<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global protect VPN user Pre-log  with User &amp;amp; machine Cert and fall Back to AD server in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-user-pre-log-with-user-amp-machine-cert-and/m-p/538655#M3930</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/203774"&gt;@lalitmehta&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You would have to setup a HIP object to validate that the endpoint has a machine/user certificate and use that to identify the machine authenticating via certificate versus RADIUS/LDAP/Kerberos methods against AD. You'd then use that object in a HIP Profile and utilize the HIP Profile in a security rulebase entry to only allow these users access to the internet.&lt;/P&gt;
&lt;P&gt;The only truly special thing that you'll need to remember to setup for this to work is on the 'Client Authentication' aspect of the Portal and Gateway ensure that you have 'Allow Authentication with User Credentials OR Client Certificate' to Yes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Apr 2023 21:27:37 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2023-04-13T21:27:37Z</dc:date>
    <item>
      <title>Global protect VPN user Pre-log  with User &amp; machine Cert and fall Back to AD server</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-user-pre-log-with-user-amp-machine-cert-and/m-p/538534#M3927</link>
      <description>&lt;P&gt;I am looking for packet flow for VPN user&amp;nbsp; Prelog in with User &amp;amp; Machine Cert.&lt;BR /&gt;if the user &amp;amp; Machine Cert are no available on System User will get authenticated from the AD server and get only internet access.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2023 22:17:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-user-pre-log-with-user-amp-machine-cert-and/m-p/538534#M3927</guid>
      <dc:creator>lalitmehta</dc:creator>
      <dc:date>2023-04-12T22:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect VPN user Pre-log  with User &amp; machine Cert and fall Back to AD server</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-user-pre-log-with-user-amp-machine-cert-and/m-p/538655#M3930</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/203774"&gt;@lalitmehta&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You would have to setup a HIP object to validate that the endpoint has a machine/user certificate and use that to identify the machine authenticating via certificate versus RADIUS/LDAP/Kerberos methods against AD. You'd then use that object in a HIP Profile and utilize the HIP Profile in a security rulebase entry to only allow these users access to the internet.&lt;/P&gt;
&lt;P&gt;The only truly special thing that you'll need to remember to setup for this to work is on the 'Client Authentication' aspect of the Portal and Gateway ensure that you have 'Allow Authentication with User Credentials OR Client Certificate' to Yes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 21:27:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-user-pre-log-with-user-amp-machine-cert-and/m-p/538655#M3930</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-04-13T21:27:37Z</dc:date>
    </item>
  </channel>
</rss>

