<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto Device certs (Default Trusted Certificate Authorities List) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-device-certs-default-trusted-certificate-authorities/m-p/432185#M95185</link>
    <description>&lt;P&gt;I will give this a try, thank you!&lt;/P&gt;</description>
    <pubDate>Tue, 07 Sep 2021 09:37:36 GMT</pubDate>
    <dc:creator>ewashing3</dc:creator>
    <dc:date>2021-09-07T09:37:36Z</dc:date>
    <item>
      <title>Palo Alto Device certs (Default Trusted Certificate Authorities List)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-device-certs-default-trusted-certificate-authorities/m-p/431475#M95091</link>
      <description>&lt;P&gt;I am dealing with an issue in which the Palo Alto is in proxy mode.&amp;nbsp; The issue is concerning endpoints being able to access a cloud tenant to register (install) a component.. The FQDN of the cloud tenant has been added as an allowance for these endpoints, they are member servers that have exceptions made for Internet access to certain sites.&amp;nbsp; Multiple endpoints within my org are able to register to the tenant, so I don't believe that there is an over-arching issue with the proxy.&amp;nbsp; That being said, the tenant provider has a requirement for two GoDaddy certs to be present on the endpoints to allow for registration (install) of the tenant's cloud component.&amp;nbsp; On the endpoints themselves, both of the GoDaddy certs are present within their local certificate stores.&amp;nbsp; However on the Palo Alto proxy, there is only one GoDaddy cert listed within the Device's "Default Trusted Certificate Authorities" list.&amp;nbsp; Would anyone know if both GoDaddy certs would need to be in this list as well?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Sep 2021 18:21:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-device-certs-default-trusted-certificate-authorities/m-p/431475#M95091</guid>
      <dc:creator>ewashing3</dc:creator>
      <dc:date>2021-09-03T18:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Device certs (Default Trusted Certificate Authorities List)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-device-certs-default-trusted-certificate-authorities/m-p/431592#M95110</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139076"&gt;@ewashing3&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you attempt to hit the registration URL does your endpoint actually trust the certificate being presented? Have you enabled interzone-default logging and verified that endpoints seeing the registration issue don't have any associated denied traffic?&lt;/P&gt;&lt;P&gt;As a test to ensure that decryption is actually an issue, I would temporarily exclude one of the endpoints that are failing to register and see if it actually registers properly or not when you try again.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Sep 2021 04:13:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-device-certs-default-trusted-certificate-authorities/m-p/431592#M95110</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-09-04T04:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Device certs (Default Trusted Certificate Authorities List)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-device-certs-default-trusted-certificate-authorities/m-p/432185#M95185</link>
      <description>&lt;P&gt;I will give this a try, thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 09:37:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-device-certs-default-trusted-certificate-authorities/m-p/432185#M95185</guid>
      <dc:creator>ewashing3</dc:creator>
      <dc:date>2021-09-07T09:37:36Z</dc:date>
    </item>
  </channel>
</rss>

