<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate chaining with Captive Portal in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47125#M34639</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may need to re-import the Captive Portal certificate (*.aiglon.ch) with the intermediate CA included in the chain. The firewall has the intermediate and it can "see" the full chain, but unless it is configured to send the intermediate with the CP certificate, it will assume the client has that intermediate and not send it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following document was written with two intermediate CAs in mind, but the principle is the same. You would create e hybrid certificate with *.aiglon.ch on top and "GlobalSign Organization Validation CA" below that. You don't need the root ("GlobalSign Root CA") because a client wouldn't trust a root that was sent to it anyway. Here's the doc:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-4289"&gt;How to Install a Chained Certificate Signed by a Public CA&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;&lt;P&gt;Greg Wesson &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Jan 2013 17:42:17 GMT</pubDate>
    <dc:creator>gwesson</dc:creator>
    <dc:date>2013-01-08T17:42:17Z</dc:date>
    <item>
      <title>Certificate chaining with Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47122#M34636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a PA-3020 running PanOS 5.0.0 in L3 deployment. We have just one Private zone and one Public zone for the instance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured a Captive Portal policy on the Private zone gto ensure that all users that are not authenticated by User-ID (users who are not logged in the domain) have to authenticate beffore accessing resources. I have set a Captive Portal redirect policy web-form based, linked with LDAP settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It works fine, users are redirected to the web-form and they can login if they have a login/password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then we have tried to import a certificate on the PaloAlto device in order to avoid the warning message in the browser. We have tried to add the CA root certificate as well as the intermediate certificate. From the PaloALto menu, the chaining seems correct (see certificate_chain.jpg) but the warning is still there in the browser. When we look at the certificate sent by the PaloAlto to the browser, we can see that the chaining is not effective.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, it works fine for the management access : the certificate chain is effective and the certificate is well trusted by the browser. Also it seems that it is only related to the Captive Portal feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also see the Captive Portal settings (captive_portal.jpg).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 13:02:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47122#M34636</guid>
      <dc:creator>ldormond</dc:creator>
      <dc:date>2013-01-08T13:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate chaining with Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47123#M34637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you add a screenshot of the displayed URL when you are reaching your captive Portal Authentication Webpage?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Nicolas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 15:18:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47123#M34637</guid>
      <dc:creator>nbilly</dc:creator>
      <dc:date>2013-01-08T15:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate chaining with Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47124#M34638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Nicolas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are three screenshots : One shows the url when accessing the Captive Portal, the others show the certificate details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarsd&lt;IMG alt="url.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/5051_url.png" width="450" /&gt;&lt;IMG alt="certificate_1.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/5052_certificate_1.png" /&gt;&lt;IMG alt="certificate_2.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/5053_certificate_2.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 16:40:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47124#M34638</guid>
      <dc:creator>ldormond</dc:creator>
      <dc:date>2013-01-08T16:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate chaining with Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47125#M34639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may need to re-import the Captive Portal certificate (*.aiglon.ch) with the intermediate CA included in the chain. The firewall has the intermediate and it can "see" the full chain, but unless it is configured to send the intermediate with the CP certificate, it will assume the client has that intermediate and not send it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following document was written with two intermediate CAs in mind, but the principle is the same. You would create e hybrid certificate with *.aiglon.ch on top and "GlobalSign Organization Validation CA" below that. You don't need the root ("GlobalSign Root CA") because a client wouldn't trust a root that was sent to it anyway. Here's the doc:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-4289"&gt;How to Install a Chained Certificate Signed by a Public CA&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;&lt;P&gt;Greg Wesson &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 17:42:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47125#M34639</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-01-08T17:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate chaining with Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47126#M34640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IMHO we are looking at a browser/ client issue here.&lt;/P&gt;&lt;P&gt;Looks like you are using IE, the issuing CA 'Globalsign Organization Validation CA' needs to be trusted on your client.&lt;/P&gt;&lt;P&gt;Try to import the intermediate CA into the 'Trusted Root Certification Authorities' store on you windows client.&lt;/P&gt;&lt;P&gt;If the error disappears you can distribute the intermediate CA via GPO in your AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 17:43:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47126#M34640</guid>
      <dc:creator>panwmod</dc:creator>
      <dc:date>2013-01-08T17:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate chaining with Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47127#M34641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems that 'Globalsign Organization Validation CA' is not present in windows Trusted Root certificate store.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ulli and Greg's replies are both valid solutions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Nicolas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 20:54:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47127#M34641</guid>
      <dc:creator>nbilly</dc:creator>
      <dc:date>2013-01-08T20:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate chaining with Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47128#M34642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Greg's solution is actually the better on, it doesn't involve 'touching' all clients. Having the 'server' present his own and the intermediate CA allows the 'client' to confirm the authenticity of the server certificate with only having the root in his store. &lt;/P&gt;&lt;P&gt;Using openssl you can easily confirm that your imported cert on the PAN the it is working correctly&lt;/P&gt;&lt;P&gt;&lt;CODE style="font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, serif;"&gt;openssl s_client -CAfile &amp;lt;full path to root cert&amp;gt; -quiet -showcerts -connect &amp;lt;ip or fqdn of PAN&amp;gt;:6082&lt;/CODE&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ulli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 04:39:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47128#M34642</guid>
      <dc:creator>panwmod</dc:creator>
      <dc:date>2013-01-09T04:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate chaining with Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47129#M34643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help and advices but it still doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-GB" style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;I followed this guide and created a joint PEM with the two certs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-GB" style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;I could import this but I am not sure I understand the next part. Before importing that do I need to make a CSR that matches that cert so that I can import it and have the private key.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-GB" style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;If I import without a private key then I obviously can’t use it to sign the captive portal.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-GB" style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;I also have a PFX bundle, that contains all of the certs and also the private key – importing that works and I can assigned it to the management web interface and the captive portal.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-GB" style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;As before the management web interface show no errors and works correctly but the captive portal doesn’t seem to present the intermediate certificate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 10:28:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47129#M34643</guid>
      <dc:creator>ldormond</dc:creator>
      <dc:date>2013-01-10T10:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate chaining with Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47130#M34644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you have the PFX, you can use openSSL to convert the PFX into separate files. Get the private key from that, then you can import the private key and the joint PEM file you created (no need for the CSR then).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 01:53:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47130#M34644</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-01-11T01:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate chaining with Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47131#M34645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you do is merge the certificate and the CA into one cert and upload.&amp;nbsp; Palo Alto will not join the chain together for you.&amp;nbsp; You need to join the certificates yourself then upload.&amp;nbsp; The Panorama will strip the second certificate, so you will need to upload locally.&amp;nbsp; Took a bit of time but again, works nicely.&amp;nbsp; So do something like....&lt;/P&gt;&lt;P&gt;cat mycert.crt myCA.crt &amp;gt; mycertchain.pem.&amp;nbsp; Then upload that with the key.&amp;nbsp; This works.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Aug 2013 02:29:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certificate-chaining-with-captive-portal/m-p/47131#M34645</guid>
      <dc:creator>Colgonics</dc:creator>
      <dc:date>2013-08-11T02:29:30Z</dc:date>
    </item>
  </channel>
</rss>

