<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Friendly Re-authentication in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/friendly-re-authentication/m-p/344181#M348</link>
    <description>&lt;P&gt;Thanks for the confirmation,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes login lifetime increase is not a recommended way round this. We want the users to be regularly checked, zero trust model.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The solution we are looking for (and pursuing through our SE) is a 5 min warning and option to re authenticate before the tunnel dies.&amp;nbsp;&lt;BR /&gt;This means existing TCP sessions, like SSH sessions, etc. do not drop, assuming the user wants to keep the tunnel up.&lt;/P&gt;</description>
    <pubDate>Mon, 17 Aug 2020 10:11:23 GMT</pubDate>
    <dc:creator>GN_ROS</dc:creator>
    <dc:date>2020-08-17T10:11:23Z</dc:date>
    <item>
      <title>Friendly Re-authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/friendly-re-authentication/m-p/343514#M338</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;We have a number of users trialling our new Global Protect setup and it appears a small number are workaholics.&lt;BR /&gt;We have the authentication window set at 10hrs (its Radius with TOTP) - and the authentication cookie also expires after 10hrs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the user perspective, at the 10hr mark, all connectivity is cut and interactive apps (ssh for instance) are dropped. They can re-authenticate and return to work, so the setup is fine for most day-of-work use. But the user experience is poor for those working longer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Coming from Checkpoint and ASA, both these products offer a re-authentication window, 5-10 mins before connectivity expires, to allow the user to reauthenticate and gain another 10hrs of tunnel time, without any hard cut off.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this possible in GP and if so, how? Are we missing a setting or confusing the way expiry works on the certs, etc?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 11:58:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/friendly-re-authentication/m-p/343514#M338</guid>
      <dc:creator>GN_ROS</dc:creator>
      <dc:date>2020-08-12T11:58:41Z</dc:date>
    </item>
    <item>
      <title>Re: Friendly Re-authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/friendly-re-authentication/m-p/343823#M341</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/132903"&gt;@GN_ROS&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Globalprotect so far does not offer such an option. Depending on the actual authentication and connection type there are ways to make the login more userfriendly, but the hard cut-off will still be there. I assume increading the login lifetime is not an option because of some company policies - so that you will make sure that at least once a day your users have to log in again?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 20:57:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/friendly-re-authentication/m-p/343823#M341</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-13T20:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: Friendly Re-authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/friendly-re-authentication/m-p/344181#M348</link>
      <description>&lt;P&gt;Thanks for the confirmation,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes login lifetime increase is not a recommended way round this. We want the users to be regularly checked, zero trust model.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The solution we are looking for (and pursuing through our SE) is a 5 min warning and option to re authenticate before the tunnel dies.&amp;nbsp;&lt;BR /&gt;This means existing TCP sessions, like SSH sessions, etc. do not drop, assuming the user wants to keep the tunnel up.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Aug 2020 10:11:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/friendly-re-authentication/m-p/344181#M348</guid>
      <dc:creator>GN_ROS</dc:creator>
      <dc:date>2020-08-17T10:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: Friendly Re-authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/friendly-re-authentication/m-p/411138#M1395</link>
      <description>&lt;P&gt;This seems like a really good option, we've been struggling with this same requirement for shorter session lengths for VPN to ensure the user is re-authenticated regularly, but don't want to interrupt someone in the middle of a session.&lt;/P&gt;&lt;P&gt;Did you get anywhere with your SE? Do they have a feature request we could tag on to as well?&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jun 2021 10:38:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/friendly-re-authentication/m-p/411138#M1395</guid>
      <dc:creator>kmuellercm</dc:creator>
      <dc:date>2021-06-04T10:38:45Z</dc:date>
    </item>
  </channel>
</rss>

