My organization recently added F5 SSL Orchestrator to our network that ended up breaking one of our SSL certs. There is an explanation of how SSL Orchestrator works from F5 here. The description from F5 explains that encrypted SSL traffic is decrypted and inspected for malicious traffic and then re-encrypted and sent on its way.
My question is how can this be done without SSL Orchestrator getting access to the private keys of the client and server? I thought the purpose of SSL was to prevent third parties from intercepting traffic.
Also it appears that SSL orchestration is breaking some certs while not affecting others. Is there any reason why certain certs do not work with SSL orchestration?