<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Certificates from enterprise CA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-from-enterprise-ca/m-p/268840#M74576</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;This is the article you will need to follow for the management interface certificate:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSxCAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSxCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the SSL decryption, you'll need a Subordinate CA certificate so it can generate certs on the fly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Blogs/Generating-Certificates-from-CSR-for-Decryption/ba-p/171008" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Blogs/Generating-Certificates-from-CSR-for-Decryption/ba-p/171008&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jun 2019 16:33:14 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2019-06-11T16:33:14Z</dc:date>
    <item>
      <title>SSL Certificates from enterprise CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-from-enterprise-ca/m-p/268762#M74569</link>
      <description>&lt;P&gt;I will admit, certificates are one of my bigest hates.. I just can't get on with them&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firstly we have a microsoft EnterPrise CA. Which I am not overly familiar with anyway ( But I have managed to get the web interface workig on it...)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Idealy what I would love is top be able to generate certificates on the firewall that are trusted by all clients...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I can start small!&lt;/P&gt;&lt;P&gt;I have followed many BITTY guides to try and pice together some thing that works, but keep getting no good success.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firstly I would like a certificate that works for the management login page! Tried many thing ( creating a sigingin request, importing the CA [i think] from Microsoft, trying SubordinateCA's ) But nothing works on the login page , and yes I am attaching the service profile in the device config..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then I need to create decryption certificates, but that's the next step.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Loosing the will to live.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 15:12:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-from-enterprise-ca/m-p/268762#M74569</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2019-06-11T15:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates from enterprise CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-from-enterprise-ca/m-p/268840#M74576</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;This is the article you will need to follow for the management interface certificate:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSxCAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSxCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the SSL decryption, you'll need a Subordinate CA certificate so it can generate certs on the fly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Blogs/Generating-Certificates-from-CSR-for-Decryption/ba-p/171008" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Blogs/Generating-Certificates-from-CSR-for-Decryption/ba-p/171008&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 16:33:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-from-enterprise-ca/m-p/268840#M74576</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-06-11T16:33:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates from enterprise CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-from-enterprise-ca/m-p/269117#M74591</link>
      <description>&lt;P&gt;Yes followed those a million times over and could not get a certificate that was trusted by Chrome (Don't use IE as the Palo interface causes it to SWALLOW memory)....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After a bit more digging, looking at the chrome error "ERR_CERT_COMMON_NAME_INVALID"&amp;nbsp;this is actually a bit of a poor eroor message. Chrome aparently looks at the cert for a SAN, supposedly..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;During the PA certificate generation there is no option to populate the SAN attribute.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, when generating this through the web interface on the Internal CA, you can manualy add the attribute.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fwcert.jpg" style="width: 462px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20364i20984023FF802412/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="fwcert.jpg" alt="fwcert.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After importing that cert and deleting all my unsuccessful previous attemtps from the CA...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="suck.jpg" style="width: 462px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20365i24E1C70EDD9B33C0/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="suck.jpg" alt="suck.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 10:27:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-from-enterprise-ca/m-p/269117#M74591</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2019-06-12T10:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates from enterprise CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-from-enterprise-ca/m-p/269508#M74631</link>
      <description>&lt;P&gt;So,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have no idea how I got this to work yesterday, I did some further work and removed the workign certificate then could not get it to work again????&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On inspecting the certificates that were being generated I could see there was no &lt;STRONG&gt;SAN &lt;/STRONG&gt;entries??? But no errors were generated.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I tried on the CLI of the CA server, and got the same, certificates were generated with no errors but no &lt;STRONG&gt;SAN &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I tried on the CLI of the CA server, but using our old CA to generate the cert,&amp;nbsp;certificates were generated with no errors but&amp;nbsp;and SAN was listed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bit of furhter researcha nd discovered that you can enable/disable SAN on certificates..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are policies for certificate creation and one is (&amp;nbsp;EDITF_ATTRIBUTESUBJECTALTNAME2 ) for SAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's a registry key but, we can also do this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To view the policy we use...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;certutil -getreg policy\EditFlags&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\cumberland-PROD-MSAPP01-CA-1\PolicyModules\CertificateAuthority_MicrosoftDefault.Policy\EditFlags:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; EditFlags REG_DWORD = 11014e (1114446)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_REQUESTEXTENSIONLIST -- 2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_DISABLEEXTENSIONLIST -- 4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ADDOLDKEYUSAGE -- 8&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_BASICCONSTRAINTSCRITICAL -- 40 (64)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ENABLEAKIKEYID -- 100 (256)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ENABLEDEFAULTSMIME -- 10000 (65536)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ENABLECHASECLIENTDC -- 100000 (1048576)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;CertUtil: -getreg command completed successfully.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And to update the policy&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;certutil -setreg policy\EditFlags +EDITF_ATTRIBUTESUBJECTALTNAME2&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Old Value:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; EditFlags REG_DWORD = 11014e (1114446)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_REQUESTEXTENSIONLIST -- 2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_DISABLEEXTENSIONLIST -- 4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ADDOLDKEYUSAGE -- 8&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_BASICCONSTRAINTSCRITICAL -- 40 (64)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ENABLEAKIKEYID -- 100 (256)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ENABLEDEFAULTSMIME -- 10000 (65536)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ENABLECHASECLIENTDC -- 100000 (1048576)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;New Value:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; EditFlags REG_DWORD = 15014e (1376590)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_REQUESTEXTENSIONLIST -- 2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_DISABLEEXTENSIONLIST -- 4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ADDOLDKEYUSAGE -- 8&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_BASICCONSTRAINTSCRITICAL -- 40 (64)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ENABLEAKIKEYID -- 100 (256)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ENABLEDEFAULTSMIME -- 10000 (65536)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ATTRIBUTESUBJECTALTNAME2 -- 40000 (262144)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; EDITF_ENABLECHASECLIENTDC -- 100000 (1048576)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;CertUtil: -setreg command completed successfully.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;The CertSvc service may need to be restarted for changes to take effect.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After restarting CERT Service, SAN creation now works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can now create a certificate with SAN names for all our firewalls and that will be accepted by Chrome.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Rob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 08:18:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-from-enterprise-ca/m-p/269508#M74631</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2019-06-13T08:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates from enterprise CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-from-enterprise-ca/m-p/269664#M74645</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Nice writeup!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 15:43:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-certificates-from-enterprise-ca/m-p/269664#M74645</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-06-13T15:43:29Z</dc:date>
    </item>
  </channel>
</rss>

