- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
10-16-2024 12:36 PM
Hello All,
My issue is regarding the Machine Certificate selection in the Global Protect Agent.
Background information:
The issue: whatever I am trying, as soon as I enable the pre-logon in the Global Protect Portal's Agent configuration, the GP client on the workstation will prompt to select a certificate. Basically, all certificates signed by our Active Directory CA will show up.
I opened a ticket with Palo Alto but after 3 weeks, they are still pointing me to the Docs and KB articles from Palo Alto' site.
If I delete all certificates but one, it works fine.
If I select any certificate, it works fine too (which seems logical since they are all signed by the same CA)
I also tried to create a Global Protect centric certificate with a custom OID - and forcing the OID in the GP App configuration. Same result: it just adds to the list of certificates to select.
So, it seems Palo Alto support cannot tell "why" it is doing that... Besides "please cross-check all the requirements as the error 'cert usage issue' will be only seen when the client certificate is not meeting the requirements.", I don't feel like they can tell what the reason behind it is.
Any help is welcome! This is driving me crazy because I feel like I checked everything I could but still missing a key information - that apparently was not obvious to me.
Thanks for any answers!
R.
10-16-2024 01:45 PM
Hello,
Is this before the logon where the machine certificate is used or after initial logon where a client cert is used? When you specify the OID, do you see that key appear in the Windows registry? (ext-key-usage-oid-for-client-cert <oidValue>) ? App Behavior Options (paloaltonetworks.com)
If the cert you are looking to use is signed by a specific template you can specify this template in the cert profile as well.
10-16-2024 02:11 PM
Hello Claw4609,
Thanks for the reply.
If I put the OID in the configuration:
It still prompts the certificates... and I do see the following in the HKLM (not the user HKEY):
ext-key-usage-oid-for-client-cert_PL [REG_SZ] 1.3.6.1.4.1.311.21.8.2892726.13712142.5523597.2770613.14610168.103.6471368.12477013
I tried to pre-populate "ext-key-usage-oid-for-client-cert" in the registry (HKLM) but that did not help.
Regarding your comment on the "signed by a specific template", I honestly did not try this far since I was at least hoping to make it work with the default Client cert....
10-23-2024 07:23 AM
did you ever get this resolved? we are having the same issue
10-23-2024 01:05 PM
Hello cjthorse82,
Still in the process of creating my "seamless" migration plan but I believe I found a few answers that applied to my issue.
Hope that will help you debugging your specific issue!
Cheers.
R.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!