<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate : standard, extended validation, wildcard, subject alternative name in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-standard-extended-validation-wildcard-subject/m-p/32456#M23788</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume you are talking about inbound SSL inspection and the OWA server sits behind the Palo Alto Network's firewall. In order to decrypt the inbound SSL traffic, the private key and certificate is also installed on the firewall in which case all those SSL certificate types should work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Jan 2012 01:32:44 GMT</pubDate>
    <dc:creator>schiang1</dc:creator>
    <dc:date>2012-01-24T01:32:44Z</dc:date>
    <item>
      <title>Certificate : standard, extended validation, wildcard, subject alternative name</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-standard-extended-validation-wildcard-subject/m-p/32455#M23787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="text-align: -webkit-auto;"&gt;&lt;SPAN&gt;OWA (Exchange 2007) needs SAN (Subject Alternative Name) certificates (&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.digicert.com/ssl-support/exchange-2007-san-names.htm"&gt;http://www.digicert.com/ssl-support/exchange-2007-san-names.htm&lt;/A&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="text-align: -webkit-auto;"&gt; &lt;/DIV&gt;&lt;DIV style="text-align: -webkit-auto;"&gt;This type of certificate is supported by the Palo Alto for SSL inspection?&lt;/DIV&gt;&lt;DIV style="text-align: -webkit-auto;"&gt; &lt;/DIV&gt;&lt;DIV style="text-align: -webkit-auto;"&gt;What type of certificate are supported by Palo Alto (standard, extended validation, wildcard, SAN)?&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 17:57:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-standard-extended-validation-wildcard-subject/m-p/32455#M23787</guid>
      <dc:creator>paloalto.nis</dc:creator>
      <dc:date>2012-01-10T17:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate : standard, extended validation, wildcard, subject alternative name</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-standard-extended-validation-wildcard-subject/m-p/32456#M23788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume you are talking about inbound SSL inspection and the OWA server sits behind the Palo Alto Network's firewall. In order to decrypt the inbound SSL traffic, the private key and certificate is also installed on the firewall in which case all those SSL certificate types should work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 01:32:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-standard-extended-validation-wildcard-subject/m-p/32456#M23788</guid>
      <dc:creator>schiang1</dc:creator>
      <dc:date>2012-01-24T01:32:44Z</dc:date>
    </item>
  </channel>
</rss>

