<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LetsEncrypt integration in Automation/API Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/279666#M1980</link>
    <description>&lt;P&gt;Having this integration would be amazing.&lt;/P&gt;&lt;P&gt;We manage around 100-odd PA-220's for small clients all with GP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To answer you questions:&lt;/P&gt;&lt;P&gt;1) If you're currently using Let's Encrypt certs with PAN-OS and your workflow does not look like the above, can you briefly describe it?&lt;/P&gt;&lt;P&gt;We aren't using it because of the high maintenance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Is your desired end goal that PAN-OS runs Let's Encrypt natively?&amp;nbsp; If not, what is your desired end goal?&lt;/P&gt;&lt;P&gt;100% Natively would be the goal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) In between the end goal and now, would you&amp;nbsp;want a stop-gap solution?&lt;/P&gt;&lt;P&gt;Depends on how complex.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4) If you want a stop-gap solution, what form should it take?&amp;nbsp; A standalone executable / script?&amp;nbsp; Ansible module?&amp;nbsp; Terraform resource?&amp;nbsp; Tie-in to an existing Let's Encrypt client, such as certbot or acme.sh?&lt;/P&gt;&lt;P&gt;Anything - but depends on how complex.&lt;/P&gt;</description>
    <pubDate>Sun, 28 Jul 2019 05:27:46 GMT</pubDate>
    <dc:creator>TyronF</dc:creator>
    <dc:date>2019-07-28T05:27:46Z</dc:date>
    <item>
      <title>LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/224315#M1741</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While I know most would use an issued SSL certificate it would be great if PANOS supported LetsEncrypt for requesting SSL certificates for things like the management interface and GlobalProtect.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 06:43:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/224315#M1741</guid>
      <dc:creator>Brett_Hobbs</dc:creator>
      <dc:date>2018-08-01T06:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/234208#M1787</link>
      <description>&lt;P&gt;Hi Brett_Hobbs,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What would you be looking for in a Let's Encrypt integration from the workflow perspective?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you still had to do the &lt;CODE&gt;certbot renew&lt;/CODE&gt; from some linux box you controlled, then updating the certs on PAN-OS was provided as an Ansible or Terraform module, would that be helpful?&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 20:57:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/234208#M1787</guid>
      <dc:creator>gfreeman</dc:creator>
      <dc:date>2018-10-05T20:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/234334#M1789</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That particular process would not work for us today (possibly in the future).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was thinking that because GlobalProtect would have a DNS A record that having the certbot agent installed on the firewall we could support automatic verification and renewals.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MGMT interface woud take some aditional thought to solve either via your below method or some external DNS requirements.&lt;/P&gt;</description>
      <pubDate>Sun, 07 Oct 2018 20:42:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/234334#M1789</guid>
      <dc:creator>Brett_Hobbs</dc:creator>
      <dc:date>2018-10-07T20:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/236075#M1801</link>
      <description>&lt;P&gt;For everyone that's interested in Let's Encrypt integration with PAN-OS:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi, my name is Garfield and I work here at Palo Alto Networks in the developer relations team.&amp;nbsp; I'm wanting to get a feel for the interest and expectations of a Let's Encrypt integration.&amp;nbsp; I'd very much appreciate anyone who's interested in&amp;nbsp;a Let's Encrypt integration to&amp;nbsp;respond to this thread with some information about their setup and expectations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd like to separate this discussion into a few parts:&amp;nbsp; what integrations today are doing, what can be done to help that in the short term, and what the expectation for the end result could look like.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Today:&amp;nbsp;&amp;nbsp;given that there is currently no native Let's Encrypt client on PAN-OS, people that are using Let's Encrypt certs on PAN-OS today are, to my knowledge, running a client on some&amp;nbsp;(linux) host to renew the certs, then uploading the certs to their PAN-OS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;End-goal:&amp;nbsp; I&amp;nbsp;assume that the desired end-result is that PAN-OS runs Let's Encrypt natively,&amp;nbsp;doing cert renewal automatically behind the scenes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So here's the questions I have:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) If you're currently using Let's Encrypt certs with PAN-OS and your workflow does not look like the above, can you briefly describe it?&lt;/P&gt;
&lt;P&gt;2) Is your desired end goal that PAN-OS runs Let's Encrypt natively?&amp;nbsp; If not, what is your desired end goal?&lt;/P&gt;
&lt;P&gt;3) In between the end goal and now, would you&amp;nbsp;want a stop-gap solution?&lt;/P&gt;
&lt;P&gt;4) If you want a stop-gap solution, what form should it take?&amp;nbsp; A standalone executable / script?&amp;nbsp; Ansible module?&amp;nbsp; Terraform resource?&amp;nbsp; Tie-in to an existing Let's Encrypt client, such as certbot or acme.sh?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance for the feedback!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 20:32:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/236075#M1801</guid>
      <dc:creator>gfreeman</dc:creator>
      <dc:date>2018-10-18T20:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/240596#M1818</link>
      <description>&lt;P&gt;1) If you're currently using Let's Encrypt certs with PAN-OS and your workflow does not look like the above, can you briefly describe it?&lt;/P&gt;&lt;P&gt;2) Is your desired end goal that PAN-OS runs Let's Encrypt natively?&amp;nbsp; If not, what is your desired end goal?&lt;/P&gt;&lt;P&gt;3) In between the end goal and now, would you&amp;nbsp;want a stop-gap solution?&lt;/P&gt;&lt;P&gt;4) If you want a stop-gap solution, what form should it take?&amp;nbsp; A standalone executable / script?&amp;nbsp; Ansible module?&amp;nbsp; Terraform resource?&amp;nbsp; Tie-in to an existing Let's Encrypt client, such as certbot or acme.sh?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. We don't use Lets Encrypt certs with PAN-OS currently because it's a pita to manage cert renewal manually as you have to do it every 90 days. We do run certbot on our other web servers, it runs everyday and renew only when cert is near expiring, it also swap out certs and&amp;nbsp;flush apache cache automatically. If there is any error, an email is sent to me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Natively or not, I think making the process automatic and simple is what I would expect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. and 4. Yes. it doesn't really matter as long as it can automate the process, or at least automate as much as possible, so that functions in PAN-OS don't fail just because admin forgot to renew the certs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other comment:&lt;/P&gt;&lt;P&gt;Please also make domain ownership validation options flexible as everyone's setup is different.&lt;/P&gt;&lt;P&gt;In our case, xyz.com as well as DNS is controlled by headquarter, branchvpn.abc.com and branchvpn2.abc.com are issued to us.&amp;nbsp; We won't be able to prove ownership of xyz.com but&amp;nbsp;&lt;SPAN&gt;branchvpn.abc.com or branchvpn2.abc.com. And we can only use&amp;nbsp;.well-known files method, and not DNS TXT method as we do not control DNS server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Nov 2018 15:05:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/240596#M1818</guid>
      <dc:creator>AK-X</dc:creator>
      <dc:date>2018-11-20T15:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/251177#M1864</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am just setting up LetsEncrypt certificates for a small Global Protect deployment and use pretty much the method that you suggest.&amp;nbsp; I use a separate linux box to handle the certificate creation and renewal and have an upload script to upload the certificate via the api with a simple curl command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This however does not currently work as the certificate gets imported via the API without the private key.&amp;nbsp; If I use the web GUI, the certificate works fine, complete with the private key - is this a bug?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Native LE support would be great, however at least being able to upload the cert via the API would make life a lot easier (assuming that I am not just doing something wrong!).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Feb 2019 16:10:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/251177#M1864</guid>
      <dc:creator>WTSU</dc:creator>
      <dc:date>2019-02-25T16:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/251186#M1865</link>
      <description>&lt;P&gt;Doh!&amp;nbsp; Just found the private-key API import command and realised that you have to import the cert first and then the private key afterwards!&amp;nbsp; I assumed it was a single step process...&lt;/P&gt;</description>
      <pubDate>Mon, 25 Feb 2019 17:15:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/251186#M1865</guid>
      <dc:creator>WTSU</dc:creator>
      <dc:date>2019-02-25T17:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/254541#M1879</link>
      <description>&lt;P&gt;1) The above is accurate for us.&lt;/P&gt;&lt;P&gt;2) No, having Terraform and Ansible support to manage certificates would be a better option in my opinion. If you integrate Lets Encrypt directly on the OS then that fixes cert management for LE users but not users of other CAs. If you had modules for Terraform and Ansible, that would cover all users and not just LE users. Or support LE natively but also have cert management modules.&lt;/P&gt;&lt;P&gt;3/4) No, we have a working solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDIT: If you do integrate LE directly, please support all validation methods and don't limit it to just one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 18:01:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/254541#M1879</guid>
      <dc:creator>chris-oakops</dc:creator>
      <dc:date>2019-03-21T18:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/260580#M1920</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/46544"&gt;@gfreeman&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;So here's the questions I have:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) If you're currently using Let's Encrypt certs with PAN-OS and your workflow does not look like the above, can you briefly describe it?&lt;/P&gt;&lt;P&gt;2) Is your desired end goal that PAN-OS runs Let's Encrypt natively?&amp;nbsp; If not, what is your desired end goal?&lt;/P&gt;&lt;P&gt;3) In between the end goal and now, would you&amp;nbsp;want a stop-gap solution?&lt;/P&gt;&lt;P&gt;4) If you want a stop-gap solution, what form should it take?&amp;nbsp; A standalone executable / script?&amp;nbsp; Ansible module?&amp;nbsp; Terraform resource?&amp;nbsp; Tie-in to an existing Let's Encrypt client, such as certbot or acme.sh?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance for the feedback!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;1.&amp;nbsp; We run dehydrated on a Linux station that runs once a week and updates certs for our firewalls, panorama, and GlobalProtect portal domains.&amp;nbsp; We use a self-signed CA root cert for GlobalProtect clients.&amp;nbsp; (We run dehydrated on another Linux system that updates the cert on 50-odd Linux servers for use with Webmin, Apache, Lighttpd, CUPS, 3Ware GUI etc, automatically.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; Having a way to script the uploads of the certs into Panorama for pushing out to the firewalls, and into the GP Portal would be handy, and save the 10-15 minutes I spend every 60-odd days doing it manually. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp; (No, I haven't looked into the XML API as yet, it's on the Todo list, though.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. and 4.&amp;nbsp; See 2. above.&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2019 21:57:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/260580#M1920</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2019-05-10T21:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/260581#M1921</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107633"&gt;@WTSU&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Doh!&amp;nbsp; Just found the private-key API import command and realised that you have to import the cert first and then the private key afterwards!&amp;nbsp; I assumed it was a single step process...&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Oooh, that's helpful.&amp;nbsp; Now I have some reading to do to get our LE setup fully-automated.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2019 21:56:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/260581#M1921</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2019-05-10T21:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/279533#M1979</link>
      <description>&lt;P&gt;Just to add to the thread.&lt;/P&gt;&lt;P&gt;Yes I would like to use letsencrypt with PA.&lt;/P&gt;&lt;P&gt;No I don't want to manage the certs in PA. why - current management sucks - renew a cert with SAN attributes and they get lost - support tell me thats just how it is and I shouldn't be using the PA for cert management so (double checked with SE ..)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do like current have a script for auth and distributing certs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would mind if somebody here could port the scripts to insert into PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By PA I mean Panorama which would then distribute it to the other PA's&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so I wouild have a place holder name of say LE1 which could then assign to a PA management interface.&lt;/P&gt;&lt;P&gt;My script would renew the LE1 cert and then insert into PA (via api ?) which would overwrite the current LE1 and then somehow push from panorama to the PA's&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jul 2019 07:07:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/279533#M1979</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2019-07-26T07:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/279666#M1980</link>
      <description>&lt;P&gt;Having this integration would be amazing.&lt;/P&gt;&lt;P&gt;We manage around 100-odd PA-220's for small clients all with GP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To answer you questions:&lt;/P&gt;&lt;P&gt;1) If you're currently using Let's Encrypt certs with PAN-OS and your workflow does not look like the above, can you briefly describe it?&lt;/P&gt;&lt;P&gt;We aren't using it because of the high maintenance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Is your desired end goal that PAN-OS runs Let's Encrypt natively?&amp;nbsp; If not, what is your desired end goal?&lt;/P&gt;&lt;P&gt;100% Natively would be the goal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) In between the end goal and now, would you&amp;nbsp;want a stop-gap solution?&lt;/P&gt;&lt;P&gt;Depends on how complex.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4) If you want a stop-gap solution, what form should it take?&amp;nbsp; A standalone executable / script?&amp;nbsp; Ansible module?&amp;nbsp; Terraform resource?&amp;nbsp; Tie-in to an existing Let's Encrypt client, such as certbot or acme.sh?&lt;/P&gt;&lt;P&gt;Anything - but depends on how complex.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2019 05:27:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/279666#M1980</guid>
      <dc:creator>TyronF</dc:creator>
      <dc:date>2019-07-28T05:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304283#M2095</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/46544"&gt;@gfreeman&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any update here?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) I have a webserver behind the Palo for which I want to enable inbound ssl decryption, I use letsencrypt certs for this.&lt;/P&gt;&lt;P&gt;2.) endgoal is only to not have to reimport the cert into palo every x weeks, an integration into the autocertbot would be good&lt;/P&gt;&lt;P&gt;3) yes&lt;/P&gt;&lt;P&gt;4) standalone script or better tied into certbot&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2019 17:11:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304283#M2095</guid>
      <dc:creator>CLIq</dc:creator>
      <dc:date>2019-12-18T17:11:55Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304286#M2096</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38826"&gt;@panguyen&lt;/a&gt; wrote a LetsEncrypt integration for PAN-OS into the acme.sh client. The Pull Request is up for review here:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/Neilpang/acme.sh/pull/2614" target="_blank"&gt;https://github.com/Neilpang/acme.sh/pull/2614&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While the PR is getting reviewed and merged, you can use the integration by simply downloading the deployment file (deploy/panos.sh) into your own acme.sh installation. Here's a link to the file: &lt;A href="https://github.com/Neilpang/acme.sh/pull/2614/files#diff-6ca80cd0349982033417d0bcd9b6952e" target="_blank"&gt;https://github.com/Neilpang/acme.sh/pull/2614/files#diff-6ca80cd0349982033417d0bcd9b6952e&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know many people use Certbot, but we wanted a solution for internal and external firewalls that could be 100% automated, and we couldn't find a way to do that with Certbot. Acme.sh has many API-based domain verification capabilities that match well with the use case for internal firewall certs and automatic deployment.&amp;nbsp; If anyone knows a viable way to integrate with Certbot, let us know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy to answer any questions, and enjoy your free, auto-deployed firewall certificates!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;-Brian&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2019 17:46:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304286#M2096</guid>
      <dc:creator>btorresgil</dc:creator>
      <dc:date>2019-12-18T17:46:53Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304374#M2097</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15566"&gt;@btorresgil&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38826"&gt;@panguyen&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/46544"&gt;@gfreeman&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ok, so the deploy of this is done automatically and only when a new cert has been issued...&lt;/P&gt;&lt;P&gt;but this stores a superuser account name and password in cleartext... should be mentioned or better yet store only the api key accessible only by the user executing the command or something like that..&lt;/P&gt;&lt;P&gt;final solution should be somewhat secure, an exposed DMZ-host which might have a vulnerability giving superuser access to the firewall which can then open up access to the rest of the network? &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;must be a better way&lt;/P&gt;&lt;P&gt;EDIT: giving API access for import and commit seems to be enough (still allows to import new config and gain full access this way but...)... now if it were possible to only store the api-key and store this in a safe way it would at least be an interim solution until something can be created that allows nothing but import certificates &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2019 10:08:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304374#M2097</guid>
      <dc:creator>CLIq</dc:creator>
      <dc:date>2019-12-20T10:08:31Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304575#M2099</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your concerns about security are important to us. Let me try to explain our logic around how this works and we can discuss if this meets your needs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On first issue of the cert, acme.sh accepts the FW credentials via a temporary environment variable. However, to renew the cert and deploy it automatically, acme.sh needs to have the FW creds to deploy the cert, so we leverage the acme.sh credential storing mechanism to store the FW user/pass.&amp;nbsp; acme.sh does store all the creds in clear text (PAN-OS and DNS host passwords alike) in a file called `account.conf`. The location and permissions of this file can be controlled through acme.sh settings, so it can be stored in a way that makes it inaccessible to other users.&amp;nbsp; In fact, this is the default.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;acme.sh (and other LetsEncrypt clients like certbot) also store the private keys for the certificates after they are issued, and these private keys are not password protected or encrypted. They are stored in the same secure location as the `account.conf` file, inaccessible to other users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We recommend that a dedicated letsencrypt username be created on the firewall with only import and commit permissions. The deploy script is designed to commit only the changes made by this letsencrypt user, so it won't interfere with any uncommited changes that exist during the certificate renewal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We decided that with the minimal permissions available to the firewall user, the secure nature of the acme.sh account credential file, and the fact that there are other valuable secrets like DNS host credentials and private keys stored in the same secure way, it would be acceptable to store the FW credentials according to the acme.sh standard.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you disagree or this doesn't meet your needs, we're open to other methods of handling credentials during a certificate renewal.&amp;nbsp; Please let us know what would work better for you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;-Brian&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2019 18:07:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304575#M2099</guid>
      <dc:creator>btorresgil</dc:creator>
      <dc:date>2019-12-20T18:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304576#M2100</link>
      <description>&lt;P&gt;One other note since you mentioned a DMZ host. The nature of acme.sh is to verify domains without the need for incoming connections. This is a huge advantage, and a necessary feature for automated certificates on a firewall. This feature allows acme.sh to live on hosts anywhere in your network that has access to the internet and the firewall, which means it doesn't need to live in a DMZ or accept incoming connections of any kind. You can therefore place the acme.sh host on a secure vlan that does not allow anything inbound.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2019 18:12:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304576#M2100</guid>
      <dc:creator>btorresgil</dc:creator>
      <dc:date>2019-12-20T18:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304577#M2101</link>
      <description>&lt;P&gt;This is very handy, thanks for the link.&amp;nbsp; Now I just need to figure out how to make it work with our dehydrated setup.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp; Although, since we do everything via Panorama, this might not be as useful; I'm not sure I'd want an automated push to 52 firewalls ...&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2019 18:16:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/304577#M2101</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2019-12-20T18:16:32Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/305243#M2107</link>
      <description>&lt;P&gt;I want to make a correction in how acme.sh stores the credentials. acme.sh will base64encode the credentials and then save them.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2019 20:43:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/305243#M2107</guid>
      <dc:creator>panguyen</dc:creator>
      <dc:date>2019-12-30T20:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: LetsEncrypt integration</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/305496#M2116</link>
      <description>&lt;P&gt;This is interesting, I am glad I found this thread because it appears this acme.sh script may be what works for my lab setup however reading through the docs I do not see an option that would work for a PAN firewall that is hosting a GP VPN (ports 80 and 443 are in use). There is mention in this thread about this working without needing inbound connections but I am not seeing that outlined here:&amp;nbsp;&lt;A href="https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert" target="_blank"&gt;https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will comb through the docs more when I get off home tonight but am I missing something? Is this still in the works or should this give me a Let's Encrypt cert with auto renewal for the firewall (without needing a server behind the firewall exposed to the internet) as it is today?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use case:&amp;nbsp; Generate a valid cert for the GP VPN portal domain.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2020 23:56:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/letsencrypt-integration/m-p/305496#M2116</guid>
      <dc:creator>hshawn</dc:creator>
      <dc:date>2020-01-02T23:56:45Z</dc:date>
    </item>
  </channel>
</rss>

