<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Feature Request: Do Not Require Machine Certs to be Imported on the Firewall in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/feature-request-do-not-require-machine-certs-to-be-imported-on/m-p/254622#M72261</link>
    <description>&lt;P&gt;To confirm, as posted by&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;and your own suspicions.... &amp;nbsp;this does work so yes i would imagine its a PKI issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i was gong to suggest check subject names etc in cert profile but if it works with self signed on palo then seems you have all this covered....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;could it be worth just checking that your PKI is rolling out client auth certs and not server certs... probably sucking eggs but the kind of thing that catches me out now and again...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 22 Mar 2019 07:10:38 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2019-03-22T07:10:38Z</dc:date>
    <item>
      <title>Feature Request: Do Not Require Machine Certs to be Imported on the Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/feature-request-do-not-require-machine-certs-to-be-imported-on/m-p/254542#M72240</link>
      <description>&lt;P&gt;For some background: We recently impelmented a data protection strategy within our organization and would like to restrict the Global Protect remote access VPN service only to domain-joined laptops.&amp;nbsp; Since all our endpoints within our environment receive a machine certificate signed by our Internal PKI Root CA, we wanted to leverage those certificates to validate domain membership.&amp;nbsp; I have our Trusted Root CA certificate (and key) imported on the firewall and leveraged that in a Certificate Profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After a failed implementation and a 4-hour support call with Palo, TAC determined that either A) the certificates need to be&amp;nbsp;&lt;EM&gt;generated&lt;/EM&gt; on the firewall or B) the machine certificates (all of them) need to be imported into the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For obvious reasons, managing all our domain's machine certificates for external laptops on the firewall is not feasible.&amp;nbsp; We've explored implementing a SCEP server in the past, but had nothing but issues.&amp;nbsp; This leaves us with generating the Root CA and generic machine certificate on the firewall and then having to deploy those to all the endpoints, rather than using existing certificates that are machine-specific.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It would be helpful if Palo Alto leveraged the benefits of PKI and a chain of trust and only required the Root CA certificate to be on the firewall and approve any certificates signed by it.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 18:09:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/feature-request-do-not-require-machine-certs-to-be-imported-on/m-p/254542#M72240</guid>
      <dc:creator>tszafalowicz</dc:creator>
      <dc:date>2019-03-21T18:09:41Z</dc:date>
    </item>
    <item>
      <title>Re: Feature Request: Do Not Require Machine Certs to be Imported on the Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/feature-request-do-not-require-machine-certs-to-be-imported-on/m-p/254550#M72241</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/109267"&gt;@tszafalowicz&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/109267"&gt;@tszafalowicz&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I have our Trusted Root CA certificate (and key) imported on the firewall and leveraged that inAfter a failed implementation and a 4-hour support call with Palo, TAC determined that either A) the certificates need to be&amp;nbsp;&lt;EM&gt;generated&lt;/EM&gt; on the firewall or B) the machine certificates (all of them) need to be imported into the firewall.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Wait? ... What???&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;If this is what TAC told you then this is A) totally wrong or B) I don't understand what you are trying to do.&lt;/P&gt;&lt;P&gt;I can only speak about what I have done since years: I have never even imported a private key for global protect client cert authentication. For this only the cert is needed and this works for me since years. Our certs are managed by an internal PKI (not on a PaloAlto firewall) - probably like yours.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are there some special requirements in your infrastructure with these certificates? As I wrote, normally this works like you have described it and is also how it is supposed to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS: Feature Request need to be created by telling this to your SE. Here kn the community you cannot ask for feature requests.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 19:29:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/feature-request-do-not-require-machine-certs-to-be-imported-on/m-p/254550#M72241</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2019-03-21T19:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: Feature Request: Do Not Require Machine Certs to be Imported on the Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/feature-request-do-not-require-machine-certs-to-be-imported-on/m-p/254559#M72246</link>
      <description>&lt;P&gt;Hi Remo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your feedback and input!&amp;nbsp; "Wait? ... What?" was my exact reaction when I was informed that by TAC.&amp;nbsp; I did also immediately reach out to our SE after the implementation failed and got off the phone with TAC.&amp;nbsp; He was stumped as well and he was under the impression our implementation strategy would work, just like me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No advanced use case here; just simply looking for a certificate that is signed by our internal PKI CA.&amp;nbsp; If the certificate is found, we can safely assume that the endpoint is a domain-joined asset and allow it access to connect to the GlobalProtect Gateway.&amp;nbsp; No certificate, no access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interestingly enough, when I generate the certificates on the firewall, specify the CA certificate in a certificate profile and test like this, it works as you would expect it to work with our own certificates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So maybe the issue is with our own PKI?&amp;nbsp; Still stumped with this one.&amp;nbsp; TAC did inspect the certificates we were trying to use for this while on the call and determined they are valid as well.&amp;nbsp; Confused on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Troy&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 20:53:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/feature-request-do-not-require-machine-certs-to-be-imported-on/m-p/254559#M72246</guid>
      <dc:creator>tszafalowicz</dc:creator>
      <dc:date>2019-03-21T20:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: Feature Request: Do Not Require Machine Certs to be Imported on the Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/feature-request-do-not-require-machine-certs-to-be-imported-on/m-p/254622#M72261</link>
      <description>&lt;P&gt;To confirm, as posted by&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;and your own suspicions.... &amp;nbsp;this does work so yes i would imagine its a PKI issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i was gong to suggest check subject names etc in cert profile but if it works with self signed on palo then seems you have all this covered....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;could it be worth just checking that your PKI is rolling out client auth certs and not server certs... probably sucking eggs but the kind of thing that catches me out now and again...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 07:10:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/feature-request-do-not-require-machine-certs-to-be-imported-on/m-p/254622#M72261</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-03-22T07:10:38Z</dc:date>
    </item>
  </channel>
</rss>

