<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL inspection with Java applications in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-with-java-applications/m-p/255808#M72551</link>
    <description>&lt;P&gt;Thanks for the info.&amp;nbsp; I am still playing around with this but it is not the script breaking that we are worried about it is having to re-run the script when updates are installed.&lt;/P&gt;</description>
    <pubDate>Tue, 02 Apr 2019 20:29:59 GMT</pubDate>
    <dc:creator>DIRTT</dc:creator>
    <dc:date>2019-04-02T20:29:59Z</dc:date>
    <item>
      <title>SSL inspection with Java applications</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-with-java-applications/m-p/255643#M72519</link>
      <description>&lt;P&gt;I have found that Java appears to use it's own certificate store which is causing me grief.&amp;nbsp; Work around is to install our root CA within the Java control panel but this is not efficient for a large organization.&amp;nbsp; Has anyone found a way to push root CA's to Java through GPO's or make Java use the Windows certificate store using GPO's?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a script right now that will import the cert, but our issue is going to come when the next major release of Java comes and everything will break again.&amp;nbsp; Just looking for an automated way of doing things.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 17:22:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-with-java-applications/m-p/255643#M72519</guid>
      <dc:creator>DIRTT</dc:creator>
      <dc:date>2019-04-01T17:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection with Java applications</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-with-java-applications/m-p/255706#M72531</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/61922"&gt;@DIRTT&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The official way of doing this would be to set your own truststore&amp;nbsp;if you don't want to use the default. The quick way would be to start Java with&amp;nbsp;&lt;SPAN&gt;-Djavax.net.ssl.trustStoreType=WINDOWS-ROOT. In short, however, this is something that Java really isn't designed to do. If this is something that you have an in-house Java application you need to have your developers include a custom keystore&amp;nbsp;in the application and utilize that keystore&amp;nbsp;for the application itself.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Just to put your mind at ease, however, I highly doubt that any script you make right now would break during the next major release of Java.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2019 03:27:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-with-java-applications/m-p/255706#M72531</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-04-02T03:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection with Java applications</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-with-java-applications/m-p/255808#M72551</link>
      <description>&lt;P&gt;Thanks for the info.&amp;nbsp; I am still playing around with this but it is not the script breaking that we are worried about it is having to re-run the script when updates are installed.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2019 20:29:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-with-java-applications/m-p/255808#M72551</guid>
      <dc:creator>DIRTT</dc:creator>
      <dc:date>2019-04-02T20:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection with Java applications</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-with-java-applications/m-p/255903#M72578</link>
      <description>&lt;P&gt;So I did some testing and found that the script works.&amp;nbsp; Once you do a Java upgrade it uses a new cert store again, so the script has to be ran once again.&amp;nbsp; This is a pain in the&amp;nbsp;@$$ but I guess it is the best that I am going to get for now without restricting the version of Java on our user's systems.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 14:46:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-with-java-applications/m-p/255903#M72578</guid>
      <dc:creator>DIRTT</dc:creator>
      <dc:date>2019-04-03T14:46:33Z</dc:date>
    </item>
  </channel>
</rss>

