&amp;nbsp; I haven't heard that, but I could have missed it.&amp;nbsp; If it is just the public CAs, it doesn't affect decryption certificates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More and more CAs support ACME.&amp;nbsp; There are numerous scripts that simplify the process:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CA&lt;/P&gt;
&lt;P&gt;&amp;nbsp; |&lt;/P&gt;
&lt;P&gt;Certbot or acme.sh&lt;/P&gt;
&lt;P&gt;&amp;nbsp; |&lt;/P&gt;
&lt;P&gt;PAN-OS API&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/pulse/can-we-configure-palo-alto-firewalls-automatically-obtain-joe-brunner-qrxoe/" target="_blank" rel="noopener"&gt;https://www.linkedin.com/pulse/can-we-configure-palo-alto-firewalls-automatically-obtain-joe-brunner-qrxoe/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://medium.com/palo-alto-networks-developer-blog/costless-automated-trusted-certificates-on-palo-alto-networks-firewalls-5b2930b2893f" target="_blank" rel="noopener"&gt;https://medium.com/palo-alto-networks-developer-blog/costless-automated-trusted-certificates-on-palo-alto-networks-firewalls-5b2930b2893f&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/coopertownsend/pan-certbot" target="_blank" rel="noopener"&gt;https://github.com/coopertownsend/pan-certbot&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/830285149"&gt;@abayoumi21&lt;/a&gt;&amp;nbsp;mentioned, using the same name should simplify the process.&amp;nbsp; If that doesn't work, changing the certificate in the SSL/TLS Service Profile is the next easiest.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would imagine that many CAs will allow you to renew the cert with the same private key, which would be easier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Update:&amp;nbsp; This is a good discussion -&amp;gt;&amp;nbsp;&lt;A href="https://www.reddit.com/r/paloaltonetworks/comments/1ksg6bp/automating_certificate_renewals/" target="_blank"&gt;https://www.reddit.com/r/paloaltonetworks/comments/1ksg6bp/automating_certificate_renewals/&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 19:53:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/decryption-policies-and-short-lived-certificates/m-p/1251785#M6822</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2026-04-07T19:53:44Z</dc:date>
    </item>
  </channel>
</rss>

