<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using client certificates with an authentication sequence for Global Protect in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/using-client-certificates-with-an-authentication-sequence-for/m-p/36106#M26535</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Chadd,&lt;BR /&gt;I was misinformed on my user cert requirement.&amp;nbsp; We are using machine certs, not user certs.&amp;nbsp; Using machine certs everything works as expected whether I'm using an AD account or a local account on the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Nov 2013 17:51:50 GMT</pubDate>
    <dc:creator>dan731028</dc:creator>
    <dc:date>2013-11-11T17:51:50Z</dc:date>
    <item>
      <title>Using client certificates with an authentication sequence for Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-client-certificates-with-an-authentication-sequence-for/m-p/36104#M26533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Is it possible to use client certificates for both AD and local users for global protect?&amp;nbsp; I have a working authentication sequence, but have a requirement to use client certs.&amp;nbsp; If it is possible, would it be better to generate the certificates from the domain microsoft CA or could I generate them on the PAN device?&amp;nbsp; I would prefer to use client certs generated by a self-signed root ca on the PAN because I would rather push out the root CA from the PAN to both my domain and non-domain users, than push my domain root CA cert to the non-domain local users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Nov 2013 23:50:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-client-certificates-with-an-authentication-sequence-for/m-p/36104#M26533</guid>
      <dc:creator>dan731028</dc:creator>
      <dc:date>2013-11-06T23:50:17Z</dc:date>
    </item>
    <item>
      <title>Re: Using client certificates with an authentication sequence for Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-client-certificates-with-an-authentication-sequence-for/m-p/36105#M26534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Daniel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use client certificates in both situations.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do not need to push your root CA to the clients though.&amp;nbsp; What you can do is upload the CA public key to the firewall, and use that in a "Certificate Profile".&amp;nbsp; Then, you will just issue (sign) cerficates for your clients from the Microsoft server, and push them to your clients via a GPO.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also have one client (machine) certifcation for all your clients and configure that as the "client certificate" on your portal and then give that same certificate to all your clients (GPO maybe).&amp;nbsp; Then that certificate will be checked against the one configured on the firewall to make sure they are the same cert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a third way as well, which would allow you to upload the public key (CA) to your firewall, and have that pushed out to all your clients, so that it is in their trusted root store.&amp;nbsp; That way, they don't get the nag message about a bad cert.&amp;nbsp; This is not needed though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-chadd.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Nov 2013 00:32:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-client-certificates-with-an-authentication-sequence-for/m-p/36105#M26534</guid>
      <dc:creator>cchristiansen</dc:creator>
      <dc:date>2013-11-07T00:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: Using client certificates with an authentication sequence for Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-client-certificates-with-an-authentication-sequence-for/m-p/36106#M26535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Chadd,&lt;BR /&gt;I was misinformed on my user cert requirement.&amp;nbsp; We are using machine certs, not user certs.&amp;nbsp; Using machine certs everything works as expected whether I'm using an AD account or a local account on the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Nov 2013 17:51:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-client-certificates-with-an-authentication-sequence-for/m-p/36106#M26535</guid>
      <dc:creator>dan731028</dc:creator>
      <dc:date>2013-11-11T17:51:50Z</dc:date>
    </item>
  </channel>
</rss>

