<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GP with MFA on AD backend in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-with-mfa-on-ad-backend/m-p/546862#M4153</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;need verification please..&lt;/P&gt;
&lt;P&gt;looking to implement GP for a client with user-id and MFA.&lt;/P&gt;
&lt;P&gt;The PA FWs are Azure based same for the AD servers and will use ldap to connect to AD from FWs.&lt;/P&gt;
&lt;P&gt;The AD has MFA integrated already.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so the question is do i need to do anything different on the PA GP config for this to work or straight forward user auth profile to AD will suffice?&lt;/P&gt;
&lt;P&gt;My thought process is the GP user authenticates against the FW, the FW sends the request to AD via ldap, AD then does the MFA to the user via the authenticator app, if user is legit, AD approves and sends the 'ok' back to the FW.. FW then accepts the user. simple or am i missing anything?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks in adv.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Jun 2023 13:43:46 GMT</pubDate>
    <dc:creator>Ants</dc:creator>
    <dc:date>2023-06-22T13:43:46Z</dc:date>
    <item>
      <title>GP with MFA on AD backend</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-with-mfa-on-ad-backend/m-p/546862#M4153</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;need verification please..&lt;/P&gt;
&lt;P&gt;looking to implement GP for a client with user-id and MFA.&lt;/P&gt;
&lt;P&gt;The PA FWs are Azure based same for the AD servers and will use ldap to connect to AD from FWs.&lt;/P&gt;
&lt;P&gt;The AD has MFA integrated already.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so the question is do i need to do anything different on the PA GP config for this to work or straight forward user auth profile to AD will suffice?&lt;/P&gt;
&lt;P&gt;My thought process is the GP user authenticates against the FW, the FW sends the request to AD via ldap, AD then does the MFA to the user via the authenticator app, if user is legit, AD approves and sends the 'ok' back to the FW.. FW then accepts the user. simple or am i missing anything?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks in adv.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 13:43:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/gp-with-mfa-on-ad-backend/m-p/546862#M4153</guid>
      <dc:creator>Ants</dc:creator>
      <dc:date>2023-06-22T13:43:46Z</dc:date>
    </item>
  </channel>
</rss>

