Palo Alto Failed To Fetch Device Certificate Tpm Public Key Match Failed Updated [new] -

The firewall's hardware TPM generates a public key that must match the record in the Support Portal. If the device was previously registered or had a certificate that wasn't cleared properly, the portal may reject new fetch requests.

The existing invalid certificate must be manually removed from the device's root directory, which is inaccessible to standard administrators. The firewall's hardware TPM generates a public key

This issue has been identified in several PAN-OS versions. Specifically, addressed failures in automatic certificate renewal and fetching. Upgrading to the latest preferred PAN-OS version for your hardware (e.g., 10.1.x or 11.0.x maintenance releases) may prevent recurrence. TPM public key match failed - LIVEcommunity - 1239222 This issue has been identified in several PAN-OS versions

Immediately attempt to fetch the certificate via the CLI to avoid expiration: request certificate fetch otp 2. Perform a "Commit Force" TPM public key match failed - LIVEcommunity -

If the fetch command simply times out without a clear "match failed" error, MTU is a likely culprit. set deviceconfig system mtu 1374 Follow this with a commit and retry the fetch. 4. Clear Existing Certificate State (Requires TAC)

The paloalto-shared-services application must be allowed in security policies to reach the certificate servers. Step-by-Step Resolution Guide 1. Regenerate a Fresh OTP

If the "TPM public key match failed" error persists, it usually indicates a "stuck" certificate state that cannot be cleared through the standard GUI or CLI.