<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to configure per-client certs on GlobalProtect? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/220212#M63543</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt;&amp;nbsp;I tested your very question out on the previous page. All I got to work was having the CN match the username.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alternatively, you can run a patched version of openconnect, which doesn't enforce username matching.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://github.com/dlenski/openconnect" target="_blank"&gt;https://github.com/dlenski/openconnect&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caveat: in my opinion, that GP is relying on the client to enforce an InfoSec rule is a bug. After some run-around, Palo Alto agreed that this was a bug, so they might fix it one day if they haven't already.&lt;/P&gt;</description>
    <pubDate>Mon, 02 Jul 2018 17:58:24 GMT</pubDate>
    <dc:creator>dannyman</dc:creator>
    <dc:date>2018-07-02T17:58:24Z</dc:date>
    <item>
      <title>How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186737#M56923</link>
      <description>&lt;P&gt;NOTE: the freeware pfsense firewall can configure a working VPN with user passwords and user certs (2FA) inside of 20 MINUTES. With Palo Alto Networks, I'm on WEEK 6.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where I am at:&lt;BR /&gt;1) I have GlobalProtect working with password auth. (Had to call&amp;nbsp;tech support, who knew what steps were missing from the documentation.)&lt;BR /&gt;2) I want to have 2FA: so, I spun up a CA (easy-rsa) to provide a CA cert, and generate per-user certs. (pfSense will just do this for you in the GUI, but I did the process described here: &lt;A href="https://openvpn.net/index.php/open-source/documentation/howto.html#pki" target="_self"&gt;https://openvpn.net/index.php/open-source/documentation/howto.html#pki&lt;/A&gt;)&lt;BR /&gt;3) I can get password + cert working with the unsupported Linux client. (&lt;A href="https://github.com/dlenski/openconnect" target="_self"&gt;https://github.com/dlenski/openconnect&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;4) I can get password + cert working with the unsupported Linux client, using either &lt;EM&gt;my&lt;/EM&gt; personal cert, or &lt;EM&gt;another user's&lt;/EM&gt; personal cert. (WTF?)&lt;BR /&gt;5) We have tried and tried and tried again to "import" a personal cert on MacOS but anywhere we import a cert with the&amp;nbsp;"Keychain Access" app GlobalProtect comes back with the same error:&amp;nbsp;&lt;SPAN&gt;"The client certificate to establish the GlobalProtect connection was not found."&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Our client certs have Subject fields that look like this:&lt;BR /&gt;User=user1:&lt;BR /&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;Subject: C=US, ST=CA, L=Menlo Park, O=Quantifind, OU=Ops, CN=&lt;STRONG&gt;user1&lt;/STRONG&gt;/name=VPN/emailAddress=ops@example.com&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;User=user2:&lt;BR /&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;Subject: C=US, ST=CA, L=Menlo Park, O=Quantifind, OU=Ops, CN=&lt;STRONG&gt;user2&lt;/STRONG&gt;/name=VPN/emailAddress=ops@example.com&lt;/FONT&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Questions:&lt;BR /&gt;A) How in the name of all that is good do you get a user cert imported on MacOS?&lt;BR /&gt;B) My Certificate Profile is configured for Username Field: Subject (common-name) ... what &lt;EM&gt;should&lt;/EM&gt; I have in there?&lt;BR /&gt;C) Or, are my cert Subject's in a form that won't work for GlobalProtect: what &lt;EM&gt;should&lt;/EM&gt;&amp;nbsp;they look like?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-danny&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2017 18:46:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186737#M56923</guid>
      <dc:creator>dannyman</dc:creator>
      <dc:date>2017-11-13T18:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186767#M56930</link>
      <description>&lt;P&gt;Some progress, maybe:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the Gateway config, on the Agent tab, there's an option to add a Trusted Root CA and check "Install in Local Root Certificate Store" which seems to help convince the Mac Keychain Access app that the certificate I am supplying is legit.&lt;BR /&gt;&lt;BR /&gt;Per &lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/GlobalProtect-Dual-Factor-Authentication-with-Client-Certificate/ta-p/66167" target="_self"&gt;this article&lt;/A&gt;, the CN needs to match the Gateway, so my certs now read:&lt;BR /&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;Subject: C=US, ST=CA, L=Menlo Park, O=Quantifind, OU=Ops, CN=vpn.example.com/name=user1/emailAddress=user1@example.com&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;The client error now reads:&lt;/FONT&gt;&lt;BR /&gt;Ganteway&amp;nbsp;VPN-MTV: No valid certificate found. Please contact your IT administrator.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2017 20:38:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186767#M56930</guid>
      <dc:creator>dannyman</dc:creator>
      <dc:date>2017-11-13T20:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186781#M56932</link>
      <description>&lt;P&gt;I dug up the GlobalProtect logs on the client and found a message that the SSL service profile on the gateway was different from the root CA I was pushing from the portal. This is true, as it was using our comodo cert. I created a new cert for the gateway which is signed by my local CA, and did up a new SSL service profile, and now that error is gone. I can load any number of certificates onto the client Mac OS that are viewed as valid because they are signed by my CA. However, none of them ever get picked up by the GlobalConnect client and all I ever get on the Mac is a gateway error: &lt;STRONG&gt;No valid certificate found.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, I'm stuck back where I have been.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2017 23:15:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186781#M56932</guid>
      <dc:creator>dannyman</dc:creator>
      <dc:date>2017-11-13T23:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186866#M56949</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/68164"&gt;@dannyman&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure how using username and password plus user cert works on the PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we do have Mac's and IPads connecting with the above but have username/password&amp;nbsp; plus a device cert, not a user specific cert.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the certificate profile "username field" is set to "none".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;going back a few years we did have issues trying to mix with both,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it may be just trying to set the cert profile to "none" to see if you still get the error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;are you only getting the errors on the gateways and not the portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 10:13:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186866#M56949</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-14T10:13:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186952#M56960</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;yes if I Certificate Profile == None then I can LDAP Auth just fine.&lt;BR /&gt;&lt;BR /&gt;Maybe the way to do this is to try turning off LDAP Auth and see if I can get Cert Auth working on its own, then turn LDAP back on.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 18:01:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186952#M56960</guid>
      <dc:creator>dannyman</dc:creator>
      <dc:date>2017-11-14T18:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186978#M56966</link>
      <description>&lt;P&gt;What i meant was not set cert profile to none but go into the cert profile and Change the&amp;nbsp;"username field" &amp;nbsp;to "none". Instead of common name etc....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you may have done this and i misunderstood previous post&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 19:05:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/186978#M56966</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-14T19:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/187016#M56971</link>
      <description>&lt;P&gt;Oh yeah, I have tried that and just tried again. Even with Username none, the Mac client cannot find a certificate. The only way to get this working is to disable Certificate Profile. I have yet found no circumstances under which the Mac client finds a certificate which it will try to use with the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Linux openconnect will, of course, use any signed cert you pass to it on the command line, and if username is configured in the Certificate Profile, any certificate with or without a matching username will be accepted.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 21:33:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/187016#M56971</guid>
      <dc:creator>dannyman</dc:creator>
      <dc:date>2017-11-14T21:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/187021#M56975</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Q: How do I get the certificate to be read by the GlobalProtect client on MacOS?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;A: The key will only be used by Mac GlobalProtect client IF CN=&lt;EM&gt;&amp;lt;IP address of the gateway&amp;gt;&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;A: Import the key to the system using PKCS12 instead of PEM. (&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/Certificate-config-for-GlobalProtect-SSL-TLS-Client-cert/ta-p/131592" target="_self"&gt;Source&lt;/A&gt;: Step C)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my case:&lt;BR /&gt;&lt;FONT face="andale mono,times"&gt;openssl pkcs12 -export -out user.pfx -inkey user.key -in user.crt -certfile ca.crt&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;One problem down .&amp;nbsp;. .&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 23:30:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/187021#M56975</guid>
      <dc:creator>dannyman</dc:creator>
      <dc:date>2017-11-14T23:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/187029#M56977</link>
      <description>&lt;P&gt;To better understand how this work, I have disabled LDAP Auth on the GW. Given a key like this:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT face="andale mono,times"&gt;Subject: C=US, ST=CA, L=Menlo Park, O=Quantifind, OU=Ops, CN=65.50.203.123/name=user1/emailAddress=user1@example.com&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IF Certificate Profile Username: Subject (common-name), THEN user is listed as the IP address in the CN.&lt;BR /&gt;&lt;SPAN&gt;IF Certificate Profile Username: Subject Alt (Email), THEN user is listed as the IP address in the CN.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;IF Certificate Profile Username: Subject Alt (Principal Name), THEN user is listed as the IP address in the CN.&lt;BR /&gt;IF I delete the key from the client and import one with a different CN, THEN&amp;nbsp;user is listed as the IP address in the previous CN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I figured out the "GlobalConnect Service" is still running between tests, so now when testing I reboot the Mac between tests. (This is faster than the PAN Commit process.) At this point, I can not replicate connect-with-certificate-only.&lt;BR /&gt;&lt;BR /&gt;I suspect that the best PAN might support is user password auth plus valid certificate that does not map to a user.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 23:58:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/187029#M56977</guid>
      <dc:creator>dannyman</dc:creator>
      <dc:date>2017-11-14T23:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/187055#M56980</link>
      <description>&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;PALO ALTO NETWORKS SECURITY VULNERABILITY: GlobalProtect 2FA password + certificate does not verify that certificate matches user&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;Reboot-between-experiments ... load up a virgin System ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Certificate Profile &amp;gt; Username Field: Subject&lt;/P&gt;&lt;P&gt;Gateways &amp;gt; Authentication &amp;gt; Client Authentication &lt;EM&gt;*none*&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;User key like this:&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="andale mono,times" size="2"&gt;Subject: C=US, ST=CA, L=Menlo Park, O=Quantifind, OU=Ops, CN=&lt;STRONG&gt;djh&lt;/STRONG&gt;/name=Daniel Howard/emailAddress=djh@example.com&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mac GlobalProtect will load the key in PKCS12 format.&lt;BR /&gt;User shows up as &lt;STRONG&gt;&lt;FONT face="andale mono,times"&gt;djh&lt;/FONT&gt;&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Certificate Profile &amp;gt; Username Field: Subject&lt;/P&gt;&lt;P&gt;Gateways &amp;gt; Authentication &amp;gt; Client Authentication&amp;nbsp;&lt;I&gt;*LDAP*&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mac GlobalProtect will only let me log in as the user in the CN on the certificate.&lt;/P&gt;&lt;P&gt;This achieves 2FA:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;User needs to &lt;EM&gt;have&lt;/EM&gt;&amp;nbsp;their SSL cert.&lt;/LI&gt;&lt;LI&gt;User needs to &lt;EM&gt;know&lt;/EM&gt; their password.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the unsupported Linux openconnect client, I can log in with &lt;EM&gt;any&lt;/EM&gt; signed cert. There is no server-side enforcement that the user matches the certificate. This is a surprising vulnerability in a security product: that we rely on a &lt;EM&gt;client&lt;/EM&gt; to enforce the server's authentication credentials.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2017 19:41:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/187055#M56980</guid>
      <dc:creator>dannyman</dc:creator>
      <dc:date>2017-11-15T19:41:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/187133#M56987</link>
      <description>&lt;P&gt;you have been busy,,, nice one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;prepare to hit a wall.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if using client auth profile you will need to set cert profile username field to none....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;however... not sure what would happen if cn in cert is the same as the ldap username.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to ask.... do you need this to work.&amp;nbsp;seems a bit odd identifying the user name twice...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i would have thought that ldap + device cert would suffice.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2017 08:42:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/187133#M56987</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-15T08:42:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/220116#M63513</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/68164"&gt;@dannyman&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I see that you succesfully setup user auth with client certificates and LDAP, where username matches LDAP login. I succeeded in that as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you do any testing with Subject Alt - Email? because I have situation where I can't control CA and can't put LDAP usernames in certificate subject. However each certificate has email in subject alternative name attribute. But no matter what i select, PA keeps using subject field as username. Tested on 8.0.8 and 8.0.10.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jul 2018 08:30:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/220116#M63513</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2018-07-02T08:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/220212#M63543</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt;&amp;nbsp;I tested your very question out on the previous page. All I got to work was having the CN match the username.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alternatively, you can run a patched version of openconnect, which doesn't enforce username matching.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://github.com/dlenski/openconnect" target="_blank"&gt;https://github.com/dlenski/openconnect&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caveat: in my opinion, that GP is relying on the client to enforce an InfoSec rule is a bug. After some run-around, Palo Alto agreed that this was a bug, so they might fix it one day if they haven't already.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jul 2018 17:58:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/220212#M63543</guid>
      <dc:creator>dannyman</dc:creator>
      <dc:date>2018-07-02T17:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/220296#M63560</link>
      <description>&lt;P&gt;Ok ty. Seems it is a bug then. But I would hope they would fix it since November. Especially as it seems to me&amp;nbsp;they only need to read different field from cert.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll open a case to see if any progress has been made on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jul 2018 06:55:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/220296#M63560</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2018-07-03T06:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure per-client certs on GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/522488#M108245</link>
      <description>&lt;P&gt;Exactly the same behavior in 2022 with PAN-OS 10.1.6-h6.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Something that I find strange is that I do not need to upload the certificate of the client/machine to the FW&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 14:40:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-per-client-certs-on-globalprotect/m-p/522488#M108245</guid>
      <dc:creator>Guillermo1234</dc:creator>
      <dc:date>2022-11-27T14:40:02Z</dc:date>
    </item>
  </channel>
</rss>

