On Linux (with tpm2-tools ):
The modern network perimeter is no longer just a firewall; it is an ecosystem of identity, encryption, and hardware-based trust. As organizations push for Zero Trust architectures, Palo Alto Networks firewalls and Prisma Access endpoints increasingly rely on chips to secure device certificates. These certificates authenticate machines before granting network access, preventing unauthorized devices from connecting. On Linux (with tpm2-tools ): The modern network
A Deep Dive into TPM, Device Certificates, and Authentication Failures A Deep Dive into TPM, Device Certificates, and
Get-Tpm Expected: TpmReady: True . If False , clear or initialize the TPM via BIOS. This article was accurate as of PAN-OS 11
Palo Alto’s official “Device Certificate Management with TPM 2.0” whitepaper (available on the live portal) provides additional API-level controls for automation. This article was accurate as of PAN-OS 11.0 and Windows 11 23H2. Always test TPM changes in a non-production group before scaling.
Windows 11 22H2 changed the default TPM key storage algorithm from RSA-2048 to ECC (elliptic curve) for new requests. The existing certificates were RSA. The TPM attempted to present the new ECC public key, but the old certificate still contained the RSA public key.
The fix invariably involves either re-synchronizing the certificate with the existing TPM key or—if corruption is confirmed—clearing the TPM and rebuilding the identity. Always test in a lab environment first, especially if BitLocker or other TPM-bound services are in use.