Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Logic APP "PaloAlto-PAN-OS-BlockIP" fails - Error "Could not establish trust relationship for the SSL/TLS secure channel." #9034

Closed
secuit opened this issue Sep 18, 2023 · 7 comments
Assignees
Labels
Playbook Playbook specialty review needed

Comments

@secuit
Copy link

secuit commented Sep 18, 2023

Describe the bug
The Logic App "PaloAlto-PAN-OS-BlockIP" fails in the Step 'List Address Objects' wit the Error - The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel."
My Palo Alto in Azure has an Self Signed Certificate. how can the http request be influenced with regard to the certificate error so that the connector works?

Expected behavior
Connections should be established to the palo firewall. There is no hint in the connector to deal with this problem.

Screenshots
image

@github-actions
Copy link
Contributor

Thank you for submitting an Issue to the Azure Sentinel GitHub repo! You should expect an initial response to your Issue from the team within 5 business days. Note that this response may be delayed during holiday periods. For urgent, production-affecting issues please raise a support ticket via the Azure Portal.

@v-amolpatil v-amolpatil added the Playbook Playbook specialty review needed label Sep 18, 2023
@v-sudkharat
Copy link
Contributor

Hi @secuit, thanks for flagging this issue, we will soon get back to you on this. Thanks!

@secuit
Copy link
Author

secuit commented Sep 25, 2023

@v-sudkharat Is there any update? Do you know when you can check this issue? Thanks. Sebastian

@v-sudkharat
Copy link
Contributor

Hi @secuit,
As your Palo Alto has a Self-Signed Certificate. You need to configure logic app for Standard logic app workflows and also have to complete a few extra steps for this authentication type. Otherwise, the call fails. Please refer the below screenshots and documentation.
https://learn.microsoft.com/en-us/azure/logic-apps/logic-apps-securing-a-logic-app?tabs=azure-portal#access-for-outbound-calls-to-other-services-and-systems

TLS/SSL certificate authentication - 
https://learn.microsoft.com/en-us/azure/connectors/connectors-native-http#tlsssl-certificate-authentication

image

While deploying the Standard logic app workflows, the following steps must be taken:
Step 1. you need to configure the - Integration Service Environment in same resource group.
Step 2. the checkbox for Associate with integration service environment should be enabled while deploying the logic app.
note: - The ISE will be visible in the dropdown option after step 1 completed.
image

Kindly let us know whether the above steps worked for you.
Thanks!

@v-sudkharat
Copy link
Contributor

Hi @secuit, hope you are doing well. could you please have a look at above comment. Thanks!

@v-sudkharat
Copy link
Contributor

v-sudkharat commented Sep 29, 2023

Hi @secuit, Gentle Reminder: We are waiting for your response on this issue. If you still need to keep this issue active, please respond to it in the next 2 days. If we don't receive a response by 03-10-2023 date, we will be closing this issue.
Thanks!

@v-sudkharat
Copy link
Contributor

Hi @secuit, since we have not received a response in the last 5 days, we are closing your issue #9034 as per our standard operating procedures. If you still need support for this issue, feel free to re-open at any time. Thank you for your co-operation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Playbook Playbook specialty review needed
Projects
None yet
Development

No branches or pull requests

4 participants