<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Gateway certificate error when switching to SAML authentication in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gateway-certificate-error-when-switching-to-saml-authentication/m-p/532111#M3720</link>
    <description>&lt;P&gt;I got some time to dig further into the client logs yesterday and found that the certificate mismatch is because the client receives the IP address for the gateway rather than the FQDN that is defined in the portal. When the client retrieves the gateway information, does it get it from somewhere other than the agent configs on the portal?&lt;/P&gt;</description>
    <pubDate>Thu, 23 Feb 2023 16:26:21 GMT</pubDate>
    <dc:creator>rbhoward</dc:creator>
    <dc:date>2023-02-23T16:26:21Z</dc:date>
    <item>
      <title>Gateway certificate error when switching to SAML authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gateway-certificate-error-when-switching-to-saml-authentication/m-p/531427#M3703</link>
      <description>&lt;P&gt;I am testing changing our authentication for GlobalProtect from AD LDAP on premises servers to using Azure AD saml. I have the authentication working fine at the portal; the system logs show successful authentication. But then I get&amp;nbsp; "Could not verify the server certificate of the gateway." on the client. The GlobalProtect logs on the firewall show the successful connection to the portal, but nothing at all on the gateway. There are no errors at all in the firewall logs, and I don't see anything more than the above error in the collected client logs.&lt;/P&gt;
&lt;P&gt;I am testing this on a pa220 that has been working using LDAP. The portal and gateway are on the same interface and using the same certificate, a wildcard from Godaddy. If I swap the authentication profile back to the LDAP one and change nothing else, it works again.&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 14:10:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gateway-certificate-error-when-switching-to-saml-authentication/m-p/531427#M3703</guid>
      <dc:creator>rbhoward</dc:creator>
      <dc:date>2023-02-16T14:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway certificate error when switching to SAML authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gateway-certificate-error-when-switching-to-saml-authentication/m-p/532111#M3720</link>
      <description>&lt;P&gt;I got some time to dig further into the client logs yesterday and found that the certificate mismatch is because the client receives the IP address for the gateway rather than the FQDN that is defined in the portal. When the client retrieves the gateway information, does it get it from somewhere other than the agent configs on the portal?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2023 16:26:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gateway-certificate-error-when-switching-to-saml-authentication/m-p/532111#M3720</guid>
      <dc:creator>rbhoward</dc:creator>
      <dc:date>2023-02-23T16:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway certificate error when switching to SAML authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gateway-certificate-error-when-switching-to-saml-authentication/m-p/532141#M3725</link>
      <description>&lt;P&gt;The client gets the Gateway information from the Portal agent config under the External tab. You can specify the gateways by FQDN or IP in the configuration. Something to look at might be the certificate attributes. If you are using SAML for the Portal auth then you need the portal FQDN in the certificate, if the Gateway then the gateway FQDN. If you use the same certificate for both then you need both names. The certificate should include a SAN section (certificate Subject Alternative Name) with all the FQDNs listed. Likewise, the matching FQDNs should be listed in the Azure SAML config for the IDP Identifier, Reply URL, and Sign on URL fields.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 00:02:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gateway-certificate-error-when-switching-to-saml-authentication/m-p/532141#M3725</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2023-02-24T00:02:02Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway certificate error when switching to SAML authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gateway-certificate-error-when-switching-to-saml-authentication/m-p/532218#M3728</link>
      <description>&lt;P&gt;Thank you for your response. I had those things correct, but in double checking them to make sure of that, I saw that the problem was username format. I had multiple agent configs in the portal, but they were looking for&amp;nbsp;&lt;EM&gt;domain\username&lt;/EM&gt; format while the SAML was providing&amp;nbsp;&lt;EM&gt;&lt;A href="mailto:username@domain" target="_blank"&gt;username@domain&lt;/A&gt;. &lt;/EM&gt;A&amp;nbsp;final default agent config that hasn't been used in years was configured with IP. Now I just need to figure out usernames, etc.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 18:30:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gateway-certificate-error-when-switching-to-saml-authentication/m-p/532218#M3728</guid>
      <dc:creator>rbhoward</dc:creator>
      <dc:date>2023-02-24T18:30:33Z</dc:date>
    </item>
  </channel>
</rss>

