<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Foward Trust Cert and MacBook Pro in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/foward-trust-cert-and-macbook-pro/m-p/1252669#M126315</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112791941"&gt;@M.Sullivan271926&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;What did you use to generate your forward trust certificate, just the firewall itself? What did you use for your cryptography settings when you generated the certificate? macOS doesn't have extremely unique requirements for trusting a CA outside of ensuring that it's set to always trusted within Keychain.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Apr 2026 15:50:27 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2026-04-21T15:50:27Z</dc:date>
    <item>
      <title>Foward Trust Cert and MacBook Pro</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/foward-trust-cert-and-macbook-pro/m-p/1252666#M126314</link>
      <description>&lt;P&gt;I have a problem with my PAN generated FTC when used by MacBook Pro.&amp;nbsp; My PANOS is 11.2.10-h3 and the test MBP is Sonoma 14.8.4.&lt;/P&gt;
&lt;P&gt;The FTC is loaded on the System Key Chain and is set to "Always Trust".&amp;nbsp; The x509 basic constraints CA is TRUE as inspected on the MBP.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yet when I browse a site with a decryption policy, the resulting cert from the FTC is not trusted.&lt;/P&gt;
&lt;P&gt;Of course, the Windows clients work fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is anyone using the FTC on a modern MBP?&amp;nbsp; How did you setup the FTC?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for any insights you have.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 14:52:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/foward-trust-cert-and-macbook-pro/m-p/1252666#M126314</guid>
      <dc:creator>M.Sullivan271926</dc:creator>
      <dc:date>2026-04-21T14:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Foward Trust Cert and MacBook Pro</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/foward-trust-cert-and-macbook-pro/m-p/1252669#M126315</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112791941"&gt;@M.Sullivan271926&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;What did you use to generate your forward trust certificate, just the firewall itself? What did you use for your cryptography settings when you generated the certificate? macOS doesn't have extremely unique requirements for trusting a CA outside of ensuring that it's set to always trusted within Keychain.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 15:50:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/foward-trust-cert-and-macbook-pro/m-p/1252669#M126315</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2026-04-21T15:50:27Z</dc:date>
    </item>
    <item>
      <title>Re: Foward Trust Cert and MacBook Pro</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/foward-trust-cert-and-macbook-pro/m-p/1252675#M126316</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the reply.&amp;nbsp; I used the FW to generate the cert. default crypto settings.&amp;nbsp; I'm getting ready to test another cert.&amp;nbsp; I used openssl to include the CRL Sign key usage along with the normal CA constraints.&amp;nbsp; I saw somewhere that new MacOS versions wanted the CRL attribute in order to work.&amp;nbsp; Anyway, I'll be testing it in a few minutes...&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 18:37:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/foward-trust-cert-and-macbook-pro/m-p/1252675#M126316</guid>
      <dc:creator>M.Sullivan271926</dc:creator>
      <dc:date>2026-04-21T18:37:25Z</dc:date>
    </item>
    <item>
      <title>Re: Foward Trust Cert and MacBook Pro</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/foward-trust-cert-and-macbook-pro/m-p/1252678#M126317</link>
      <description>&lt;P&gt;I setup a new cert and made sure to set these attributes (in the conf file using openssl):&lt;BR /&gt;basicConstraints = critical, CA:true&lt;BR /&gt;keyUsage = critical, keyCertSign, CRLSign&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm happy to say that the Mac clients are now happy.&amp;nbsp; I dont know when this changed, but the modern MacOS seems to want the crl sign attribute assigned.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 20:53:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/foward-trust-cert-and-macbook-pro/m-p/1252678#M126317</guid>
      <dc:creator>M.Sullivan271926</dc:creator>
      <dc:date>2026-04-21T20:53:12Z</dc:date>
    </item>
  </channel>
</rss>

