<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect Linux Smart Card in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-linux-smart-card/m-p/432659#M1694</link>
    <description>&lt;P&gt;I'm also having issue with smartcard authentication on Red Hat Enterprise Linux (RHEL) 7.&amp;nbsp; I can successfully connect to Cisco VPN using OpenConnect client and smartcard, but I haven't been able to successfully connect to GlobalProtect VPN yet using same client and smartcard.&amp;nbsp; It appears my client certificate is not being successfully provided to the GP VPN server.&amp;nbsp; Below is a log of what I see when I try to login:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[user@mycomputer ~]$ sudo openconnect vpn.fakeglobalprotectserverurl.com:443 --usergroup=gateway --protocol=gp -vvvv --dump-http-traffic -c 'pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;object=Certificate%20for%20PIV%20Authentication;type=cert'
[sudo] password for user: 
POST https://vpn.fakeglobalprotectserverurl.com/ssl-vpn/prelogin.esp?tmp=tmp&amp;amp;clientVer=4100&amp;amp;clientos=Linux
Attempting to connect to server 123.456.789.012:443
Connected to 123.456.789.012:443
Using PKCS#11 certificate pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;object=Certificate%20for%20PIV%20Authentication;type=cert
Trying PKCS#11 key URL pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;object=Certificate%20for%20PIV%20Authentication;type=private
PIN required for FAKE.NAME.Q.1234567890
Enter PIN:
Trying PKCS#11 key URL pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;object=Certificate%20for%20PIV%20Authentication;type=private
Trying PKCS#11 key URL pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;type=private
Using PKCS#11 key pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;type=private
Using client certificate 'FAKE.NAME.Q.1234567890'
Got no issuer from PKCS#11
SSL negotiation with vpn.fakeglobalprotectserverurl.com
Connected to HTTPS on vpn.fakeglobalprotectserverurl.com with ciphersuite (TLS1.2)-(RSA)-(AES-256-GCM)
&amp;gt; POST /ssl-vpn/prelogin.esp?tmp=tmp&amp;amp;clientVer=4100&amp;amp;clientos=Linux HTTP/1.1
&amp;gt; Host: vpn.fakeglobalprotectserverurl.com
&amp;gt; User-Agent: PAN GlobalProtect
&amp;gt; 
Got HTTP response: HTTP/1.1 200 OK
Date: Wed, 08 Sep 2021 18:20:47 GMT
Content-Type: application/xml; charset=UTF-8
Content-Length: 539
Connection: keep-alive
ETag: "1234567890fakeetag"
Pragma: no-cache
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
X-FRAME-OPTIONS: DENY
Set-Cookie: PHPSESSID=1234567890fakeid; secure; HttpOnly
Set-Cookie: PHPSESSID=1234567890fakeid; secure; HttpOnly
Set-Cookie: PHPSESSID=1234567890fakeid; secure; HttpOnly
Set-Cookie: PHPSESSID=1234567890fakeid; secure; HttpOnly
Set-Cookie: PHPSESSID=1234567890fakeid; secure; HttpOnly
Strict-Transport-Security: max-age=31536000;
X-XSS-Protection: 1; mode=block;
X-Content-Type-Options: nosniff
Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline'; img-src * data:; style-src 'self' 'unsafe-inline';
HTTP body length:  (539)
&amp;lt; &amp;lt;?xml version="1.0" encoding="UTF-8" ?&amp;gt;
&amp;lt; &amp;lt;prelogin-response&amp;gt;
&amp;lt; &amp;lt;status&amp;gt;Error&amp;lt;/status&amp;gt;
&amp;lt; &amp;lt;ccusername&amp;gt;&amp;lt;/ccusername&amp;gt;
&amp;lt; &amp;lt;autosubmit&amp;gt;&amp;lt;/autosubmit&amp;gt;
&amp;lt; &amp;lt;msg&amp;gt;Valid client certificate is required&amp;lt;/msg&amp;gt;
&amp;lt; &amp;lt;newmsg&amp;gt;Required client certificate not found. Please contact your IT administrator.&amp;lt;/newmsg&amp;gt;
&amp;lt; &amp;lt;license&amp;gt;yes&amp;lt;/license&amp;gt;
&amp;lt; &amp;lt;authentication-message&amp;gt;&amp;lt;/authentication-message&amp;gt;
&amp;lt; &amp;lt;username-label&amp;gt;&amp;lt;/username-label&amp;gt;
&amp;lt; &amp;lt;password-label&amp;gt;&amp;lt;/password-label&amp;gt;
&amp;lt; &amp;lt;panos-version&amp;gt;1&amp;lt;/panos-version&amp;gt;
&amp;lt; &amp;lt;saml-default-browser&amp;gt;yes&amp;lt;/saml-default-browser&amp;gt;&amp;lt;region&amp;gt;US&amp;lt;/region&amp;gt;
&amp;lt; &amp;lt;/prelogin-response&amp;gt;
Valid client certificate is required
Failed to obtain WebVPN cookie&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Sep 2021 18:57:12 GMT</pubDate>
    <dc:creator>crispjw</dc:creator>
    <dc:date>2021-09-08T18:57:12Z</dc:date>
    <item>
      <title>GlobalProtect Linux Smart Card</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-linux-smart-card/m-p/363003#M555</link>
      <description>&lt;P&gt;There is a Smart Card solution that uses pkcs#11 and middlware that provides OS communication to the card. Is there a way to use this certificate from the card for GlobalProtect authentication?&lt;/P&gt;&lt;P&gt;GP is looking for a cert in a specific location, but it is not possible to extract it from the Smart Card and import for GP (&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLMaCAO" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLMaCAO&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this supported at all? If so, is there any information available?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2020 14:50:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-linux-smart-card/m-p/363003#M555</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2020-11-13T14:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Linux Smart Card</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-linux-smart-card/m-p/376748#M753</link>
      <description>&lt;P&gt;I am having the same issue on CentOS 7 using pcsc, Coolkey, and sometimes OpenSC.&amp;nbsp; GP agent is looking in a specific directory for pfx and dat files I believe, but I cannot get a p12 cert exported from my smart card to import.&amp;nbsp; I would like GP to use my smart card for credentials. Any success regarding this issue, if it is even supported?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2020 15:48:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-linux-smart-card/m-p/376748#M753</guid>
      <dc:creator>mccarty_jeff</dc:creator>
      <dc:date>2020-12-30T15:48:27Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Linux Smart Card</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-linux-smart-card/m-p/432659#M1694</link>
      <description>&lt;P&gt;I'm also having issue with smartcard authentication on Red Hat Enterprise Linux (RHEL) 7.&amp;nbsp; I can successfully connect to Cisco VPN using OpenConnect client and smartcard, but I haven't been able to successfully connect to GlobalProtect VPN yet using same client and smartcard.&amp;nbsp; It appears my client certificate is not being successfully provided to the GP VPN server.&amp;nbsp; Below is a log of what I see when I try to login:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[user@mycomputer ~]$ sudo openconnect vpn.fakeglobalprotectserverurl.com:443 --usergroup=gateway --protocol=gp -vvvv --dump-http-traffic -c 'pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;object=Certificate%20for%20PIV%20Authentication;type=cert'
[sudo] password for user: 
POST https://vpn.fakeglobalprotectserverurl.com/ssl-vpn/prelogin.esp?tmp=tmp&amp;amp;clientVer=4100&amp;amp;clientos=Linux
Attempting to connect to server 123.456.789.012:443
Connected to 123.456.789.012:443
Using PKCS#11 certificate pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;object=Certificate%20for%20PIV%20Authentication;type=cert
Trying PKCS#11 key URL pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;object=Certificate%20for%20PIV%20Authentication;type=private
PIN required for FAKE.NAME.Q.1234567890
Enter PIN:
Trying PKCS#11 key URL pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;object=Certificate%20for%20PIV%20Authentication;type=private
Trying PKCS#11 key URL pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;type=private
Using PKCS#11 key pkcs11:model=PKCS%2315%20emulated;manufacturer=piv_II;serial=[redacted];token=FAKE.NAME.Q.1234567890;id=%01;type=private
Using client certificate 'FAKE.NAME.Q.1234567890'
Got no issuer from PKCS#11
SSL negotiation with vpn.fakeglobalprotectserverurl.com
Connected to HTTPS on vpn.fakeglobalprotectserverurl.com with ciphersuite (TLS1.2)-(RSA)-(AES-256-GCM)
&amp;gt; POST /ssl-vpn/prelogin.esp?tmp=tmp&amp;amp;clientVer=4100&amp;amp;clientos=Linux HTTP/1.1
&amp;gt; Host: vpn.fakeglobalprotectserverurl.com
&amp;gt; User-Agent: PAN GlobalProtect
&amp;gt; 
Got HTTP response: HTTP/1.1 200 OK
Date: Wed, 08 Sep 2021 18:20:47 GMT
Content-Type: application/xml; charset=UTF-8
Content-Length: 539
Connection: keep-alive
ETag: "1234567890fakeetag"
Pragma: no-cache
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
X-FRAME-OPTIONS: DENY
Set-Cookie: PHPSESSID=1234567890fakeid; secure; HttpOnly
Set-Cookie: PHPSESSID=1234567890fakeid; secure; HttpOnly
Set-Cookie: PHPSESSID=1234567890fakeid; secure; HttpOnly
Set-Cookie: PHPSESSID=1234567890fakeid; secure; HttpOnly
Set-Cookie: PHPSESSID=1234567890fakeid; secure; HttpOnly
Strict-Transport-Security: max-age=31536000;
X-XSS-Protection: 1; mode=block;
X-Content-Type-Options: nosniff
Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline'; img-src * data:; style-src 'self' 'unsafe-inline';
HTTP body length:  (539)
&amp;lt; &amp;lt;?xml version="1.0" encoding="UTF-8" ?&amp;gt;
&amp;lt; &amp;lt;prelogin-response&amp;gt;
&amp;lt; &amp;lt;status&amp;gt;Error&amp;lt;/status&amp;gt;
&amp;lt; &amp;lt;ccusername&amp;gt;&amp;lt;/ccusername&amp;gt;
&amp;lt; &amp;lt;autosubmit&amp;gt;&amp;lt;/autosubmit&amp;gt;
&amp;lt; &amp;lt;msg&amp;gt;Valid client certificate is required&amp;lt;/msg&amp;gt;
&amp;lt; &amp;lt;newmsg&amp;gt;Required client certificate not found. Please contact your IT administrator.&amp;lt;/newmsg&amp;gt;
&amp;lt; &amp;lt;license&amp;gt;yes&amp;lt;/license&amp;gt;
&amp;lt; &amp;lt;authentication-message&amp;gt;&amp;lt;/authentication-message&amp;gt;
&amp;lt; &amp;lt;username-label&amp;gt;&amp;lt;/username-label&amp;gt;
&amp;lt; &amp;lt;password-label&amp;gt;&amp;lt;/password-label&amp;gt;
&amp;lt; &amp;lt;panos-version&amp;gt;1&amp;lt;/panos-version&amp;gt;
&amp;lt; &amp;lt;saml-default-browser&amp;gt;yes&amp;lt;/saml-default-browser&amp;gt;&amp;lt;region&amp;gt;US&amp;lt;/region&amp;gt;
&amp;lt; &amp;lt;/prelogin-response&amp;gt;
Valid client certificate is required
Failed to obtain WebVPN cookie&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 18:57:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-linux-smart-card/m-p/432659#M1694</guid>
      <dc:creator>crispjw</dc:creator>
      <dc:date>2021-09-08T18:57:12Z</dc:date>
    </item>
  </channel>
</rss>

