<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article GlobalProtect: Authentication Policy with MFA in GlobalProtect Articles</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/ta-p/322236</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect: Authentication Policy with MFA" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25131iE1F30A731FC11F03/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Authentication Policy with MFA.png" alt="GlobalProtect: Authentication Policy with MFA" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;GlobalProtect: Authentication Policy with MFA&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;In my previous article, "&lt;/SPAN&gt;&lt;A title="GlobalProtect: User/Device Context Compliance | LIVEcommunity | Palo Alto Networks" href="https://live.paloaltonetworks.com/t5/General-Articles/GlobalProtect-User-Device-Context-and-Compliance/ta-p/322235" target="_self"&gt;GlobalProtect: User/Device Context &amp;amp; Compliance&lt;/A&gt;&lt;SPAN&gt;," we covered&amp;nbsp;security policy matching based on user identity and device context provided via the GlobalProtect app. We also enabled notifications to the end user based on compliance of the endpoint. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;In this post, we are going to configure Authentication Policy with MFA to provide elevated access for both HTTP and non-HTTP traffic to specific sensitive resources. You can see a diagram of the environment&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Blogs/GlobalProtect-Overview/ba-p/322170" target="_self"&gt;here&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The value in leveraging Authentication Policy with MFA is to ensure that regardless of whether or not a user is known and the device is compliant, they must authenticate with multiple factors to validate their identity prior to accessing a specific resource. This helps prevent lateral movement by malicious attackers that are persisting internally via a compromised machine or with phished credentials.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="alert alert-warning" align="left"&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; This article assumes the following:&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;You have already followed the previous articles in this series&lt;/LI&gt;
&lt;LI&gt;You have&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A title="Configure DUO MFA | YouTube" href="https://www.youtube.com/watch?v=5kTOOHVE_-o" target="_blank" rel="noopener"&gt;DUO MFA configured&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN&gt;Although this capability can be configured without GlobalProtect for HTTP applications, we are going to focus on non-HTTP applications to highlight the GlobalProtect app's role in the authentication prompt process.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;&lt;STRONG&gt;Part IV - Authentication Policy with MFA&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Certificate Management &amp;gt; SSL/TLS Service Profile &amp;gt; Add&lt;/STRONG&gt;&amp;nbsp;to create a profile that references the root CA created previously&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SSL/TLS Service Profile to Add a Profile" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25123i48FA7C764C899688/image-size/large?v=v2&amp;amp;px=999" role="button" title="SSL TLS Service Profile Add Profile.png" alt="SSL/TLS Service Profile to Add a Profile" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;SSL/TLS Service Profile to Add a Profile&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Authentication Profile &amp;gt; Add&lt;/STRONG&gt;&amp;nbsp;to create a new profile that consists of the LDAP and DUO&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Server Profiles&lt;/I&gt;&amp;nbsp;that were previously created&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;On the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Authentication&lt;/STRONG&gt;&amp;nbsp;tab
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;Enter a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Name&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Type&lt;/STRONG&gt;&amp;nbsp;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;LDAP&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Server Profile&lt;/STRONG&gt;&amp;nbsp;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;LDAP&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Enter a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Login Attribute&amp;nbsp;&lt;/STRONG&gt;of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;sAMAccountName&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;User Domain&lt;/STRONG&gt;&amp;nbsp;to your domain&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Authentication Profile to Set User Domain" style="width: 599px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25124i8870FB8AB0028030/image-size/large?v=v2&amp;amp;px=999" role="button" title="Authentication Profile Set User Domain.png" alt="Authentication Profile to Set User Domain" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Authentication Profile to Set User Domain&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;On the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Factors&lt;/STRONG&gt;&amp;nbsp;tab
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Check the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Enable Additional Authentication Factors&lt;/STRONG&gt;&amp;nbsp;box&lt;/LI&gt;
&lt;LI&gt;Add&amp;nbsp;the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Multi-Factor Authentication Server Profile&lt;/STRONG&gt;&amp;nbsp;that was previously created as part of your DUO setup&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Authentication Profile for LDAP Auth-Duo" style="width: 601px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25125iA04D4A61038EF97D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Authentication Profile LDAP Auth-Duo.png" alt="Authentication Profile for LDAP Auth-Duo" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Authentication Profile for LDAP Auth-Duo&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;On the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Advanced&lt;/STRONG&gt;&amp;nbsp;tab, select the user group previously created to add to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Allow List&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; User Identification &amp;gt; Captive Portal&amp;nbsp;&lt;/STRONG&gt;and click on the gear icon&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Check the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Enable Captive Portal&lt;/STRONG&gt;&amp;nbsp;box&lt;/LI&gt;
&lt;LI&gt;Select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;SSL/TLS Service Profile&lt;/STRONG&gt;&amp;nbsp;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Authentication Profile&lt;/STRONG&gt;&amp;nbsp;that were previously created&lt;/LI&gt;
&lt;LI&gt;Set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Mode&lt;/STRONG&gt;&amp;nbsp;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Redirect&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Redirect Host&lt;/STRONG&gt;&amp;nbsp;to an IP address of an interface on the firewall
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;In my case, its the IP address of my trust interface&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Click&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Captive Portal window to Enable Captive Portal" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25126iDDD725626314369D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Captive Portal Enable Redirect.png" alt="Captive Portal window to Enable Captive Portal" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Captive Portal window to Enable Captive Portal&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Network &amp;gt; GlobalProtect &amp;gt; Portals &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the previously configured portal&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;gt; Agent &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the previously configured config&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;gt; App &amp;gt;&amp;nbsp;&lt;/STRONG&gt;and change the following&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;App Configurations&lt;/STRONG&gt;&amp;nbsp;parameters&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Set&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Connect Method&lt;/STRONG&gt;&amp;nbsp;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;User-logon (Always On)&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Set&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Enable Inbound Authentication Prompts from MFA Prompts (UDP)&lt;/STRONG&gt;&amp;nbsp;to&amp;nbsp;&lt;I&gt;Yes&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Set&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Trusted MFA Gateways&lt;/STRONG&gt;&amp;nbsp;to the IP address referenced in your&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Captive Portal&lt;/STRONG&gt;&amp;nbsp;along with port 6082
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;In my case its&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;192.168.1.254:6082&lt;/I&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;I&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Config App Tab App to Configurations&amp;nbsp;Parameters" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25127iFC497A31464D9ED1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Config App Tab App Configurations&amp;nbsp;parameters.png" alt="Config App Tab App to Configurations&amp;nbsp;Parameters" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Config App Tab App to Configurations&amp;nbsp;Parameters&lt;/span&gt;&lt;/span&gt;&lt;/I&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Objects &amp;gt; Authentication &amp;gt; Add&lt;/STRONG&gt;&amp;nbsp;to create a new&amp;nbsp;&lt;STRONG&gt;Authentication&amp;nbsp;Enforcement&lt;/STRONG&gt;&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Enter a&lt;I&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Name&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Authentication Method&lt;/STRONG&gt;&amp;nbsp;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;web-form&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Authentication Profile&lt;/STRONG&gt;&amp;nbsp;to the MFA profile that was previously created&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;I&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Authentication Enforcement for Duo" style="width: 481px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25128iA669605A4CD275FA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Authentication Enforcement for Duo.png" alt="Authentication Enforcement for Duo" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Authentication Enforcement for Duo&lt;/span&gt;&lt;/span&gt;&lt;/I&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Policies &amp;gt; Authentication &amp;gt; Add&lt;/STRONG&gt;&amp;nbsp;to create an authentication rule&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt;&amp;nbsp;If you need a resource for testing, there are plenty of test SSH servers available publicly. In the example below, that is what I am using&lt;/LI&gt;
&lt;LI&gt;As shown below, any user in the &lt;STRONG&gt;trust&lt;/STRONG&gt; or &lt;STRONG&gt;gp zone&lt;/STRONG&gt; that generates traffic destined to a specific server in the &lt;STRONG&gt;untrust zone&lt;/STRONG&gt; will be prompted to authenticate, regardless of whether they are a verified user or not&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Policies &amp;gt; Authentication &amp;gt; Add Authentication Rule" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25129iC01E3F2CFB8804C7/image-size/large?v=v2&amp;amp;px=999" role="button" title="Policies Add Authentication Rule.png" alt="Policies &amp;gt; Authentication &amp;gt; Add Authentication Rule" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Policies &amp;gt; Authentication &amp;gt; Add Authentication Rule&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Commit&lt;/STRONG&gt;&amp;nbsp;the configuration&lt;/LI&gt;
&lt;LI&gt;Lastly, when testing with a Windows client, make sure that the host firewall is allowing UDP port 4501 inbound&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;You should now be able to test access to the resource. Here is the general workflow that you can follow:&lt;/DIV&gt;
&lt;DIV&gt;
&lt;UL&gt;
&lt;LI&gt;Ensure the GlobalProtect app is connected to either an external or internal gateway&lt;/LI&gt;
&lt;LI&gt;From operational mode in the CLI, run the&lt;SPAN&gt;&amp;nbsp;'&lt;/SPAN&gt;&lt;I&gt;show user ip-user-mapping all type CP'&lt;/I&gt;&amp;nbsp;to show authenticated users&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;It should show&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;0 users&lt;/I&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;Attempt to access the resource referenced in the &lt;STRONG&gt;Authentication Policy rule&lt;/STRONG&gt;, and you will see a prompt requiring you to authenticate&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect - Protected Resource" style="width: 457px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25130iBCE3EC37CCA1AD89/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect - Protected Resource.png" alt="GlobalProtect - Protected Resource" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;GlobalProtect - Protected Resource&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Upon authenticating via the factors you defined, you should be able to access the resource as well as run the same&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;'show user ip-user-mapping all type CP'&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;and see your user account&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;In my next article, "&lt;A title="GlobalProtect: Pre-Logon Authentication | LIVEcommunity | Palo Alto Networks" href="https://live.paloaltonetworks.com/t5/General-Articles/GlobalProtect-Pre-logon-Authentication/ta-p/322237" target="_self"&gt;GlobalProtect: Pre-Logon Authentication&lt;/A&gt;," we will configure pre-logon authentication using machine certificates.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 12 Jul 2022 06:30:34 GMT</pubDate>
    <dc:creator>SpencerMitchell</dc:creator>
    <dc:date>2022-07-12T06:30:34Z</dc:date>
    <item>
      <title>GlobalProtect: Authentication Policy with MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/ta-p/322236</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Learn more about to configure Authentication Policy with MFA to provide elevated access for both HTTP and non-HTTP traffic to specific sensitive resources.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2022 06:30:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/ta-p/322236</guid>
      <dc:creator>SpencerMitchell</dc:creator>
      <dc:date>2022-07-12T06:30:34Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Authentication Policy with MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/345413#M12</link>
      <description>&lt;P&gt;Is it working with SAML + Azure MFA ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2020 18:19:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/345413#M12</guid>
      <dc:creator>DLONGPRÉ</dc:creator>
      <dc:date>2020-08-25T18:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Authentication Policy with MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/364046#M13</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80530"&gt;@DLONGPRÉ&lt;/a&gt;&amp;nbsp;It works great with Azure AD SAML authentication and MFA is prompted in Azure login. No need for any additional configuration specific to MFA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 12:23:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/364046#M13</guid>
      <dc:creator>CEkanayake2</dc:creator>
      <dc:date>2020-11-19T12:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Authentication Policy with MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/393098#M23</link>
      <description>&lt;P&gt;I currently have pre-login working with SSO + SAML with Azure MFA... the issue that I see is that when a user stays logged in for a time greater than their time required to reauthenticate via MFA, the machine is stuck in a limbo state during this time.&amp;nbsp; Has anyone else experienced this and does anyone know of a workaround?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 20:02:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/393098#M23</guid>
      <dc:creator>mlinsemier</dc:creator>
      <dc:date>2021-03-23T20:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Authentication Policy with MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/414204#M29</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80530"&gt;@DLONGPRÉ&lt;/a&gt;&amp;nbsp; &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/156612"&gt;@CEkanayake2&lt;/a&gt;&amp;nbsp; &amp;nbsp;Are you currently using Azure MFA, Authentication Policy and GlobalProtect?&amp;nbsp; If so, can you help me out?&amp;nbsp; &amp;nbsp;Trying to use this to restrict administrative access to resources to comply with new requirements and I'm having a difficult time.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jun 2021 19:44:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/414204#M29</guid>
      <dc:creator>Someonesomeone</dc:creator>
      <dc:date>2021-06-18T19:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Authentication Policy with MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/508613#M60</link>
      <description>&lt;P&gt;Is there a way to make this work where the user only receives an MFA push notification directly to their phone when they hit a Security Authentication policy? I want to use this with user-certificate authentication. My ideal workflow would be as follows:&lt;BR /&gt;1. With prelogon configured, the user authenticates with their user certificate (not machine), and by the time they're done signing into their laptop, they are authenticated to Globalprotect. This allows us to have usernames in the traffic logs, and formulate security policies (eg for Internet) with Security Profile Groups attached to them for L7 protection. As a fallback, SAML auth profile is configured, and if a user has an issue with their certificate they receive a SAML login prompt.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step 1 works absolutely perfectly. Anyone that just needs to use the internet never has to think about the VPN, they're always connected and protected by the Security Group profile that is configured.&lt;/P&gt;&lt;P&gt;2. When the user tries to access an internal resource in the network, (hitting a security authentication policy), they receive an MFA push to their company-issued phone. After they acknowledge the challenge, they are free to access internal resources for x amount of hours.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is this a technically possible solution?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2022 21:12:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/508613#M60</guid>
      <dc:creator>Brooks_Hassinger</dc:creator>
      <dc:date>2022-07-12T21:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Authentication Policy with MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/509001#M61</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/221682"&gt;@Brooks_Hassinger&lt;/a&gt;&amp;nbsp;it should be possible. The MFA push is performed separately based on the auth profile applied to the auth policy, which is separate from the GP authentication process.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2022 23:51:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-authentication-policy-with-mfa/tac-p/509001#M61</guid>
      <dc:creator>SpencerMitchell</dc:creator>
      <dc:date>2022-07-14T23:51:17Z</dc:date>
    </item>
  </channel>
</rss>

