<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: &amp;quot;Client cert is invalid to the gateway&amp;quot; error in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/quot-client-cert-is-invalid-to-the-gateway-quot-error/m-p/134328#M47332</link>
    <description>&lt;P&gt;So I got this to work while troubleshooting a more difficult scenario (trying AD CA). I am on 7.0.11.&lt;/P&gt;&lt;P&gt;I don't recall exactly the settings, but I do know, in your Cert Profile, Username Field should be None.&lt;/P&gt;&lt;P&gt;7.0.11 does not have that exact setting&amp;nbsp;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN&gt;Block session if the certificate was not issued to the authenticating device". There are two other similar boxes but I did not need to check those for it to work. When done right, it only allows machines who pass the cert check to authenticate and everyone else is denied, so I doubt you need that setting.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Everything else sounds right. Is the captive portal log related to VPN and if so, is that intentional?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Dec 2016 19:28:05 GMT</pubDate>
    <dc:creator>cnluke</dc:creator>
    <dc:date>2016-12-22T19:28:05Z</dc:date>
    <item>
      <title>"Client cert is invalid to the gateway" error</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-client-cert-is-invalid-to-the-gateway-quot-error/m-p/133101#M47165</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to setup machine cert authentication, but it appears I am missing something. Local user auth works fine without certificates. Gateway and Portal are on a single 3020 with 7.1.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created a local-CA and generated a cert for all windows 7 machines.&lt;/P&gt;&lt;P&gt;I imported this cert into the Local Computer personal stores on the windows 7 computer (two of them).&lt;/P&gt;&lt;P&gt;I created a cert profile referencing the local-CA.&lt;/P&gt;&lt;P&gt;I have tried the username settings of "None" or "Subject" but not sure how this fits in (neither work)&lt;/P&gt;&lt;P&gt;I attached the cert profile to the gateway auth config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the cert profile there is a setting:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;Block session if the certificate was not issued to the authenticating device"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I leave this unchecked, the user connects. If I check this the user cannot connect and I get this message:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(T1532) 12/15/16 08:44:56:995 Debug(1049): Client cert is invalid to the gateway x.x.x.x&lt;BR /&gt;(T1532) 12/15/16 08:44:56:995 Debug(2816): Login to gateway x.x.x.x without ipv6&lt;BR /&gt;(T1532) 12/15/16 08:44:56:995 Debug(3270): portal/gateway pre-login is done!&lt;BR /&gt;(T1532) 12/15/16 08:44:56:995 Debug(7645): StopCaptivePortalDetection() captive portal detection is in progress&lt;BR /&gt;(T1532) 12/15/16 08:44:56:996 Debug(2846): REGION-PRIO, gateway region code is&lt;BR /&gt;(T1532) 12/15/16 08:44:56:996 Debug(2849): REGION-PRIO, this is old gateway, so we ignore the re-discover checking&lt;BR /&gt;(T1532) 12/15/16 08:44:56:996 Debug(2966): prelogin status is Error&lt;BR /&gt;(T1532) 12/15/16 08:44:56:996 Error(2969): pre-login error message: Invalid client certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am assuming I need to check the box in order to prevent devices without the cert to be able to login.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What am I missing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bryan&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2016 17:13:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-client-cert-is-invalid-to-the-gateway-quot-error/m-p/133101#M47165</guid>
      <dc:creator>BBartik</dc:creator>
      <dc:date>2016-12-15T17:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: "Client cert is invalid to the gateway" error</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-client-cert-is-invalid-to-the-gateway-quot-error/m-p/134328#M47332</link>
      <description>&lt;P&gt;So I got this to work while troubleshooting a more difficult scenario (trying AD CA). I am on 7.0.11.&lt;/P&gt;&lt;P&gt;I don't recall exactly the settings, but I do know, in your Cert Profile, Username Field should be None.&lt;/P&gt;&lt;P&gt;7.0.11 does not have that exact setting&amp;nbsp;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN&gt;Block session if the certificate was not issued to the authenticating device". There are two other similar boxes but I did not need to check those for it to work. When done right, it only allows machines who pass the cert check to authenticate and everyone else is denied, so I doubt you need that setting.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Everything else sounds right. Is the captive portal log related to VPN and if so, is that intentional?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 19:28:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-client-cert-is-invalid-to-the-gateway-quot-error/m-p/134328#M47332</guid>
      <dc:creator>cnluke</dc:creator>
      <dc:date>2016-12-22T19:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: "Client cert is invalid to the gateway" error</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-client-cert-is-invalid-to-the-gateway-quot-error/m-p/134491#M47348</link>
      <description>&lt;P&gt;Apparently I was not supposed to check that box. That box is only if you are validating the cert belongs to that machine. I was using a shared certificate model. This is from support:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- When you check the following option under the Certificate Profile "Block session if the certificate was not issued to the authenticating device/machine".&lt;BR /&gt;- The host id for the client certificate is validated, if this is not present in the client certificate it would not connect to the Global Protect.&lt;BR /&gt;- The HostID depends on the operating it varies by device type, either GUID (Windows) MAC address of the interface (Mac), Android ID (Android devices), UDID (iOS devices), or a unique name that GlobalProtect assigns (Chrome).&lt;BR /&gt;-For windows machine it has to be GUID , below is the link I found on internet to find the GUID of a windows machine.&lt;BR /&gt;&amp;gt;&lt;A href="https://www.puryear-it.com/find-global-unique-identifier-guid-windows-program" target="_blank"&gt;https://www.puryear-it.com/find-global-unique-identifier-guid-windows-program&lt;/A&gt;&lt;BR /&gt;- The hostID including GUID should be specified in the Common Name field.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Dec 2016 01:15:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-client-cert-is-invalid-to-the-gateway-quot-error/m-p/134491#M47348</guid>
      <dc:creator>BBartik</dc:creator>
      <dc:date>2016-12-24T01:15:46Z</dc:date>
    </item>
  </channel>
</rss>

