<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: global protect client certificate in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-certificate/m-p/346197#M86469</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp; &amp;nbsp;Thanks a lot .This clears a lot of doubts . Great Thanks to you again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some more queries :&lt;/P&gt;&lt;P&gt;1) We have two different ADs -old and new and we are in process of migrating users from old to new AD and this may take time / So we have two different CA servers corresponding to two different environments old and new . So Can we Root and Intermediate certificates from both Environments in the same Certificate Profile ? I believe Technically yes but need your input please&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Currently the Connect Method is User logon ( always on)&amp;nbsp; . Once we have the client certificates pushed /Installed , do we have to change it to Pre-login ? What will be the impact ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) We have created a local CA on Palo Alto and generated a certificate from this CA and distributed this certificate to external clients .&amp;nbsp;&lt;/P&gt;&lt;P&gt;We also added this local CA certificate to the same Certificate Profile in Step 1 .&amp;nbsp; This is for non corporate machines where we cant given Internally CA Signed certificate and hence we decided to give all the external clients a common certificate . believe this is OK technically .?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 01 Sep 2020 08:16:29 GMT</pubDate>
    <dc:creator>FWPalolearner</dc:creator>
    <dc:date>2020-09-01T08:16:29Z</dc:date>
    <item>
      <title>global protect client certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-certificate/m-p/346029#M86441</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;We have a global protect portal and gateways running . GP is currently integrated with AD. The certificate on GP is a wildcard signed by an external CA. Currently no certificate check is being made and authentication is purely on basis of AD creds&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the requirement is in addition to credentials a certificate check on client machine has to be made. And certificate has to be a machine certificate issued by newly created Internal.CA.&lt;/P&gt;&lt;P&gt;&amp;nbsp; So does PA also need to have a new server certificate signed by Internal CA?&lt;/P&gt;&lt;P&gt;Because it already has a widcard signed by external CA so can we have multiple server certificate ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also does GP support machine certificate on client machine or it has to be user certificate?&lt;/P&gt;&lt;P&gt;From my view certificate on GP and client should be from both CA and if we replace the wildcard there will be service disruption?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Aug 2020 07:27:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-certificate/m-p/346029#M86441</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-08-31T07:27:40Z</dc:date>
    </item>
    <item>
      <title>Re: global protect client certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-certificate/m-p/346148#M86460</link>
      <description>&lt;P&gt;Now the requirement is in addition to credentials a certificate check on client machine has to be made. And certificate has to be a machine certificate issued by newly created Internal.CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So does PA also need to have a new server certificate signed by Internal CA?&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;Nope. When you configure the certificate profile for authentication you'll need to have the root and intermediate (if applicable) certificates loaded onto the firewall so it can validate the machine certificate, but the firewall itself doesn't need to have any additional certificate generated for it or anything like that.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#ff0000"&gt;If you configure SCEP that changes things bit, but since we're talking about machine certificates I don't think this is applicable in your deployment.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because it already has a widcard signed by external CA so can we have multiple server certificate ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;Not Sure what you are asking here. You don't need to change the portal certificate whatsoever. The certificate you are using in the portal configuration under SSL/TLS service profile doesn't have anything to do with machine certificate authentication.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also does GP support machine certificate on client machine or it has to be user certificate?&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;Yes. In your Agent configuration you'll want to modify the '&lt;SPAN&gt;Client Certificate Store Lookup' option to Machine instead of it's default which looks at the machine and user store.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From my view certificate on GP and client should be from both CA and if we replace the wildcard there will be service disruption?&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;Again the certificate that you place on the Portal under the SSL/TLS service profile really doesn't come into play at all when you setup client certificate authentication as an option. You can leave this as the wildcard certificate if you want, or you can generate a new internal certificate&amp;nbsp;and switch them out. From a functionality standpoint it doesn't matter.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;If you do change out the certificate the client will simply reconnect when the certificate is modified, so it really doesn't cause any major outage or anything, but I would still do it during a maintenance window because you will see that reconnect event the next time the agent checks in with the gateway. As long as you properly update the certificate and update the portal and gateway as needed, you won't see an actual outage.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Sep 2020 00:36:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-certificate/m-p/346148#M86460</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-09-01T00:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: global protect client certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-certificate/m-p/346197#M86469</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp; &amp;nbsp;Thanks a lot .This clears a lot of doubts . Great Thanks to you again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some more queries :&lt;/P&gt;&lt;P&gt;1) We have two different ADs -old and new and we are in process of migrating users from old to new AD and this may take time / So we have two different CA servers corresponding to two different environments old and new . So Can we Root and Intermediate certificates from both Environments in the same Certificate Profile ? I believe Technically yes but need your input please&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Currently the Connect Method is User logon ( always on)&amp;nbsp; . Once we have the client certificates pushed /Installed , do we have to change it to Pre-login ? What will be the impact ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) We have created a local CA on Palo Alto and generated a certificate from this CA and distributed this certificate to external clients .&amp;nbsp;&lt;/P&gt;&lt;P&gt;We also added this local CA certificate to the same Certificate Profile in Step 1 .&amp;nbsp; This is for non corporate machines where we cant given Internally CA Signed certificate and hence we decided to give all the external clients a common certificate . believe this is OK technically .?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Sep 2020 08:16:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-certificate/m-p/346197#M86469</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-09-01T08:16:29Z</dc:date>
    </item>
  </channel>
</rss>

