<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic global protect SAML auth in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-auth/m-p/529992#M3668</link>
    <description>&lt;DIV&gt;as per&amp;nbsp; provide KB document we have configure SAML Auth profile but still we are facing issue.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;-&amp;gt;new user connect via saml but after disconnecting they are not asking any otp, user automatically connect to global protect(remote user are login in cache profile).&lt;/DIV&gt;</description>
    <pubDate>Mon, 06 Feb 2023 13:44:21 GMT</pubDate>
    <dc:creator>sujithGovindaraj</dc:creator>
    <dc:date>2023-02-06T13:44:21Z</dc:date>
    <item>
      <title>global protect SAML auth</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-auth/m-p/529992#M3668</link>
      <description>&lt;DIV&gt;as per&amp;nbsp; provide KB document we have configure SAML Auth profile but still we are facing issue.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;-&amp;gt;new user connect via saml but after disconnecting they are not asking any otp, user automatically connect to global protect(remote user are login in cache profile).&lt;/DIV&gt;</description>
      <pubDate>Mon, 06 Feb 2023 13:44:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-auth/m-p/529992#M3668</guid>
      <dc:creator>sujithGovindaraj</dc:creator>
      <dc:date>2023-02-06T13:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: global protect SAML auth</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-auth/m-p/529996#M3669</link>
      <description>&lt;P&gt;How old cookies gateway accepts?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1675693146045.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47680i61A3A84121CDDA65/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1675693146045.png" alt="Raido_Rattameister_0-1675693146045.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 14:19:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-auth/m-p/529996#M3669</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-02-06T14:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: global protect SAML auth</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-auth/m-p/530014#M3672</link>
      <description>&lt;P&gt;This is a inherent problem with SAML. When you perform a SAML authentication the server (or PA Portal/Gateway in this case) asks for a SAML token and, if you do not have one, redirects you to a Microsoft gateway to authenticate. If you are doing OTP on the MS authentication gateway then the OTP happens there and it hands you an authentication token. The client then hands the token to the server (PA) and the server verifies the token against the MS gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By default, MS Azure hands out tokens with a 90day lifetime. The client can continue to use this token until expiration and no OTP will reoccur. You can change the SAML token lifetime in Azure, but it changes the lifetime for all SAML authenticated services. There is apparently a way that you may be able to force new OTP for an existing SAML token for particular services on the Azure side, but we have not gotten that far yet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The GlobalProtect client uses an internal GP browser (seems to be IE) or the system default browser to request and store the SAML token (set in the GP Portal agent config: "Use Default Browser for SAML Authentication"=no &amp;lt;default&amp;gt;). Ideally the GP Portal agent option to not save client authentication details should resolve this, but I have found SAML doesn't work at all when that is selected. If you are using the system default browser you can manually delete the SAML token. There doesn't seem to be any way to manually delete the token if using the GP browser.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 19:10:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-auth/m-p/530014#M3672</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2023-02-06T19:10:18Z</dc:date>
    </item>
    <item>
      <title>Re: global protect SAML auth</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-auth/m-p/530016#M3673</link>
      <description>&lt;P&gt;90 days is a lifetime &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I would definitely bring it down.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 19:31:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-auth/m-p/530016#M3673</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-02-06T19:31:35Z</dc:date>
    </item>
  </channel>
</rss>

