Automate adding certificate to TS agent

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Automate adding certificate to TS agent

L2 Linker

Hello, I am trying to automate the configuration of the certificate part of the ts agent . My problem is to automate adding the certificate private key password in the ts agent.

I have the certificate part filled in with registry keys but i have this error message when i try to launch the PanTaservice :

01/31/23 17:18:24[Error 341]: Query password read error: 2!!!!
01/31/23 17:18:24[Error 665]: Unable to retrieve password from cred store!!!!
01/31/23 17:18:24[Error 576]: Start service fails due to start link failure!!!!
01/31/23 17:18:24[Error 409]: Start error -1!!
01/31/23 17:18:24[Info 118]: Stop driver succeeds.
01/31/23 17:18:24[Info 176]: Service stopped.

 

Anyone know how to do it? and where is stored this password ?

1 accepted solution

Accepted Solutions

L2 Linker

I found the solution, i see 6 registry key are created in HKLM/SOFTWARE\Palo Alto Networks\TS Agent\Conf :

 

TSAgentCNALTNAME

TSAgentCNEXPIRY

TSAgentCNISSUER

TSAgentCNNAME

TSAgentCNSUBJECT

 

And TSAgentSSL, that the key used to add the password certificate.

 

I get the value for the key TSAgentSSL with Process Monitor application.

 

This registry key is deleted when the service boot. that's why i doesn't see this key before.

 

I add the creation of this registry key in the script and the service is booting now

View solution in original post

4 REPLIES 4

Community Team Member

Hi @CHARRIER ,

 

Was the certificate you used generated from the firewall or from internal PKI?

LIVEcommunity team member
Stay Secure,
Jay
Don't forget to Like items if a post is helpful to you!

Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

Hello @JayGolf 

The certificate is generated by the internal PKI.

L2 Linker

I found the solution, i see 6 registry key are created in HKLM/SOFTWARE\Palo Alto Networks\TS Agent\Conf :

 

TSAgentCNALTNAME

TSAgentCNEXPIRY

TSAgentCNISSUER

TSAgentCNNAME

TSAgentCNSUBJECT

 

And TSAgentSSL, that the key used to add the password certificate.

 

I get the value for the key TSAgentSSL with Process Monitor application.

 

This registry key is deleted when the service boot. that's why i doesn't see this key before.

 

I add the creation of this registry key in the script and the service is booting now

Community Team Member

Thanks for sharing @CHARRIER !

LIVEcommunity team member
Stay Secure,
Jay
Don't forget to Like items if a post is helpful to you!

Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.
  • 1 accepted solution
  • 1432 Views
  • 4 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!