<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate not valid in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-not-valid/m-p/599235#M119175</link>
    <description>&lt;P&gt;How are you implementing your client certificates? The Host ID certificate check references a unique ID on the machine retrieved from the GP client and a serial number in the subject of the certificate. You can see the unique IDs it references per host OS in the manual here in the "Host ID" section:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/globalprotect/objects-globalprotect-hip-objects/hip-objects-general-tab" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/globalprotect/objects-globalprotect-hip-objects/hip-objects-general-tab&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So for a Windows machine the subject has to include the MachineGuid from the registry. It is not the machine name (CN) that most people would make their client certificates from. It is an optional field and basically no one normally creates a cert with a serial number. (Note this is not the serial number of the certificate itself, this is a serial number in the subject of the cert).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So a normal internal machine certificate for machine "mylaptop.example.local" would have a subject like:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;CN = mylaptop&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;OU = EmployeePCs&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;DC = example&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;DC&amp;nbsp; = local&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I haven't done this before, but I believe you need to create an internal client certificate with a subject like this:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;CN = mylaptop&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;serialNumber = c828ea23-62ab-9a3d-56a90ecb2027&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;OU = EmployeePCs&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;DC = example&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;DC&amp;nbsp; = local&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This requires redoing your PKI certificate templates to create the new cert form automatically during your AD joining/etc.&lt;/P&gt;</description>
    <pubDate>Tue, 01 Oct 2024 23:45:54 GMT</pubDate>
    <dc:creator>Adrian_Jensen</dc:creator>
    <dc:date>2024-10-01T23:45:54Z</dc:date>
    <item>
      <title>Certificate not valid</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-not-valid/m-p/599125#M119159</link>
      <description>&lt;P&gt;I am trying to setup Machine authentication, where it actually validates the machine certificate, I have a PKI infrastructure, that pushes certificates to the machines, with there name in Common Name, and SAN, of the machine hostname.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On they Certificate Profile i have enabled CRL, and added both Root and intermediate CA, and set username to subject, and then i have enabled the 4 "block session" checkmarks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As soon as i enable the&amp;nbsp;"Block sessions if the certificate was not issued to the authenticating device", i cannot login and GP gives me an error that i need a valid certificate.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have also tryed adding the domain and Certificate template, but that did not help&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firewall is 1410, running 11.1.4-h1, agent running 6.3.1&lt;/P&gt;
&lt;P&gt;Any idear on what i am dooing wrong ?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2024 19:47:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-not-valid/m-p/599125#M119159</guid>
      <dc:creator>Spiff_21</dc:creator>
      <dc:date>2024-09-30T19:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate not valid</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-not-valid/m-p/599235#M119175</link>
      <description>&lt;P&gt;How are you implementing your client certificates? The Host ID certificate check references a unique ID on the machine retrieved from the GP client and a serial number in the subject of the certificate. You can see the unique IDs it references per host OS in the manual here in the "Host ID" section:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/globalprotect/objects-globalprotect-hip-objects/hip-objects-general-tab" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/globalprotect/objects-globalprotect-hip-objects/hip-objects-general-tab&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So for a Windows machine the subject has to include the MachineGuid from the registry. It is not the machine name (CN) that most people would make their client certificates from. It is an optional field and basically no one normally creates a cert with a serial number. (Note this is not the serial number of the certificate itself, this is a serial number in the subject of the cert).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So a normal internal machine certificate for machine "mylaptop.example.local" would have a subject like:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;CN = mylaptop&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;OU = EmployeePCs&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;DC = example&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;DC&amp;nbsp; = local&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I haven't done this before, but I believe you need to create an internal client certificate with a subject like this:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;CN = mylaptop&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;serialNumber = c828ea23-62ab-9a3d-56a90ecb2027&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;OU = EmployeePCs&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;DC = example&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;DC&amp;nbsp; = local&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This requires redoing your PKI certificate templates to create the new cert form automatically during your AD joining/etc.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2024 23:45:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-not-valid/m-p/599235#M119175</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2024-10-01T23:45:54Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate not valid</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-not-valid/m-p/599301#M119182</link>
      <description>&lt;P&gt;In what part of of the certificate should this be added to the CN or SAN. the CN can to ny knowledge only contain one name which is usally the FQDN.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if it is added to the SAN, in what format&lt;BR /&gt;GUID = xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx&amp;nbsp; (Like Cisco ISE)&lt;/P&gt;
&lt;P&gt;Serial =&amp;nbsp;xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can this be used without HIP ?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2024 08:11:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-not-valid/m-p/599301#M119182</guid>
      <dc:creator>Spiff_21</dc:creator>
      <dc:date>2024-10-02T08:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate not valid</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-not-valid/m-p/599310#M119184</link>
      <description>&lt;P&gt;Serial of the machine is usally different from Machine ID, should i use the serial or the Machine ID ? so should it be &lt;BR /&gt;host id =&amp;nbsp;&lt;SPAN&gt;xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2024 11:07:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-not-valid/m-p/599310#M119184</guid>
      <dc:creator>Spiff_21</dc:creator>
      <dc:date>2024-10-02T11:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate not valid</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-not-valid/m-p/616404#M121957</link>
      <description>&lt;P&gt;Thank you so much for the information.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 07:53:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-not-valid/m-p/616404#M121957</guid>
      <dc:creator>BeckettJames</dc:creator>
      <dc:date>2024-11-08T07:53:05Z</dc:date>
    </item>
  </channel>
</rss>

