<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Captive Portal in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal/m-p/14429#M10615</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to authenticate unknown users from my network to the internet.&lt;/P&gt;&lt;P&gt;I´m able to authenticate users in my ldap server using the web form, from my captive-portal in my pa-500.&lt;/P&gt;&lt;P&gt;But my issue is this:&lt;/P&gt;&lt;P&gt;Before the users receiving the portal page they receive the error in the browser saying, that is an invalid certificate. I understand this, because I’m using the pa certificate witch is invalid. Not a public one.&lt;/P&gt;&lt;P&gt;My question is: can I use the captive portal, just in http??? Pa intercepts for authentication in https: but the form is in http. Is there any change to intercept and prompt credentials in http:&lt;/P&gt;&lt;P&gt;Or I must buy a public certificate? I can´t use an internal certificate using the active directory, because I’ve got some machines not joined to the domain. Appreciate some help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Mar 2013 11:15:32 GMT</pubDate>
    <dc:creator>helder_teixeira</dc:creator>
    <dc:date>2013-03-13T11:15:32Z</dc:date>
    <item>
      <title>Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal/m-p/14429#M10615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to authenticate unknown users from my network to the internet.&lt;/P&gt;&lt;P&gt;I´m able to authenticate users in my ldap server using the web form, from my captive-portal in my pa-500.&lt;/P&gt;&lt;P&gt;But my issue is this:&lt;/P&gt;&lt;P&gt;Before the users receiving the portal page they receive the error in the browser saying, that is an invalid certificate. I understand this, because I’m using the pa certificate witch is invalid. Not a public one.&lt;/P&gt;&lt;P&gt;My question is: can I use the captive portal, just in http??? Pa intercepts for authentication in https: but the form is in http. Is there any change to intercept and prompt credentials in http:&lt;/P&gt;&lt;P&gt;Or I must buy a public certificate? I can´t use an internal certificate using the active directory, because I’ve got some machines not joined to the domain. Appreciate some help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 11:15:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal/m-p/14429#M10615</guid>
      <dc:creator>helder_teixeira</dc:creator>
      <dc:date>2013-03-13T11:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal/m-p/14430#M10616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have a few non domain machines, is it possible to manually have these users install the CA in the trusted CA store?&lt;/P&gt;&lt;P&gt;You can generate a CA on the PA device (or use your internal windows CA) &amp;amp; use it to generate the captive portal certificate. You can then export this CA out of the PA &amp;amp; possibly push it out through GPO to your domain machines.&lt;/P&gt;&lt;P&gt;Authentication in the clear may not be a good idea, since a sniffer on the wire may be used to get access to the credentials being used.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 13:03:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal/m-p/14430#M10616</guid>
      <dc:creator>goku123</dc:creator>
      <dc:date>2013-03-13T13:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal/m-p/14431#M10617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with achitwadgi.&amp;nbsp; Would like to add that a public cert is not that expensive if you want to avoid the warning messages.&amp;nbsp; We have a public cert for our PA5000s.&amp;nbsp; We have a self signed cert for our PA-500 which we use in a test environment and guest access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 13:29:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal/m-p/14431#M10617</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2013-03-13T13:29:28Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal/m-p/14432#M10618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know about the public certificate, because I have several customers with the public certificate. The sniffer, is not an issue to me in the internal network, but I would like to know, how to make it possible without https in captive portal. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 14:25:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal/m-p/14432#M10618</guid>
      <dc:creator>helder_teixeira</dc:creator>
      <dc:date>2013-03-13T14:25:14Z</dc:date>
    </item>
  </channel>
</rss>

