<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Always On VPN with Prelogon then Switch to SSO?  DUO and ADFS involved. in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/always-on-vpn-with-prelogon-then-switch-to-sso-duo-and-adfs/m-p/554204#M4294</link>
    <description>&lt;P&gt;Greetings all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm having a time trying to configure this and could use some pointers where I may be going wrong.&amp;nbsp; Here is the environment:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Single portal already configured using ADFS (ADFS is also already set up with DUO MFA) with agent configurations based on AD security groups&lt;/LI&gt;
&lt;LI&gt;Multiple gateways already configured based on AD security groups&lt;/LI&gt;
&lt;LI&gt;Windows 10 laptop domain joined but also with a DUO MFA prompt at Windows login&lt;/LI&gt;
&lt;LI&gt;I've set up two portal agent configs, one for the Always On VPN security group and the other for prelogon... auth override cookies have been configured.&amp;nbsp; Prelogon tunnel rename timeout is currently set to -1.&amp;nbsp; The user group based one is set to use SSO along with some other things like requiring a password to disconnect/uninstall.&lt;/LI&gt;
&lt;LI&gt;Always on gateway has been configured with same auth override cookie config and also uses ADFS auth just like the portal.&amp;nbsp; I had multiple agent configs (one for prelogon and one for the user security group) with different IP addressing but I've changed this to a single "any" users config for now for testing and simplicity&lt;/LI&gt;
&lt;LI&gt;I have an AD generated certificate for the PC generated and installed and I believe that part is working for prelogon sign in&lt;/LI&gt;
&lt;LI&gt;Split tunneling is disabled on the gateway&lt;/LI&gt;
&lt;LI&gt;AD GPO has mapped drives that we want to successfully map at Windows login so the tunnel being established still at that point is important&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The behavior I'm seeing:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Prelogon seems to work as I see GP logs on the firewall and I can see the tunnel established on the client&lt;/LI&gt;
&lt;LI&gt;During sign in, the DUO prompt appears and allows me to do the MFA.&amp;nbsp; Once that's done, Windows continues to sign in and shows the username&lt;/LI&gt;
&lt;LI&gt;Once signed in, the tunnel is still established, however, it is for prelogon user still and never seems to switch to the windows/AD user.&amp;nbsp; GP logs on the firewall continue to show prelogon as does the GP client if opened on the laptop.&amp;nbsp; After opening the GP client (and not before), the ADFS prompt appears for the user to sign in.&amp;nbsp; In can be ignored and closed and the prelogon tunnel stays.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Checking the GP logs, it looks like account info is not being handed off as part of the sign in to GP for the SSO part.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've tried: "&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;pangps -registerplap&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;" and that does add a symbol allowing me to check before login if the tunnel is established.&amp;nbsp; Helpful, but it didn't fix anything.&amp;nbsp; I also found somewhere talking about making sure default windows and GP were the only credential providers listed in Windows registry.. DUO was in there on ours too so I deleted that key which re-enabled the login options to appear.&amp;nbsp; Choosing the GP login option does seem to at least provide my username in the SSO logs but still didn't actually switch to the username in GP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is driving me crazy so I'm hopeful someone else has come across this and has some insight!&lt;/P&gt;</description>
    <pubDate>Thu, 17 Aug 2023 17:45:27 GMT</pubDate>
    <dc:creator>jsalmans</dc:creator>
    <dc:date>2023-08-17T17:45:27Z</dc:date>
    <item>
      <title>Always On VPN with Prelogon then Switch to SSO?  DUO and ADFS involved.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/always-on-vpn-with-prelogon-then-switch-to-sso-duo-and-adfs/m-p/554204#M4294</link>
      <description>&lt;P&gt;Greetings all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm having a time trying to configure this and could use some pointers where I may be going wrong.&amp;nbsp; Here is the environment:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Single portal already configured using ADFS (ADFS is also already set up with DUO MFA) with agent configurations based on AD security groups&lt;/LI&gt;
&lt;LI&gt;Multiple gateways already configured based on AD security groups&lt;/LI&gt;
&lt;LI&gt;Windows 10 laptop domain joined but also with a DUO MFA prompt at Windows login&lt;/LI&gt;
&lt;LI&gt;I've set up two portal agent configs, one for the Always On VPN security group and the other for prelogon... auth override cookies have been configured.&amp;nbsp; Prelogon tunnel rename timeout is currently set to -1.&amp;nbsp; The user group based one is set to use SSO along with some other things like requiring a password to disconnect/uninstall.&lt;/LI&gt;
&lt;LI&gt;Always on gateway has been configured with same auth override cookie config and also uses ADFS auth just like the portal.&amp;nbsp; I had multiple agent configs (one for prelogon and one for the user security group) with different IP addressing but I've changed this to a single "any" users config for now for testing and simplicity&lt;/LI&gt;
&lt;LI&gt;I have an AD generated certificate for the PC generated and installed and I believe that part is working for prelogon sign in&lt;/LI&gt;
&lt;LI&gt;Split tunneling is disabled on the gateway&lt;/LI&gt;
&lt;LI&gt;AD GPO has mapped drives that we want to successfully map at Windows login so the tunnel being established still at that point is important&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The behavior I'm seeing:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Prelogon seems to work as I see GP logs on the firewall and I can see the tunnel established on the client&lt;/LI&gt;
&lt;LI&gt;During sign in, the DUO prompt appears and allows me to do the MFA.&amp;nbsp; Once that's done, Windows continues to sign in and shows the username&lt;/LI&gt;
&lt;LI&gt;Once signed in, the tunnel is still established, however, it is for prelogon user still and never seems to switch to the windows/AD user.&amp;nbsp; GP logs on the firewall continue to show prelogon as does the GP client if opened on the laptop.&amp;nbsp; After opening the GP client (and not before), the ADFS prompt appears for the user to sign in.&amp;nbsp; In can be ignored and closed and the prelogon tunnel stays.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Checking the GP logs, it looks like account info is not being handed off as part of the sign in to GP for the SSO part.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've tried: "&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;pangps -registerplap&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;" and that does add a symbol allowing me to check before login if the tunnel is established.&amp;nbsp; Helpful, but it didn't fix anything.&amp;nbsp; I also found somewhere talking about making sure default windows and GP were the only credential providers listed in Windows registry.. DUO was in there on ours too so I deleted that key which re-enabled the login options to appear.&amp;nbsp; Choosing the GP login option does seem to at least provide my username in the SSO logs but still didn't actually switch to the username in GP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is driving me crazy so I'm hopeful someone else has come across this and has some insight!&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 17:45:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/always-on-vpn-with-prelogon-then-switch-to-sso-duo-and-adfs/m-p/554204#M4294</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2023-08-17T17:45:27Z</dc:date>
    </item>
  </channel>
</rss>

