<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article GlobalProtect: Pre-Logon Authentication in GlobalProtect Articles</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/ta-p/322237</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect: Pre-Logon Authentication" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25144i394F4824F3AEEDF5/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Pre-Logon Authentication.png" alt="GlobalProtect: Pre-Logon Authentication" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;GlobalProtect: Pre-Logon Authentication&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;In my previous article, "&lt;/SPAN&gt;&lt;A title="GlobalProtect: Authentication Policy with MFA | LIVEcommunity | Palo Alto Networks" href="https://live.paloaltonetworks.com/t5/General-Articles/GlobalProtect-Authentication-Policy-with-MFA/ta-p/322236" target="_self"&gt;GlobalProtect: Authentication Policy with MFA&lt;/A&gt;&lt;SPAN&gt;," we covered Authentication Policy with MFA to provide elevated access for both HTTP and non-HTTP traffic to specific sensitive resources. You can see a diagram of the environment&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Blogs/GlobalProtect-Overview/ba-p/322170" target="_self"&gt;here&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this post, we are going to add pre-logon authentication using machine certificates.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The value of pre-logon authentication means that a device can be connected to a gateway before an actual user logs into the machine, allowing certain internal resources to be accessible or scripts to be run. For more information about pre-logon, please review this TechDocs article: &lt;A title="Remote Access VPN with Pre-Logon | TechDocs | Palo Alto Networks" href="https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/globalprotect-quick-configs/remote-access-vpn-with-pre-logon.html" target="_blank" rel="noopener"&gt;Remote Access VPN with Pre-Logon&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="alert alert-warning" align="left"&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; This article assumes the following:&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;You have already followed the previous articles in this series.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Part V&amp;nbsp;- Pre-logon Authentication&lt;/STRONG&gt;&lt;/H2&gt;
&lt;DIV&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Certificate Management &amp;gt; Certificates &amp;gt; Generate&lt;/STRONG&gt;&amp;nbsp;to create a machine certificate signed by the root CA that was previously created&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Enter a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Certificate Name&lt;/STRONG&gt;&amp;nbsp;that represents the device&lt;/LI&gt;
&lt;LI&gt;Enter a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Common Name&lt;/STRONG&gt;&amp;nbsp;that represents the device&lt;/LI&gt;
&lt;LI&gt;Select the root CA that was previously created for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Signed By&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Generate&lt;/STRONG&gt;
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt;&amp;nbsp;It is recommended to use an enterprise CA in a production environment&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Generate Certificate - Machine Certificate Signed by Root CA" style="width: 397px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25132iE6872608DD715E55/image-size/large?v=v2&amp;amp;px=999" role="button" title="Generate Certificate - Machine Certificate Signed by Root CA.png" alt="Generate Certificate - Machine Certificate Signed by Root CA" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Generate Certificate - Machine Certificate Signed by Root CA&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Certificate Management &amp;gt; Certificates &amp;gt; Generate&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to create an authentication cookie certificate signed by the root CA that was previously created&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Enter a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Certificate Name&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;that represents the device&lt;/LI&gt;
&lt;LI&gt;Enter a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Common Name&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;that represents the device&lt;/LI&gt;
&lt;LI&gt;Select the root CA that was previously created for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Signed By&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Generate&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;I&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Generate Certificate - Authentication Cookie Certificate Signed by Root CA" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25133i1B0F4F0C2088C513/image-size/large?v=v2&amp;amp;px=999" role="button" title="Generate Certificate - Authentication Cookie Certificate by Root CA.png" alt="Generate Certificate - Authentication Cookie Certificate Signed by Root CA" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Generate Certificate - Authentication Cookie Certificate Signed by Root CA&lt;/span&gt;&lt;/span&gt;&lt;/I&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Certificate Management &amp;gt; Certificates &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the newly created machine certificate&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;gt; Export Certificate&lt;/STRONG&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;File Format&lt;/STRONG&gt;&amp;nbsp;to&amp;nbsp;&lt;EM&gt;Encrypted Private Key and Certificate PKCS12&lt;/EM&gt;&amp;nbsp;and enter a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Passphrase&amp;nbsp;twice&lt;/LI&gt;
&lt;LI&gt;Install the certificate on your test machine&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;For the steps with &lt;STRONG&gt;Windows machines&lt;/STRONG&gt;, read the following article:&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;&lt;A title="Deploy Machine Certificates for Authentication | TechDocs | Palo Alto Networks" href="https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/authentication/set-up-client-certificate-authentication/deploy-machine-certificates-for-authentication.html" target="_blank" rel="noopener"&gt;Deploy Machine Certificates for Authentication&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;For the steps with &lt;STRONG&gt;OS X machines&lt;/STRONG&gt;, please read the following articles:&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;&lt;A title="Personal certificate into Mac Keychain | digicert" href="https://knowledge.digicert.com/solution/SO5181.html" target="_blank" rel="noopener"&gt;Import a personal certificate into Mac Keychain&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A title="GlobalProtect System Keychain OS X | Knowledge Base | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClkECAS" target="_blank" rel="noopener"&gt;GlobalProtect Requests System Keychain Access on OS X&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;For the steps with &lt;STRONG&gt;iOS machines&lt;/STRONG&gt;, please read the following article:&lt;/SPAN&gt;
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;&lt;A title="GlobalProtect App 5.0 on iOS 12 | Knowledge Base | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boSUCAY" target="_blank" rel="noopener"&gt;Configure GlobalProtect App 5.0 on iOS 12 to Use Client Certificate For Authentication&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Certificate Management &amp;gt; Certificate Profile &amp;gt; Add&amp;nbsp;&lt;/STRONG&gt;to create a new&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Certificate Profile&lt;/I&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Enter a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Name&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;CA Certificates &amp;gt; Add&amp;nbsp;&lt;/STRONG&gt;to add the root CA that was created previously&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;I&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Certificate Profile - Add New Certificate Profile" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25134iE0715DE5212AE087/image-size/large?v=v2&amp;amp;px=999" role="button" title="Certificate Profile - Add New Certificate Profile.png" alt="Certificate Profile - Add New Certificate Profile" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Certificate Profile - Add New Certificate Profile&lt;/span&gt;&lt;/span&gt;&lt;/I&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;Policies &amp;gt; Security &amp;gt; Add&lt;/STRONG&gt;&amp;nbsp;to create a rule above your existing rules which allows access from devices assigned the&amp;nbsp;Pre-logon&amp;nbsp;user to the minimum internal resources necessary&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Policies &amp;gt; Security &amp;gt; Add Rule" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25135i992F98441BBDBF99/image-size/large?v=v2&amp;amp;px=999" role="button" title="Policies Security Add Rule.png" alt="Policies &amp;gt; Security &amp;gt; Add Rule" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Policies &amp;gt; Security &amp;gt; Add Rule&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Network &amp;gt; GlobalProtect &amp;gt; Portals &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the existing portal that was previously created
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Agent &amp;gt; Add&lt;/STRONG&gt;
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;Enter a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Name&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Enable&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Authentication Override&amp;nbsp;&lt;/STRONG&gt;and select the certificate to be used for authentication cookies that was created previously&lt;/LI&gt;
&lt;UL class="lia-list-style-type-disc"&gt;
&lt;LI&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt;&amp;nbsp;Pre-logon will only work if:&amp;nbsp;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Authentication Override&lt;/STRONG&gt;&amp;nbsp;is enabled and the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Certificate Profile&lt;/STRONG&gt;&amp;nbsp;created previously&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;U&gt;is&amp;nbsp;applied&lt;/U&gt; under the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Portals &amp;gt;&amp;nbsp;&lt;/STRONG&gt;(your portal)&amp;nbsp;&lt;STRONG&gt;&amp;gt; Authentication&amp;nbsp;&lt;/STRONG&gt;tab&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Authentication Override&lt;/STRONG&gt;&amp;nbsp;is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;enabled and the&amp;nbsp;&lt;STRONG&gt;Certificate Profile&lt;/STRONG&gt;&amp;nbsp;created previously&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;U&gt;is not&amp;nbsp;applied&lt;/U&gt; under the&amp;nbsp;&lt;STRONG&gt;Portals &amp;gt;&amp;nbsp;&lt;/STRONG&gt;(your portal)&amp;nbsp;&lt;STRONG&gt;&amp;gt;&amp;nbsp;Authentication&lt;/STRONG&gt;&amp;nbsp;tab&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Authentication Override&lt;/STRONG&gt;&amp;nbsp;&lt;U&gt;is not&amp;nbsp;enabled&lt;/U&gt; and the&amp;nbsp;&lt;STRONG&gt;Certificate Profile&lt;/STRONG&gt;&amp;nbsp;created previously&amp;nbsp;&lt;U&gt;is applied&lt;/U&gt; under the&amp;nbsp;&lt;STRONG&gt;Portals &amp;gt;&amp;nbsp;&lt;/STRONG&gt;(your portal)&amp;nbsp;&lt;STRONG&gt;&amp;gt;&amp;nbsp;Authentication&lt;/STRONG&gt;&amp;nbsp;tab&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;In this use case, we are using option two, but it's important to note that&amp;nbsp;it will fail if the user has not been previously connected. As we have an internal gateway configured, this will allow the user to connect, or refresh the connection, while on the internal network to generate the Pre-logon cookie. &lt;BR /&gt;&lt;EM&gt;(See&amp;nbsp;"&lt;A title="GlobalProtect Cookie-Based Authentication | Knowledge Base | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEeCAK" target="_blank" rel="noopener"&gt;GlobalProtect Pre-Logon Using Cookie-Based Authentication&lt;/A&gt;"&amp;nbsp;for more information.)&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Configs &amp;gt; Authentication Tab  for Portal Machine Config" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25136iD60273515027E1EA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Configs Authentication Tab Portal Machine Config.png" alt="Configs &amp;gt; Authentication Tab  for Portal Machine Config" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Configs &amp;gt; Authentication Tab  for Portal Machine Config&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL class="p-rich_text_list p-rich_text_list__bullet" data-stringify-type="unordered-list" data-indent="0"&gt;
&lt;LI data-stringify-indent="0"&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG data-stringify-type="bold"&gt;Config Selection Criteria&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and set&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG data-stringify-type="bold"&gt;User/User Group&lt;/STRONG&gt;&lt;STRONG data-stringify-type="bold"&gt;&lt;I data-stringify-type="italic"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;/STRONG&gt;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I data-stringify-type="italic"&gt;pre-logon&lt;/I&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;I data-stringify-type="italic"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Configs &amp;gt; Config Selection Criteria Tab for Portal Machine Config" style="width: 630px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33646i90A66A12006D3537/image-dimensions/630x414?v=v2" width="630" height="414" role="button" title="config_selection_criteria.PNG" alt="Configs &amp;gt; Config Selection Criteria Tab for Portal Machine Config" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Configs &amp;gt; Config Selection Criteria Tab for Portal Machine Config&lt;/span&gt;&lt;/span&gt;&lt;/I&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Navigate to&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Internal&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;and enter the same information that exists in your other agent configuration&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Configs &amp;gt; Internal Tab for Home Internal Gateway" style="width: 631px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25137i4507FCD2DC76A7D7/image-dimensions/631x395?v=v2" width="631" height="395" role="button" title="Configs Internal Tab Home Internal Gateway.png" alt="Configs &amp;gt; Internal Tab for Home Internal Gateway" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Configs &amp;gt; Internal Tab for Home Internal Gateway&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;External&lt;/STRONG&gt;&amp;nbsp;and enter the same information that exists in your other agent configuration&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Configs &amp;gt; External Tab for Home External Gateway" style="width: 637px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33652i229436F049E79690/image-dimensions/637x459?v=v2" width="637" height="459" role="button" title="Screen Shot 2021-05-05 at 9.22.31 AM.png" alt="Configs &amp;gt; External Tab for Home External Gateway" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Configs &amp;gt; External Tab for Home External Gateway&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;App&lt;/STRONG&gt;&amp;nbsp;and set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Connect Method&amp;nbsp;&lt;/STRONG&gt;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Pre-logon (Always On)&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;I&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Configs &amp;gt; App Tab for Connect Method&amp;nbsp;to&amp;nbsp;Pre-logon (Always On)" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25139iA97A2EF3216CB59B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Configs App Tab Connect Method&amp;nbsp;to&amp;nbsp;Pre-logon.png" alt="Configs &amp;gt; App Tab for Connect Method&amp;nbsp;to&amp;nbsp;Pre-logon (Always On)" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Configs &amp;gt; App Tab for Connect Method&amp;nbsp;to&amp;nbsp;Pre-logon (Always On)&lt;/span&gt;&lt;/span&gt;&lt;/I&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;Network &amp;gt; GlobalProtect &amp;gt; Portals &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the existing portal that was previously created&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;Agent&amp;nbsp;&lt;/STRONG&gt;and select the other&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Agent&amp;nbsp;that was created prior to beginning the configuration changes in this article &lt;MARK&gt;(NOT the portal machine config you created above)&lt;/MARK&gt;&lt;/LI&gt;
&lt;LI&gt;Enable&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Authentication Override&amp;nbsp;&lt;/STRONG&gt;and select the certificate to be used for authentication cookies that was created previously&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Configs &amp;gt; Authentication Tab for Portal User Config" style="width: 637px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33645i4BBE37FED74AE06B/image-dimensions/637x381?v=v2" width="637" height="381" role="button" title="portal_user_config.PNG" alt="Configs &amp;gt; Authentication Tab for Portal User Config" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Configs &amp;gt; Authentication Tab for Portal User Config&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;App&amp;nbsp;&lt;/STRONG&gt;and set the&amp;nbsp;&lt;STRONG&gt;Connect Method&lt;/STRONG&gt;&amp;nbsp;to&amp;nbsp;&lt;I&gt;Pre-logon (Always On)&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;I&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Configs &amp;gt; App Tab to Connect Method&amp;nbsp;to&amp;nbsp;Pre-logon (Always on)" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25141i0D36529E1775B1CD/image-size/large?v=v2&amp;amp;px=999" role="button" title="Configs App Tab Connect Method&amp;nbsp;to&amp;nbsp;Pre-logon.png" alt="Configs &amp;gt; App Tab to Connect Method&amp;nbsp;to&amp;nbsp;Pre-logon (Always on)" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Configs &amp;gt; App Tab to Connect Method&amp;nbsp;to&amp;nbsp;Pre-logon (Always on)&lt;/span&gt;&lt;/span&gt;&lt;/I&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;Network &amp;gt; GlobalProtect &amp;gt; Gateways &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the external gateway that was previously created&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Authentication &amp;gt; Certificate Profile&lt;/STRONG&gt;&amp;nbsp;and the certificate profile that was previously created&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect Gateway - Configuration Certificate Profile" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25142i45D8DD038CF05843/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Gateway Configuration Certificate Profile.png" alt="GlobalProtect Gateway - Configuration Certificate Profile" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;GlobalProtect Gateway - Configuration Certificate Profile&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Agent &amp;gt; Client Settings &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the existing config&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;gt; Authentication Override&amp;nbsp;&lt;/STRONG&gt;then enable it and select the certificate to be used for authentication cookies that was created previously
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;I&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Configs &amp;gt; Authentication Override Tab" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25143i67E728E573A8CEDB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Configs Authentication Override Tab.png" alt="Configs &amp;gt; Authentication Override Tab" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Configs &amp;gt; Authentication Override Tab&lt;/span&gt;&lt;/span&gt;&lt;/I&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Commit&lt;/STRONG&gt;&amp;nbsp;the configuration&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;You should now start seeing entries in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;System&amp;nbsp;Logs&lt;/STRONG&gt;&amp;nbsp;that show successful authentication events with a user name of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Pre-logon&lt;/I&gt;&amp;nbsp;(you can filter the logs by&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;(description contains 'pre-logon'))&lt;/I&gt;. Based on the configuration changes implemented from this and previous articles, we are now authenticating via machine certificates, user credentials, and DUO.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 03 Oct 2022 16:51:36 GMT</pubDate>
    <dc:creator>SpencerMitchell</dc:creator>
    <dc:date>2022-10-03T16:51:36Z</dc:date>
    <item>
      <title>GlobalProtect: Pre-Logon Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/ta-p/322237</link>
      <description>&lt;P&gt;Learn more about how&amp;nbsp;&lt;SPAN&gt;to add pre-logon authentication using machine certificates.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Oct 2022 16:51:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/ta-p/322237</guid>
      <dc:creator>SpencerMitchell</dc:creator>
      <dc:date>2022-10-03T16:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Pre-logon Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/340163#M63</link>
      <description>&lt;P&gt;Hopefully you see this and can offer some advice.&amp;nbsp; We have pre-logon set up and was working in testing.&amp;nbsp; As it relates to the gateway, we have the following client configs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pre-logon&lt;/P&gt;&lt;P&gt;Students&lt;/P&gt;&lt;P&gt;Staff&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Each has their own IP Pools.&amp;nbsp; When you boot you successfully authenticate to the gateway in the pool for pre-logon.&amp;nbsp; When you log on we are seeing the user stay in that pool but show the proper username.&amp;nbsp; If you do a "refresh connection" you land in the proper ip pool based on user.&amp;nbsp; Have you seen this?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2020 19:58:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/340163#M63</guid>
      <dc:creator>brianjreed</dc:creator>
      <dc:date>2020-07-22T19:58:31Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Pre-logon Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/340223#M64</link>
      <description>&lt;P&gt;Hi Brian,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I haven't seen this behavior before. That stated, it seems logical that this would occur because the tunnel and its corresponding IP address won't refresh when the user changes from &lt;EM&gt;Pre-logon&lt;/EM&gt; to the actual user's account.&amp;nbsp;What is the reasoning behind the multiple client configs and pools?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Spencer&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 05:44:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/340223#M64</guid>
      <dc:creator>SpencerMitchell</dc:creator>
      <dc:date>2020-07-23T05:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Pre-logon Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/340390#M65</link>
      <description>&lt;P&gt;Thanks for your reply.&amp;nbsp; The engineer that installed our palos originally set it up that way (different ip pools for different users groups - students vs staff vs it staff) prior to me implementing pre-logon.&amp;nbsp; In an on-demand world it worked fine.&amp;nbsp; It makes sense to me to have different pools.&amp;nbsp; Are you saying that you don't think it will ever switch during a logon?&amp;nbsp; I don't think the user changes until they're fully logged in (desktop visible) so it could happen then and not have any impact.&amp;nbsp; Perhaps something is wrong, because our clients do actually disconnect from GP as they are logging on.&amp;nbsp; I see the client go through "Connecting" again.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 18:43:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/340390#M65</guid>
      <dc:creator>brianjreed</dc:creator>
      <dc:date>2020-07-23T18:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Pre-logon Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/340484#M66</link>
      <description>&lt;P&gt;Hi Brian,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It wouldn't hurt to open a case just to validate the behavior. I would think that if it doesn't go through a full refresh of the connection then it would retain the existing IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the past with traditional VPN concentrators I have seen the use of different IP pools as a mechanism to segment user traffic at the network layer. Many times this was because there was lack of security capabilities beyond basic ACLs to control user access after authentication on the concentrator, and segmenting traffic at layer 3 would allow security admins to control the traffic in different ways as it traversed the rest of the security stack (i.e. firewall, IPS, content filter, etc.) to access internal resources and the Internet. My recommendation would be to explore the &lt;EM&gt;Source User&lt;/EM&gt; and&amp;nbsp;&lt;EM&gt;HIP&amp;nbsp;&lt;/EM&gt;aspects of security policy. As every user must authenticate to use GlobalProtect for access, you will have a user mapping as well as host information that you can leverage to determine identity/posture and subsequently enforce policy based on that context. In other words, leveraging a policy construct based on those elements makes it unnecessary to split users up into different pools. I would just have a single pool because there is no loss in visibility or granularity of control. Not sure if that is helpful or not, but I just thought I would share what I've seen and recommended while in the field :).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Spencer&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2020 06:57:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/340484#M66</guid>
      <dc:creator>SpencerMitchell</dc:creator>
      <dc:date>2020-07-24T06:57:17Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Pre-logon Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/340968#M67</link>
      <description>&lt;P&gt;Thanks for taking the time to reply.&amp;nbsp; I know you were waiting with anticipation on the answer...&amp;nbsp; I heard back from support - sounds like I just needed to change the pre-logon tunnel rename timeout from -1 to 0.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pre-Logon Tunnel Rename Timeout (sec) (Windows Only)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This setting controls how GlobalProtect handles the pre-logon tunnel that connects an endpoint to the gateway.&lt;BR /&gt;A value of -1 means the pre-logon tunnel does not time out after a user logs on to the endpoint; GlobalProtect renames the tunnel to reassign it to the user. However, the tunnel persists even if the renaming fails or if the user does not log in to the GlobalProtect gateway.&lt;BR /&gt;A value of 0 means when the user logs on to the endpoint, GlobalProtect immediately terminates the pre-logon tunnel instead of renaming it. In this case, GlobalProtect initiates a new tunnel for the user instead of allowing the user to connect over the pre-logon tunnel. Typically, this setting is most useful when you set the&amp;nbsp;Connect Method&amp;nbsp;to&amp;nbsp;Pre-logon then On-demand, which forces the user to manually initiate the connection after the initial logon.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jul 2020 01:35:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/340968#M67</guid>
      <dc:creator>brianjreed</dc:creator>
      <dc:date>2020-07-28T01:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Pre-logon Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/364198#M68</link>
      <description>&lt;P&gt;I would like to share my experience with GlobalProtect which forced me to use different IP pools instead of relying on user identification. We use Active Directory authentication via RADIUS profile for our users. If a user connects via GlobalProtect and then logs via Remote Desktop on a machine in internal network, connected user losses it's association to the IP address received from VPN pool, and is associated with the IP address of remote machine on which he/she logged. All the user can do is work via established RDP session until it disconnects. When RDP session disconnects, VPN connection must be reset, as no other session can be made from the client's IP (because rules are user-based, and Palo Alto Firewall no longer associates IP address of GP client with that user, so request are not recognized as coming from that user). Because of this we made several IP pools and we make rules based on IP addresses instead of users. I feel that this is wrong, but can't find a way around the user identification problem.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 16:12:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/364198#M68</guid>
      <dc:creator>GeorgeAPH</dc:creator>
      <dc:date>2020-11-19T16:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Pre-logon Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/409758#M69</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/104856"&gt;@brianjreed&lt;/a&gt;&amp;nbsp;thanks for finding that setting.&lt;/P&gt;&lt;P&gt;I have 2 gateways... pre-logon users all go to gateway A. Post-login, default users stay on gateway A but a certain user group needs to connect to gateway B. The trouble is that the user group was staying on A instead of switching to B. So hopefully this timeout will fix my issue.&lt;/P&gt;</description>
      <pubDate>Fri, 28 May 2021 04:06:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/409758#M69</guid>
      <dc:creator>ksalustro</dc:creator>
      <dc:date>2021-05-28T04:06:58Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Pre-logon Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/511737#M70</link>
      <description>&lt;P&gt;I tried this with no change at all.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Aug 2022 16:15:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-pre-logon-authentication/tac-p/511737#M70</guid>
      <dc:creator>Carleton</dc:creator>
      <dc:date>2022-08-12T16:15:40Z</dc:date>
    </item>
  </channel>
</rss>

