Blocking Private Key Export
    
    Prevent the export of private keys to secure certificates on PAN-OS
        devices.
    You can
            permanently block the export of private keys for certificates that you generate or
            import onto PAN-OS appliances or Panorama. Blocking the export of private keys from your
            PAN-OS devices hardens your security posture because it prevents rogue administrators or
            other bad actors from misusing keys. Administrators with roles that include certificate
            management can block the export of private keys. You can’t block keys that already exist
            on a device; you can only block keys at the time that you generate them in or import
            them into PAN-OS.
When an administrator blocks the export of a private key, no administrator can export
            that key, not even Superuser administrators. If you need to export a private key from a
            PAN-OS appliance, regenerate the certificate and the key without selecting the option to
            block private key export.
    
    Blocking the export of private keys is supported on PAN-OS
                version 10.1 or later releases.
 To downgrade to an earlier version of PAN-OS, first delete the certificates whose private
            keys are blocked. If you don’t delete the certificates whose private keys are blocked
            before you attempt to downgrade, an error message asks you to delete those certificates.
            You can’t downgrade until you delete them. After you downgrade, reimport or regenerate
            the deleted certificates if you need them.
    
    If you use an enterprise Public Key Infrastructure (PKI) to
                generate certificates and private keys, block the export of private keys because you
                can install them on new firewalls and Panoramas from your enterprise certificate
                authority (CA), so there is no reason to export them from PAN-OS. 
If you
                generate self-signed certificates on the firewall or Panorama and apply the block
                private key export option, you can’t export the certificate and key to other PAN-OS
                appliances.
 You can export and import the device state () even if you block the export of private keys. We include the private
            keys in 
device state imports and exports, but
            administrators can’t read or decode them.
    
    You can import or load the configuration of one firewall on another firewall if the
                master key is the same on both firewalls. If the master key is different on the
                firewalls, then importing or loading the configuration doesn’t work and the commit
                fails while reading the certificates.