<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure SAML double windows to select account in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528824#M3647</link>
    <description>&lt;P&gt;Let me try that, I'll update the topic with result&lt;/P&gt;</description>
    <pubDate>Fri, 27 Jan 2023 04:43:07 GMT</pubDate>
    <dc:creator>MaximeMertens</dc:creator>
    <dc:date>2023-01-27T04:43:07Z</dc:date>
    <item>
      <title>Azure SAML double windows to select account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528810#M3642</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have configured a new set-up for GlobalProtect which use Auzre SAML authentication and Microsoft Authenticator&lt;BR /&gt;It's all working fine with the exception of this weird behavior:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- User connect to the portal with SAML authentication&lt;/P&gt;
&lt;P&gt;- A window open for the user to select an AD account to use&lt;/P&gt;
&lt;P&gt;- User select account&lt;/P&gt;
&lt;P&gt;- New window open asking to ack the MS authenticator prompt, user accept.&lt;/P&gt;
&lt;P&gt;- Authentication is successful&lt;/P&gt;
&lt;P&gt;(So far so good)&lt;/P&gt;
&lt;P&gt;- Then a second window asking to select an account appears&lt;/P&gt;
&lt;P&gt;- User select the account and is logged in.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We want to get rid of that second windows but after scouring all the resources I could find, I can't figure out where this windows is coming from. Assuming it's the gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a test , I removed the authentication on the external gateway, but access is not working at all.&lt;BR /&gt;SAML is configured with Single sign-out.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAML SAML.PNG" style="width: 655px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47450i441E3AD196F9521A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="SAML SAML.PNG" alt="SAML SAML.PNG" /&gt;&lt;/span&gt;&lt;BR /&gt;User is using GP 5.2.11-10&lt;/P&gt;
&lt;P&gt;Palo is 9.1.11-h3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Portal is configured to generate a cookie for auth override.&lt;/P&gt;
&lt;P&gt;Gateway is configured to accept the cookie.&lt;/P&gt;
&lt;P&gt;Certificate to encrypt/decrypt on Portal and Gateway is the same.&lt;/P&gt;
&lt;P&gt;Use Default Browser for SAML Authentication in the App config is set to NO&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Portal SAML.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47451iF2524AC74B89E6DF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Portal SAML.PNG" alt="Portal SAML.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gateway SAML.PNG" style="width: 989px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47452iCCF3435094634A1C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Gateway SAML.PNG" alt="Gateway SAML.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did anyone faced the same behavior and manage to have it fixed?&lt;BR /&gt;A ticket has been opened, and suggest to&amp;nbsp;Validate Identity Provider Certificate in the SAML server profile. I don't see how it will solve the issue as the authentication is successful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;BR /&gt;Max&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 02:36:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528810#M3642</guid>
      <dc:creator>MaximeMertens</dc:creator>
      <dc:date>2023-01-27T02:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML double windows to select account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528812#M3643</link>
      <description>&lt;P&gt;To clarify the double windows, it's not coming from the GlobalProtect client.&lt;BR /&gt;It's a Windows window like this one&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Windows SAML.PNG" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47453i84893C0CAC0E6ACA/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Windows SAML.PNG" alt="Windows SAML.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 02:42:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528812#M3643</guid>
      <dc:creator>MaximeMertens</dc:creator>
      <dc:date>2023-01-27T02:42:14Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML double windows to select account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528813#M3644</link>
      <description>&lt;P&gt;Go to Monitor &amp;gt; Logs &amp;gt; GlobalProtect, filter out login events ( stage eq login ) and check "Auth Method" column.&lt;BR /&gt;If cookie works then Portal auth method should show SAML and gateway Cookie.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;New cookie is generated only if old cookie is expired.&lt;/P&gt;
&lt;P&gt;Try to change portal cookie lifetime to 1 minute as well.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 03:03:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528813#M3644</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-01-27T03:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML double windows to select account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528820#M3645</link>
      <description>&lt;P&gt;Hello Raido,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your answer.&lt;BR /&gt;Both Portal and Gateway shows "SAML" for auth method, so I assume the cookie is not used for the gateway authentication.&lt;/P&gt;
&lt;P&gt;Portal and GW have the same Client authentication with the same authentication profile.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GP log SAML.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47455iE316D069359247B2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="GP log SAML.PNG" alt="GP log SAML.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did try to remove the Client authentication on the Gateway but then the user was not able to connect at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Max&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 04:22:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528820#M3645</guid>
      <dc:creator>MaximeMertens</dc:creator>
      <dc:date>2023-01-27T04:22:56Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML double windows to select account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528822#M3646</link>
      <description>&lt;P&gt;As step 1 try newer GlobalProtect agent.&lt;/P&gt;
&lt;P&gt;You are using 5.2.11&lt;/P&gt;
&lt;P&gt;For example 5.2.12 had some GlobalProtect auth and SAML issues fixed.&lt;/P&gt;
&lt;P&gt;Like&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1674794186687.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47456i4097B66B2B9B1AEA/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1674794186687.png" alt="Raido_Rattameister_0-1674794186687.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If newer agent don't fix it then try to enable cookie generation on gateway temporarily and set accept time a bit longer (like 5 mins).&lt;/P&gt;
&lt;P&gt;Connect to Globalprotect.&lt;/P&gt;
&lt;P&gt;Disconnect from GlobalProtect.&lt;/P&gt;
&lt;P&gt;Connect to GlobalProtect again.&lt;/P&gt;
&lt;P&gt;Was cookie used during second connection attempt if cookie was first generated by gateway itself?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 04:37:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528822#M3646</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-01-27T04:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML double windows to select account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528824#M3647</link>
      <description>&lt;P&gt;Let me try that, I'll update the topic with result&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 04:43:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528824#M3647</guid>
      <dc:creator>MaximeMertens</dc:creator>
      <dc:date>2023-01-27T04:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML double windows to select account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528832#M3649</link>
      <description>&lt;P&gt;Did you add both fqdn's (portal and gateway) to the SAML config (on Microsoft)?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 07:17:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/528832#M3649</guid>
      <dc:creator>JoergSchuetter</dc:creator>
      <dc:date>2023-01-27T07:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML double windows to select account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/529119#M3652</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the new version, It'll be installed tomorrow, user doesn't have admin right.&lt;/P&gt;
&lt;P&gt;We tested the cookie generation and accept on the gateway to no avail. Still see both SAML on the auth method.&lt;BR /&gt;&lt;BR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83320"&gt;@JoergSchuetter&lt;/a&gt;&amp;nbsp;, the FQND is used on the SAML config on Azure. That FQDN is resolving to the IP of the Portal and Gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the PAN GPS log, I see this entry in the&amp;nbsp;----Gateway Pre-login starts---- part:&lt;/P&gt;
&lt;P&gt;(P5076-T16812)Debug(2284): 01/30/23 16:29:13:678 Failed to open file C:\Users\XXX\AppData\Local\Palo Alto Networks\GlobalProtect\PanPUAC_xxxxxxxxxxx.dat&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That file is PanPUAC.dat file is the Portal authentication cookie, we checked the access right of the folder and it looks ok. The user has full control to the folder.&lt;BR /&gt;&lt;BR /&gt;Kind regards,&lt;BR /&gt;Maxime&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2023 07:45:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/529119#M3652</guid>
      <dc:creator>MaximeMertens</dc:creator>
      <dc:date>2023-01-30T07:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML double windows to select account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/529238#M3656</link>
      <description>&lt;P&gt;So,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We redid a battery of test today and found a work around.&lt;BR /&gt;1- When the portal and gateway are set to generate and accept cookie, the double prompt is happening.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Happening as well if Portal is set to generate and Gateway to accept.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cookie gen portal.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47544i299BD756B064E74A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="cookie gen portal.PNG" alt="cookie gen portal.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;2- When the portal is set to only accept and the gateway to generate and accept. Two prompt prompt the first time, then after the cookie is generated by the gateway, it can be used by the portal for the authentication.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cookie alive.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47545i910A3BC322C00343/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="cookie alive.PNG" alt="cookie alive.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The client is not able to read the cookie generated by the portal. It's been generated, can see it in the folder&amp;nbsp;&lt;STRONG&gt;C:\Users\%USERNAME%\AppData\Local\Palo Alto Networks\GlobalProtect&lt;/STRONG&gt; but it can't be read.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;(P5076-T10004)Debug(9092): 01/31/23 14:36:11:444 ----Portal Login starts----&lt;BR /&gt;(P5076-T10004)Debug(2284): 01/31/23 14:36:11:444 Failed to open file C:\Users\USER\AppData\Local\Palo Alto Networks\GlobalProtect\PanPUAC_xxxxxxxxxxxxxxxxxxxx.dat&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is a know bug by Palo and&amp;nbsp;&lt;SPAN&gt;&lt;SPAN class="ui-provider byy byz c d e f g h i j k l m n o p q r s t bza bzb w x y z ab ac ae af ag ah ai aj ak"&gt;expected to be fixed in 10.2.4&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider byy byz c d e f g h i j k l m n o p q r s t bza bzb w x y z ab ac ae af ag ah ai aj ak"&gt;I still have to try with GP client version 5.2.12 with Portal generating the cookie and the Gateway accepting it.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider byy byz c d e f g h i j k l m n o p q r s t bza bzb w x y z ab ac ae af ag ah ai aj ak"&gt;Work around for now is to set the lifetime of the cookie to a few days or a year (max value). In this case users will only have the two prompts for account selection the first time they connect or until the cookie is no longer valid.&lt;BR /&gt;&lt;BR /&gt;Thank you all for your help.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider byy byz c d e f g h i j k l m n o p q r s t bza bzb w x y z ab ac ae af ag ah ai aj ak"&gt;Edit: We did remove the AD group from Portal, Gateway and Auth profile to no avail. It was the work around that Palo provided but didn't work in our case.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2023 05:09:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/529238#M3656</guid>
      <dc:creator>MaximeMertens</dc:creator>
      <dc:date>2023-01-31T05:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML double windows to select account</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/531177#M3695</link>
      <description>&lt;P&gt;GP version 5.2.12 is the same behavior. Will retest after upgrade PANOS to 9.1.15-h1&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2023 03:28:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-double-windows-to-select-account/m-p/531177#M3695</guid>
      <dc:creator>MaximeMertens</dc:creator>
      <dc:date>2023-02-15T03:28:27Z</dc:date>
    </item>
  </channel>
</rss>

