<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate Expiry in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-expiry/m-p/589968#M117560</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/249853"&gt;@Sanjay_Ramaiah&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't see any attached error.&amp;nbsp; Could you provide more info ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Steps to import a new Azure SAML certificate &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Step 1 - Add a CA-Issued certificate as IdP Certificate on Azure AD &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Generate a certificate using your enterprise Certificate Authority. Follow instructions from Azure AD to add a new CA-issued certificate &lt;/SPAN&gt;&lt;A style="box-sizing: border-box; background-color: #ffffff; color: var(--lwc-brandtextlink,#0176d3); text-decoration: none; transition: color 0.1s linear 0s; cursor: pointer; font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: pre-line;" href="https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/manage-certificates-for-federated-single-sign-on#create-a-new-certificate" target="_blank" rel="noopener" data-aura-rendered-by="114:75291;a"&gt;https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/manage-certificates-for-federated-single-sign-on#create-a-new-certificate&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please delete the old certificate before you export the IdP metadata to complete the next step. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Step 2 - Import metadata and enable Validate Identity Provider Certificate on PAN-OS &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ask your IdP administrator for IdP metadata. Import the IdP metadata into PAN-OS and/or Panorama and ensure that the Validate Identity Provider Certificate checkbox is enabled. Click OK. Create a Certificate Profile using the same CA certificate that has issued the IdPs certificate. Add the newly created IdP Server Profile and Certificate Profile to your SAML Authentication Profile. Commit the configuration to Panorama and/or the firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Kind regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-Kim.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jun 2024 08:13:54 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2024-06-20T08:13:54Z</dc:date>
    <item>
      <title>Certificate Expiry</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-expiry/m-p/589793#M117528</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;I am trying to import the Azure SAML certificate to use it in the&amp;nbsp;&lt;SPAN&gt;Identity Provider Certificate as it is expiring this Thursday. But i am getting the attached error. Does it mean do i need to delete the existing one and then import it? I have the Pem format and Base64 format but error is same when i import. Certificate extention is .cer.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Am i making anything wrong here? GP authentication will stop on Thursday so need quick help on this please.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Sanjay S&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 12:46:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-expiry/m-p/589793#M117528</guid>
      <dc:creator>Sanjay_Ramaiah</dc:creator>
      <dc:date>2024-06-18T12:46:47Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate Expiry</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-expiry/m-p/589968#M117560</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/249853"&gt;@Sanjay_Ramaiah&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't see any attached error.&amp;nbsp; Could you provide more info ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Steps to import a new Azure SAML certificate &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Step 1 - Add a CA-Issued certificate as IdP Certificate on Azure AD &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Generate a certificate using your enterprise Certificate Authority. Follow instructions from Azure AD to add a new CA-issued certificate &lt;/SPAN&gt;&lt;A style="box-sizing: border-box; background-color: #ffffff; color: var(--lwc-brandtextlink,#0176d3); text-decoration: none; transition: color 0.1s linear 0s; cursor: pointer; font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: pre-line;" href="https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/manage-certificates-for-federated-single-sign-on#create-a-new-certificate" target="_blank" rel="noopener" data-aura-rendered-by="114:75291;a"&gt;https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/manage-certificates-for-federated-single-sign-on#create-a-new-certificate&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please delete the old certificate before you export the IdP metadata to complete the next step. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Step 2 - Import metadata and enable Validate Identity Provider Certificate on PAN-OS &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ask your IdP administrator for IdP metadata. Import the IdP metadata into PAN-OS and/or Panorama and ensure that the Validate Identity Provider Certificate checkbox is enabled. Click OK. Create a Certificate Profile using the same CA certificate that has issued the IdPs certificate. Add the newly created IdP Server Profile and Certificate Profile to your SAML Authentication Profile. Commit the configuration to Panorama and/or the firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Kind regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-Kim.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 08:13:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-expiry/m-p/589968#M117560</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-06-20T08:13:54Z</dc:date>
    </item>
  </channel>
</rss>

