<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cached credential issue when using SAML with Global Protect Client and MS Azure in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/526698#M3574</link>
    <description>&lt;P&gt;Check if the end user is using any other software which has been logged in using SAML authentication.&lt;/P&gt;
&lt;P&gt;Also try changing the 'Use Default Browser for SAML Authentication' setting. Make sure you are on the latest GlobalProtect client version as well, as this setting did not apply correctly on some versions.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Jan 2023 20:55:20 GMT</pubDate>
    <dc:creator>jeremyw</dc:creator>
    <dc:date>2023-01-11T20:55:20Z</dc:date>
    <item>
      <title>Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443479#M2060</link>
      <description>&lt;P&gt;We are using SAML with Global Protect Client and MS Azure and it works well for us, with one caveat.&amp;nbsp; We have a consultant who uses the Global Protect client to establish a VPN connection to their network.&amp;nbsp; When I have them attempt to use the Global Protect client to establish a VPN connection into our network (using an O365 account on our tenant), it is using the O365 account for his company (no prompt for credentials).&amp;nbsp; How do I get Global Protect to prompt for a different set of O365 credentials?&amp;nbsp; It seems the credentials are being cached somehow.&amp;nbsp; I've had them clear their browser cookies, but that didn't help.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 16:31:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443479#M2060</guid>
      <dc:creator>ddockter</dc:creator>
      <dc:date>2021-10-26T16:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443552#M2061</link>
      <description>&lt;P data-unlink="true"&gt;Came here with the same/similar problem.&amp;nbsp; Using default browser authentication.&amp;nbsp; User johndoe@xyz.com&amp;nbsp; tries to login with credentials for our environment &lt;A href="mailto:jdoe@contoso.com" target="_blank"&gt;jdoe@contoso.com&lt;/A&gt;.&amp;nbsp; We have seen it prompt for credentials and authenticate properly for &lt;A href="mailto:jdoe@contoso.com" target="_blank"&gt;jdoe@contoso.com&lt;/A&gt; but the browser wants to pass through &lt;A href="mailto:johndoe@xyz.com" target="_blank"&gt;johndoe@xyz.com&lt;/A&gt; so it fails.&amp;nbsp; This seems to only affect contractors that are on a different domain.&amp;nbsp; Would love to be able to have globalprotect launch a "private" version of the default browser to limit this for certain users.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 19:39:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443552#M2061</guid>
      <dc:creator>dwlord</dc:creator>
      <dc:date>2021-10-26T19:39:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443557#M2062</link>
      <description>&lt;P&gt;Exactly my issue as you described.&amp;nbsp; I'm really hoping someone has come up with a fix.&amp;nbsp; I did find the below but have not had a chance to test it yet to see if it will resolve this issue.&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PP33CAG" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PP33CAG&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 19:43:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443557#M2062</guid>
      <dc:creator>ddockter</dc:creator>
      <dc:date>2021-10-26T19:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443561#M2063</link>
      <description>&lt;P&gt;The contractor I was just working with was tech savvy enough to be able to switch default over to Chrome from Edge and that worked but I expect there will be other contractors that won't be able to do that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One troubleshooting idea I had was to have them login to portal.office.com first with the alternate domain credentials first to see if the browser then did a better job of being choosier on which one it passed over.&amp;nbsp; I am going to try to create a lab environment for this issue to see if that helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I saw that KB but it didn't look like it would help but maybe I am wrong.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 19:51:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443561#M2063</guid>
      <dc:creator>dwlord</dc:creator>
      <dc:date>2021-10-26T19:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443603#M2064</link>
      <description>&lt;P&gt;Okay, so I got a lab up and was able to reproduce it as if I were a contractor. The error message I get when logged in as user johndoe@xyz.com to local computer of domain xyz.com and trying to VPN as jdoe@contoso.com is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Sorry, but we're having trouble signing you in.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;AADSTS50105: The signed in user 'johndoe@xyz.com' is not assigned to a role for the application...&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By logging into office.com with user jdoe@contoso.com, it passed through that credential and worked. Not ideal, but directing a user to login to office.com before connecting vpn isn't the worst workaround I have ever recommended...&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 21:29:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443603#M2064</guid>
      <dc:creator>dwlord</dc:creator>
      <dc:date>2021-10-26T21:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443823#M2081</link>
      <description>&lt;P&gt;We made the firewall change in this link and now get the O365 logon prompted on each connection attempt which is what we wanted.&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PP33CAG" target="_blank" rel="nofollow noopener noreferrer"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PP33CAG&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Oct 2021 16:27:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/443823#M2081</guid>
      <dc:creator>ddockter</dc:creator>
      <dc:date>2021-10-27T16:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/444094#M2082</link>
      <description>&lt;P&gt;Glad it is working better for you!&amp;nbsp; Unfortunately, it doesn't seem to be helping us after I made the change here.&amp;nbsp; If the contractor is actively logged into office.com as domain xyz.com it will not prompt for alternate contoso.com user.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Oct 2021 14:13:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/444094#M2082</guid>
      <dc:creator>dwlord</dc:creator>
      <dc:date>2021-10-28T14:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/482351#M2697</link>
      <description>&lt;P&gt;We have the same issue. Any solution to that?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2022 16:30:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/482351#M2697</guid>
      <dc:creator>HenryA</dc:creator>
      <dc:date>2022-04-25T16:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/485076#M2722</link>
      <description>&lt;P&gt;I also have the same issue, even after modifying the single sign out URL as suggested.&lt;/P&gt;&lt;P&gt;I believe the contractor is signing into the device with a Microsoft account, and the GlobalProtect SAML process gives no option to choose a different account.&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2022 02:47:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/485076#M2722</guid>
      <dc:creator>jeremyw</dc:creator>
      <dc:date>2022-05-05T02:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/526667#M3573</link>
      <description>&lt;P&gt;Is there an update or resolution to this? We have several contractors that have not been able to use our VPN due to this issue. Currently running GP agent 5.2.10, and software 10.1.7 on the firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 18:03:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/526667#M3573</guid>
      <dc:creator>johnwilliams</dc:creator>
      <dc:date>2023-01-11T18:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/526698#M3574</link>
      <description>&lt;P&gt;Check if the end user is using any other software which has been logged in using SAML authentication.&lt;/P&gt;
&lt;P&gt;Also try changing the 'Use Default Browser for SAML Authentication' setting. Make sure you are on the latest GlobalProtect client version as well, as this setting did not apply correctly on some versions.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 20:55:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/526698#M3574</guid>
      <dc:creator>jeremyw</dc:creator>
      <dc:date>2023-01-11T20:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/617231#M6108</link>
      <description>&lt;P&gt;Any updates on things that work to resolve this?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Nov 2024 17:50:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/617231#M6108</guid>
      <dc:creator>A.Hesseltine</dc:creator>
      <dc:date>2024-11-12T17:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cached credential issue when using SAML with Global Protect Client and MS Azure</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/1221798#M6514</link>
      <description>&lt;P&gt;If SSO is enabled, users who already logged into another service (like Office 365) don't need to log in again to GP. If this is disabled, they must always log in manually. Here's how you can possibly get around this...Clone your existing Portal Agent config and specify the contractor in the user/group section. Under the App Tab, change Use Single Sign-On to No. This should prompt them to enter their credentials.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 18:38:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cached-credential-issue-when-using-saml-with-global-protect/m-p/1221798#M6514</guid>
      <dc:creator>akolodziej</dc:creator>
      <dc:date>2025-02-24T18:38:14Z</dc:date>
    </item>
  </channel>
</rss>

