<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sectigo Root CA Trusted Store Request in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1246841#M125920</link>
    <description>&lt;DIV data-olk-copy-source="MailCompose"&gt;Greetings,&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Sectigo has (recently) updated their Public Root Certificates (mid-2025), introducing new roots including:&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;- RSA: Sectigo Public Server Authentication Root R46(&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A id="OWA1cec2e70-b69b-d132-43df-d03de9c801d6" class="OWAAutoLink" href="https://crt.sh/?d=4256644734" target="_blank" rel="noopener"&gt;https://crt.sh/?d=4256644734&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;KB Articles for reference: &lt;A id="OWAae263a47-1730-59ef-086b-ffd78cbfd12d" class="OWAAutoLink" href="https://www.sectigo.com/knowledge-base/detail/Sectigo-Root-Certificates" target="_blank"&gt;https://www.sectigo.com/knowledge-base/detail/Sectigo-Root-Certificates&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;A id="OWA346f9821-9924-8967-286f-c18e6fd4a7d2" class="OWAAutoLink" href="https://www.sectigo.com/knowledge-base/detail/Sectigo-Root-Certificates" target="_blank"&gt;https://www.sectigo.com/knowledge-base/detail/Sectigo-Root-Certificates&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;A id="OWA02abbc0b-27ff-a368-5efe-2d69c64a73fe" class="OWAAutoLink" href="https://www.sectigo.com/knowledge-base/detail/Sectigo-new-Public-Roots-and-Issuing-CAs-Hierarchy" target="_blank"&gt;https://www.sectigo.com/knowledge-base/detail/Sectigo-new-Public-Roots-and-Issuing-CAs-Hierarchy&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;A href="https://www.sectigo.com/resource-library/changes-to-root-ca-hierarchies-and-trust-status" data-olk-copy-source="MailCompose" target="_blank"&gt;https://www.sectigo.com/resource-library/changes-to-root-ca-hierarchies-and-trust-status&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Currently, this root certificate is not present in Palo Alto’s Default Trusted Certificate Authorities store, as it is relatively new. The following Sectigo/COMODO roots are included today:&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;OL start="1" data-editing-info="{&amp;quot;applyListStyleFromLevel&amp;quot;:false,&amp;quot;orderedStyleType&amp;quot;:1}"&gt;
&lt;LI&gt;
&lt;DIV role="presentation"&gt;USERTrust RSA Certification Authority - &lt;SPAN&gt;&lt;U&gt;&lt;A id="OWAf6fb2e75-4ec0-b0c5-bcc9-214eeed8a993" class="OWAAutoLink" href="https://crt.sh/?id=1199354" target="_blank" rel="noopener"&gt;https://crt.sh/?id=1199354&lt;/A&gt;&lt;/U&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL start="2" data-editing-info="{&amp;quot;orderedStyleType&amp;quot;:1,&amp;quot;applyListStyleFromLevel&amp;quot;:false}"&gt;
&lt;LI&gt;
&lt;DIV role="presentation"&gt;USERTrust&amp;nbsp;ECC Certification Authority - &lt;SPAN&gt;&lt;U&gt;&lt;A id="OWA91c50037-2158-cb21-12d7-36233eaf4322" class="OWAAutoLink" href="https://crt.sh/?id=2841410" target="_blank" rel="noopener"&gt;https://crt.sh/?id=2841410&lt;/A&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV role="presentation"&gt;COMODO RSA&amp;nbsp;Certification Authority - &lt;SPAN&gt;&lt;U&gt;&lt;A id="OWA3d560070-5606-c00d-f1f6-c71aae068cb3" class="OWAAutoLink" href="https://crt.sh/?id=1720081" target="_blank" rel="noopener"&gt;https://crt.sh/?id=1720081&lt;/A&gt;&lt;/U&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV role="presentation"&gt;COMODO ECC Certification Authority - &lt;SPAN&gt;&lt;U&gt;&lt;A id="OWAc4944bca-3732-7e54-5852-d153633678d2" class="OWAAutoLink" href="https://crt.sh/?id=2835394" target="_blank" rel="noopener"&gt;https://crt.sh/?id=2835394&lt;/A&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Would it be possible to have Sectigo Public Server Authentication Root R46 (&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A id="OWA1c50e29d-86d9-6c4f-04e6-acdcf41f3726" class="OWAAutoLink" href="https://crt.sh/?d=4256644734" target="_blank" rel="noopener"&gt;https://crt.sh/?d=4256644734&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;included in Palo Alto's Default Trusted Certificate Authority store?&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;</description>
    <pubDate>Wed, 28 Jan 2026 11:38:03 GMT</pubDate>
    <dc:creator>L.Yalezo</dc:creator>
    <dc:date>2026-01-28T11:38:03Z</dc:date>
    <item>
      <title>Sectigo Root CA Trusted Store Request</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1246841#M125920</link>
      <description>&lt;DIV data-olk-copy-source="MailCompose"&gt;Greetings,&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Sectigo has (recently) updated their Public Root Certificates (mid-2025), introducing new roots including:&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;- RSA: Sectigo Public Server Authentication Root R46(&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A id="OWA1cec2e70-b69b-d132-43df-d03de9c801d6" class="OWAAutoLink" href="https://crt.sh/?d=4256644734" target="_blank" rel="noopener"&gt;https://crt.sh/?d=4256644734&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;KB Articles for reference: &lt;A id="OWAae263a47-1730-59ef-086b-ffd78cbfd12d" class="OWAAutoLink" href="https://www.sectigo.com/knowledge-base/detail/Sectigo-Root-Certificates" target="_blank"&gt;https://www.sectigo.com/knowledge-base/detail/Sectigo-Root-Certificates&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;A id="OWA346f9821-9924-8967-286f-c18e6fd4a7d2" class="OWAAutoLink" href="https://www.sectigo.com/knowledge-base/detail/Sectigo-Root-Certificates" target="_blank"&gt;https://www.sectigo.com/knowledge-base/detail/Sectigo-Root-Certificates&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;A id="OWA02abbc0b-27ff-a368-5efe-2d69c64a73fe" class="OWAAutoLink" href="https://www.sectigo.com/knowledge-base/detail/Sectigo-new-Public-Roots-and-Issuing-CAs-Hierarchy" target="_blank"&gt;https://www.sectigo.com/knowledge-base/detail/Sectigo-new-Public-Roots-and-Issuing-CAs-Hierarchy&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;A href="https://www.sectigo.com/resource-library/changes-to-root-ca-hierarchies-and-trust-status" data-olk-copy-source="MailCompose" target="_blank"&gt;https://www.sectigo.com/resource-library/changes-to-root-ca-hierarchies-and-trust-status&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Currently, this root certificate is not present in Palo Alto’s Default Trusted Certificate Authorities store, as it is relatively new. The following Sectigo/COMODO roots are included today:&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;OL start="1" data-editing-info="{&amp;quot;applyListStyleFromLevel&amp;quot;:false,&amp;quot;orderedStyleType&amp;quot;:1}"&gt;
&lt;LI&gt;
&lt;DIV role="presentation"&gt;USERTrust RSA Certification Authority - &lt;SPAN&gt;&lt;U&gt;&lt;A id="OWAf6fb2e75-4ec0-b0c5-bcc9-214eeed8a993" class="OWAAutoLink" href="https://crt.sh/?id=1199354" target="_blank" rel="noopener"&gt;https://crt.sh/?id=1199354&lt;/A&gt;&lt;/U&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL start="2" data-editing-info="{&amp;quot;orderedStyleType&amp;quot;:1,&amp;quot;applyListStyleFromLevel&amp;quot;:false}"&gt;
&lt;LI&gt;
&lt;DIV role="presentation"&gt;USERTrust&amp;nbsp;ECC Certification Authority - &lt;SPAN&gt;&lt;U&gt;&lt;A id="OWA91c50037-2158-cb21-12d7-36233eaf4322" class="OWAAutoLink" href="https://crt.sh/?id=2841410" target="_blank" rel="noopener"&gt;https://crt.sh/?id=2841410&lt;/A&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV role="presentation"&gt;COMODO RSA&amp;nbsp;Certification Authority - &lt;SPAN&gt;&lt;U&gt;&lt;A id="OWA3d560070-5606-c00d-f1f6-c71aae068cb3" class="OWAAutoLink" href="https://crt.sh/?id=1720081" target="_blank" rel="noopener"&gt;https://crt.sh/?id=1720081&lt;/A&gt;&lt;/U&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV role="presentation"&gt;COMODO ECC Certification Authority - &lt;SPAN&gt;&lt;U&gt;&lt;A id="OWAc4944bca-3732-7e54-5852-d153633678d2" class="OWAAutoLink" href="https://crt.sh/?id=2835394" target="_blank" rel="noopener"&gt;https://crt.sh/?id=2835394&lt;/A&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Would it be possible to have Sectigo Public Server Authentication Root R46 (&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A id="OWA1c50e29d-86d9-6c4f-04e6-acdcf41f3726" class="OWAAutoLink" href="https://crt.sh/?d=4256644734" target="_blank" rel="noopener"&gt;https://crt.sh/?d=4256644734&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;included in Palo Alto's Default Trusted Certificate Authority store?&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 28 Jan 2026 11:38:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1246841#M125920</guid>
      <dc:creator>L.Yalezo</dc:creator>
      <dc:date>2026-01-28T11:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo Root CA Trusted Store Request</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1246842#M125921</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/395698063"&gt;@L.Yalezo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;In the Palo Alto ecosystem, the Default Trusted Certificate Authorities store is historically updated via major PAN-OS releases (e.g., moving from 10.2.x to 11.1.x or 11.2.x).&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL data-path-to-node="4"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="4,0,0"&gt;&lt;STRONG data-path-to-node="4,0,0" data-index-in-node="0"&gt;PAN-OS Updates:&lt;/STRONG&gt; This is the primary vehicle for permanent root store changes. Palo Alto usually syncs their default store with the Mozilla/Google root programs during the development of a new maintenance or feature release.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-path-to-node="5"&gt;It will likely appear in a future release of the 11.2 or 12.0 trains.&lt;/P&gt;
&lt;P data-path-to-node="5"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="5"&gt;&lt;SPAN&gt;Manual import is a workaround to address the issue.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-path-to-node="5"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="5"&gt;Kind regards,&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 11:50:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1246842#M125921</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2026-01-28T11:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo Root CA Trusted Store Request</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1246843#M125922</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the prompt feedback.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It’s possible that this root certificate, along with others, will be included in future releases of the 11.2 or 12.x trains, pending Palo Alto’s vetting process given that they are fairly new. According to this blog:&amp;nbsp;&lt;SPAN data-teams="true"&gt;&lt;A id="menurica" class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://blog.bressem.com/2025/11/palo-alto-is-missing-the-new-sectigo-root-cas/" href="https://blog.bressem.com/2025/11/palo-alto-is-missing-the-new-sectigo-root-cas/" target="_blank" rel="noreferrer noopener" aria-label="Link https://blog.bressem.com/2025/11/palo-alto-is-missing-the-new-sectigo-root-cas/"&gt;https://blog.bressem.com/2025/11/palo-alto-is-missing-the-new-sectigo-root-cas/&lt;/A&gt;&amp;nbsp;this root certificate is still missing in versions 11.2.7-h4, 11.2.10 and 12.1.3-h1.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;I was wondering if perhaps there are avenues to submit a feature request for including this root certificate, like one would do when requesting a reclassification of an application.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;Many thanks.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 12:20:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1246843#M125922</guid>
      <dc:creator>L.Yalezo</dc:creator>
      <dc:date>2026-01-28T12:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo Root CA Trusted Store Request</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1246939#M125933</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/395698063"&gt;@L.Yalezo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently, there is no code-level resolution for automatically updating this list outside of major PAN-OS releases nor is there a "feature request" for this.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You can manually import it as a trusted root CA to ensure that your firewall trusts the new Sectigo root certs.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 04:07:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1246939#M125933</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2026-01-29T04:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo Root CA Trusted Store Request</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1246943#M125934</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220841"&gt;@JayGolf&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 04:20:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1246943#M125934</guid>
      <dc:creator>L.Yalezo</dc:creator>
      <dc:date>2026-01-29T04:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo Root CA Trusted Store Request</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1247538#M125969</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220841"&gt;@JayGolf&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/395698063"&gt;@L.Yalezo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently, there is no code-level resolution for automatically updating this list outside of major PAN-OS releases nor is there a "feature request" for this.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You can manually import it as a trusted root CA to ensure that your firewall trusts the new Sectigo root certs.&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;There is a FR for this, (which is NSFR-I-21203)...At least I'm told there was and that my company was added to the FR.&amp;nbsp; I'll look for it and share it here.&lt;BR /&gt;&lt;BR /&gt;That said this is something that Palo know about for years and something I've been complaining about to palo for the past 5+ years.&amp;nbsp; It's so bad that a whole repo process was setup to solve this issue Palo has ignored.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/PaloAltoNetworks/pan-chainguard" target="_blank" rel="noopener"&gt;https://github.com/PaloAltoNetworks/pan-chainguard&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is partial good news.&amp;nbsp; In 12.1.2 Palo is trying to solve the missing intermediate cert issue as PAN-OS will attempt to dynamically download missing intermediate certificates (No current solve for roots, other than the code upgrade.)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Automatic Retrieval of Intermediate Certificates Using AIA&lt;/P&gt;
&lt;P&gt;"We introduced a mechanism to fetch intermediate certificates via the AIA extension.&lt;BR /&gt;This mechanism can be toggled on/off by a new Decryption Profile setting: “Automatically Fetch Intermediate Certificates”&lt;BR /&gt;As part of decryption, when we encounter a server certificate with an incomplete chain, and the AIA CA Issuers extension is present (RFC5280), we will attempt to download an Intermediate CA certificate from the specified URL.&lt;BR /&gt;If successful, we cache the intermediate certificate for up to 1 week and use it to validate future traffic."&amp;nbsp; *Caveats: The first session will show untrusted until the intermediate certificate(s) have been fetched*&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note:&lt;/P&gt;
&lt;P&gt;This feature must be enabled on a Decryption Profile (“Automatically Fetch Intermediate Certificates”)&lt;BR /&gt;The intermediate certificate cache itself is only present on firewalls (not Panorama or SCM)&lt;BR /&gt;Panorama and SCM can only enable/disable the feature&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://urldefense.com/v3/__https:/docs.paloaltonetworks.com/ngfw/release-notes/12-1/features-introduced-in-pan-os/decryption-features__;!!No2nNwjO!vCcxQlHcO9ZzmPS6CUBCBH6rMKuobH4tCB36ZMGDV5t9WuHNIiKotMlLH8XMvLFg1rKj7MB206LfaOZehxGASSuRRztA$" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/ngfw/release-notes/12-1/features-introduced-in-pan-os/decryption-features&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 14:33:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1247538#M125969</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2026-02-06T14:33:04Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo Root CA Trusted Store Request</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1247616#M125972</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220841"&gt;@JayGolf&lt;/a&gt;&amp;nbsp; /&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/395698063"&gt;@L.Yalezo&lt;/a&gt;&amp;nbsp; -- I've updated my post with the FR.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 14:33:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1247616#M125972</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2026-02-06T14:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo Root CA Trusted Store Request</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1249834#M126123</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220841"&gt;@JayGolf&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/395698063"&gt;@L.Yalezo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently, there is no code-level resolution for automatically updating this list outside of major PAN-OS releases nor is there a "feature request" for this.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You can manually import it as a trusted root CA to ensure that your firewall trusts the new Sectigo root certs.&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;There is a FR for this, (which is NSFR-I-21203)...At least I'm told there was and that my company was added to the FR.&amp;nbsp; I'll look for it and share it here.&lt;BR /&gt;&lt;BR /&gt;That said this is something that Palo know about for years and something I've been complaining about to palo for the past 5+ years.&amp;nbsp; It's so bad that a whole repo process was setup to solve this issue Palo has ignored.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/PaloAltoNetworks/pan-chainguard" target="_blank" rel="noopener"&gt;https://github.com/PaloAltoNetworks/pan-chainguard&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is partial good news.&amp;nbsp; In 12.1.2 Palo is trying to solve the missing intermediate cert issue as PAN-OS will attempt to dynamically download missing intermediate certificates (No current solve for roots, other than the code upgrade.)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Automatic Retrieval of Intermediate Certificates Using AIA&lt;/P&gt;
&lt;P&gt;"We introduced a mechanism to fetch intermediate certificates via the AIA extension.&lt;BR /&gt;This mechanism can be toggled on/off by a new Decryption Profile setting: “Automatically Fetch Intermediate Certificates”&lt;BR /&gt;As part of decryption, when we encounter a server certificate with an incomplete chain, and the AIA CA Issuers extension is present (RFC5280), we will attempt to download an Intermediate CA certificate from the specified URL.&lt;BR /&gt;If successful, we cache the intermediate certificate for up to 1 week and use it to validate future traffic."&amp;nbsp; *Caveats: The first session will show untrusted until the intermediate certificate(s) have been fetched*&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note:&lt;/P&gt;
&lt;P&gt;This feature must be enabled on a Decryption Profile (“Automatically Fetch Intermediate Certificates”)&lt;BR /&gt;The intermediate certificate cache itself is only present on firewalls (not Panorama or SCM)&lt;BR /&gt;Panorama and SCM can only enable/disable the feature&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://urldefense.com/v3/__https:/docs.paloaltonetworks.com/ngfw/release-notes/12-1/features-introduced-in-pan-os/decryption-features__;!!No2nNwjO!vCcxQlHcO9ZzmPS6CUBCBH6rMKuobH4tCB36ZMGDV5t9WuHNIiKotMlLH8XMvLFg1rKj7MB206LfaOZehxGASSuRRztA$" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/ngfw/release-notes/12-1/features-introduced-in-pan-os/decryption-features&lt;/A&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Just wanted to relay a bit more information I recently was given.&amp;nbsp; I recently met with a PM over PAN-OS and he shared some things that either are coming or currently exist in the 12.1.2+ code base regarding certificates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a solve coming for root certificates.&amp;nbsp; It was also shared that the existing feature solve for intermediates is also distributed to all other firewalls, in real time, via Panorama (I think SCM as well) when managed by Panorama.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So with these 3 things in place or soon to be I think this issue will be solved for anyone running 12.1.2+&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 12:26:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1249834#M126123</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2026-03-10T12:26:43Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo Root CA Trusted Store Request</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1249835#M126124</link>
      <description>&lt;P&gt;Thank you for all this information&amp;nbsp;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 12:32:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-root-ca-trusted-store-request/m-p/1249835#M126124</guid>
      <dc:creator>L.Yalezo</dc:creator>
      <dc:date>2026-03-10T12:32:19Z</dc:date>
    </item>
  </channel>
</rss>

