<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect pre-logon then on-demand configuration in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414972#M1452</link>
    <description>&lt;P&gt;Thank you both. I know I have myself confused with this. And now a few more questions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you using solely your internal PKI for the portal and gateway? And&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;are you using the Cert profile for both portal and gateway?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you both again. I'll get out of the weeds soon...&lt;/P&gt;</description>
    <pubDate>Thu, 24 Jun 2021 11:03:42 GMT</pubDate>
    <dc:creator>qdimclark</dc:creator>
    <dc:date>2021-06-24T11:03:42Z</dc:date>
    <item>
      <title>Global Protect pre-logon then on-demand configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414821#M1446</link>
      <description>&lt;P&gt;We're using these versions (Yes, we need to upgrade, but other priorities at the moment)&lt;/P&gt;&lt;P&gt;PANos 8.1.14&lt;BR /&gt;Global Protect client 5.2.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're currently usingOn-Demand, which is working. We used this page with the only difference is we're using AD Authentication.&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClH2CAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClH2CAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Now we want to use pre-logon then on-demand.&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oM4ACAU" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oM4ACAU&lt;/A&gt;&lt;/P&gt;&lt;P&gt;We used our internal PKI to create machine certs and those have been deployed using Group Policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I'm not getting is how to configure GlobalProtect to use the machine cert for pre-logon.&lt;/P&gt;&lt;P&gt;Do I create a new SSL/TLS profile or certificate profile?&lt;/P&gt;&lt;P&gt;Can I use the PANos self-signed in conjunction with the PKI machine cert? Would the self-signed be for the portal and the machine cert be for the gateway?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've gone through all the documents, as well as, the GP Admin guide.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice or guidance is much appreciated!&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jun 2021 13:39:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414821#M1446</guid>
      <dc:creator>qdimclark</dc:creator>
      <dc:date>2021-06-25T13:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect pre-logon then on-demand configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414887#M1448</link>
      <description>&lt;P&gt;We use our Windows CA, installed the machine cert for the CA and then added the CA as a trusted root certificate server and it works great.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 23:07:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414887#M1448</guid>
      <dc:creator>CobaltixIT</dc:creator>
      <dc:date>2021-06-23T23:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect pre-logon then on-demand configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414935#M1450</link>
      <description>&lt;P&gt;We use the same as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/76823"&gt;@CobaltixIT&lt;/a&gt;&amp;nbsp; and works fine. You can use a mix of pki and self signed as long as you list both root CA’s in the cert profile but cant see the benefit of mixing here...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 05:27:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414935#M1450</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-24T05:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect pre-logon then on-demand configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414972#M1452</link>
      <description>&lt;P&gt;Thank you both. I know I have myself confused with this. And now a few more questions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you using solely your internal PKI for the portal and gateway? And&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;are you using the Cert profile for both portal and gateway?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you both again. I'll get out of the weeds soon...&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 11:03:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414972#M1452</guid>
      <dc:creator>qdimclark</dc:creator>
      <dc:date>2021-06-24T11:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect pre-logon then on-demand configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414978#M1453</link>
      <description>&lt;P&gt;yes I am using the same cert profile for portal and gateway.&lt;/P&gt;&lt;P&gt;I have a copy of our AD CA on the palo and this is in a certificate profile.&lt;/P&gt;&lt;P&gt;we have templates within AD to generate user certs which GP (group policy) puts in users personal store and other templates to generate machine certs which GP puts into the machine personal store.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have approx 8k users with different setups but we have one small campus that uses a simple config with the above cert use.&lt;/P&gt;&lt;P&gt;It has 1 portal with 2 agent configs.&lt;/P&gt;&lt;P&gt;first one has pre-logon in the selection criteria and the second has any user in the selection criteria.&amp;nbsp; &amp;nbsp;the app settings for both vary slightly but both set to pre-logon, always on... but will be much the same for on demand...&lt;/P&gt;&lt;P&gt;both portal configs point to the same gateway, the gateway only has 1 config for all users...&amp;nbsp; screen shots to follow...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 11:22:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414978#M1453</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-24T11:22:24Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect pre-logon then on-demand configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414983#M1454</link>
      <description>&lt;P&gt;Portal Auth&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_0-1624534161830.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34565i643EE66B065ED314/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_0-1624534161830.png" alt="MickBall_0-1624534161830.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Portal configs&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_1-1624534775583.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34566iAF821A5520C867CF/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_1-1624534775583.png" alt="MickBall_1-1624534775583.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Gateway Auth&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_2-1624534861980.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34567iB76A7A17C7F8B064/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_2-1624534861980.png" alt="MickBall_2-1624534861980.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Gateway conf&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_3-1624534992893.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34568i5AD373BAF7D87666/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_3-1624534992893.png" alt="MickBall_3-1624534992893.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 11:43:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414983#M1454</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-24T11:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect pre-logon then on-demand configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414985#M1455</link>
      <description>&lt;P&gt;And your SSL/TLS profile points to your CA?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 11:49:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/414985#M1455</guid>
      <dc:creator>qdimclark</dc:creator>
      <dc:date>2021-06-24T11:49:05Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect pre-logon then on-demand configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/415124#M1456</link>
      <description>&lt;P&gt;Yes but not the same CA used for authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 18:09:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/415124#M1456</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-24T18:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect pre-logon then on-demand configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/416568#M1490</link>
      <description>&lt;P&gt;Just a followup. I switched to using a wilcard cert for the portal and internal PKI with machine certs for pre-logon. I've passed this hurdle and now just need to resolve the cookie issue I'm having with pre-login.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jul 2021 18:02:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/416568#M1490</guid>
      <dc:creator>qdimclark</dc:creator>
      <dc:date>2021-07-01T18:02:52Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect pre-logon then on-demand configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/438158#M1846</link>
      <description>&lt;P&gt;Hope y'all are well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/76823"&gt;@CobaltixIT&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you both for your help. In the end we stood up an MS NPS server for RADIUS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the portal has the wildcard.domain.com cert and the gateway has an internal PKI certificate. When a computer is joined to the domain they are issued a cert from our PKI. Then using RADIUS to authenticate Pre-Logon then Demand is working and users can change their password before logging in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since the company is allowing BYOD for remote users I have to configure GP to allow a non-domain computer to authenticate. (BYOD may change soon, but in the meantime...)&lt;/P&gt;</description>
      <pubDate>Fri, 01 Oct 2021 20:32:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-pre-logon-then-on-demand-configuration/m-p/438158#M1846</guid>
      <dc:creator>qdimclark</dc:creator>
      <dc:date>2021-10-01T20:32:51Z</dc:date>
    </item>
  </channel>
</rss>

