<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configure TOTP (Google Authenticator) for GlobalProtect in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/560964#M4484</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For those organizations that need to configure GlobalProtect with Google Authenticator, there are a couple of options.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Configure a RADIUS server that handles both the primary and MFA authentication.&amp;nbsp; Here is one that uses AD and Google Authenticator.&amp;nbsp; &lt;A href="https://kb.hillstonenet.com/en/wp-content/uploads/2019/09/SSLVPN-Two-factor-Authentication-with-Google-Authenticator.pdf" target="_blank"&gt;https://kb.hillstonenet.com/en/wp-content/uploads/2019/09/SSLVPN-Two-factor-Authentication-with-Google-Authenticator.pdf&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;If you have Google Workspace accounts, you can enable MFA on it and connect to it with SAML.&amp;nbsp; &lt;A href="https://www.youtube.com/watch?v=BANa4rFh1Ck" target="_blank"&gt;https://www.youtube.com/watch?v=BANa4rFh1Ck&lt;/A&gt;&amp;nbsp;&amp;nbsp; &lt;A href="https://www.bitbodyguard.com/articles/palo-alto-networks/google-cloud-identity-as-saml-idp/" target="_blank"&gt;https://www.bitbodyguard.com/articles/palo-alto-networks/google-cloud-identity-as-saml-idp/&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;I have not configured Google MFA, but I have done these solutions with other products.&amp;nbsp; I found the links through Google.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 15:22:45 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2023-10-09T15:22:45Z</dc:date>
    <item>
      <title>Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/323140#M31</link>
      <description>&lt;P&gt;I have looked at the different support documents and previous discussions but have not gotten much wiser.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to have a handful of users connect to GlobalProtect with TOTP as the second authentication factor. Since the number of users are so low, they can either live on our LDAP service (preferred) or as local users. The TOTP is&amp;nbsp; to be verified by existing RADIUS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On existing solutions, such as Cisco ASA (AnyConnect), the authentication flow is as follows for on demand VPN:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;a) user provides username, password and one time password on login screen&lt;/P&gt;&lt;P&gt;b) username and password is used to authenticate against LDAP&amp;nbsp;&lt;/P&gt;&lt;P&gt;c) username and one time password is sent to RADIUS for match against the TOTP backend&lt;/P&gt;&lt;P&gt;d) user is logged in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On PaloAlto I would perhaps expect the flow to be something like:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;a) user provides username and password to GP portal&lt;/P&gt;&lt;P&gt;b) username and password is authenticated against LDAP (or local user database)&lt;/P&gt;&lt;P&gt;c) gp portal checks for valid authentication cookie, if valid go last step&lt;/P&gt;&lt;P&gt;d) ask user for one time password&lt;/P&gt;&lt;P&gt;e) username and one time password is sent to RADIUS for match again TOTP backend&lt;/P&gt;&lt;P&gt;f) set authentication cookie&lt;/P&gt;&lt;P&gt;g) authentication override allows user to connect to GP gateway using authentication cookie&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible to set up something like this, or do we need to build a completely different RADIUS TOTP setup just for GP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2020 12:00:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/323140#M31</guid>
      <dc:creator>royolsen</dc:creator>
      <dc:date>2020-04-16T12:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/333844#M203</link>
      <description>&lt;P&gt;I would love an answer to this as well!&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 15:32:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/333844#M203</guid>
      <dc:creator>pm08yx</dc:creator>
      <dc:date>2020-06-17T15:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/344556#M351</link>
      <description>&lt;P&gt;Same here minus the RADIUS server.&amp;nbsp; If I avoid using&amp;nbsp;&lt;SPAN&gt;two-factor authentication with GlobalProtect to authenticate to the gateway or portal, it should be possible to use GlobalProtect to notify the user about an authentication policy match (UDP message), a Multi Factor Authentication server profile would be sufficient, yes?&amp;nbsp; Specifically, I would like to know how this would work with Google Authenticator.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2020 13:02:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/344556#M351</guid>
      <dc:creator>doug-elliott</dc:creator>
      <dc:date>2020-08-19T13:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/344565#M352</link>
      <description>&lt;P&gt;UPDATE:&amp;nbsp; TAC response.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For remote user authentication to GlobalProtect portals and gateways, the firewall integrates with MFA vendors using RADIUS and SAML only. As of now, The Google authenticator app is not supported by Palo Alto for multi-factor authentication. Supported MFA vendors are Okta, PingID, RSA token, DUO. Below document explains about the Multi Factor authentication in detail.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmSm" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmSm&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/authentication/authentication-types/multi-factor-authentication" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/authentication/authentication-types/multi-factor-authentication&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2020 14:12:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/344565#M352</guid>
      <dc:creator>doug-elliott</dc:creator>
      <dc:date>2020-08-19T14:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/555902#M4339</link>
      <description>&lt;P&gt;Both of those links are broken, are there updated ones?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 19:25:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/555902#M4339</guid>
      <dc:creator>SteveO808</dc:creator>
      <dc:date>2023-08-30T19:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/560827#M4477</link>
      <description>&lt;P&gt;Now 3 years has passed. Any updates here? Those two links still seem broken.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2023 13:13:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/560827#M4477</guid>
      <dc:creator>EStangeland</dc:creator>
      <dc:date>2023-10-06T13:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/560949#M4483</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206584"&gt;@EStangeland&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's the compatibility matrix for MFA vendor support:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/mfa-vendor-support/mfa-vendor-support-table#id17CBB0W095Z" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/mfa-vendor-support/mfa-vendor-support-table#id17CBB0W095Z&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Here are some updated links to replace the old ones:&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/authentication/authentication-types/multi-factor-authentication" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/authentication/authentication-types/multi-factor-authentication&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-user-authentication/configure-globalprotect-to-facilitate-multi-factor-authentication-notifications" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-user-authentication/configure-globalprotect-to-facilitate-multi-factor-authentication-notifications&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 12:30:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/560949#M4483</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2023-10-09T12:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/560964#M4484</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For those organizations that need to configure GlobalProtect with Google Authenticator, there are a couple of options.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Configure a RADIUS server that handles both the primary and MFA authentication.&amp;nbsp; Here is one that uses AD and Google Authenticator.&amp;nbsp; &lt;A href="https://kb.hillstonenet.com/en/wp-content/uploads/2019/09/SSLVPN-Two-factor-Authentication-with-Google-Authenticator.pdf" target="_blank"&gt;https://kb.hillstonenet.com/en/wp-content/uploads/2019/09/SSLVPN-Two-factor-Authentication-with-Google-Authenticator.pdf&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;If you have Google Workspace accounts, you can enable MFA on it and connect to it with SAML.&amp;nbsp; &lt;A href="https://www.youtube.com/watch?v=BANa4rFh1Ck" target="_blank"&gt;https://www.youtube.com/watch?v=BANa4rFh1Ck&lt;/A&gt;&amp;nbsp;&amp;nbsp; &lt;A href="https://www.bitbodyguard.com/articles/palo-alto-networks/google-cloud-identity-as-saml-idp/" target="_blank"&gt;https://www.bitbodyguard.com/articles/palo-alto-networks/google-cloud-identity-as-saml-idp/&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;I have not configured Google MFA, but I have done these solutions with other products.&amp;nbsp; I found the links through Google.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 15:22:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/560964#M4484</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-10-09T15:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/561261#M4496</link>
      <description>&lt;P&gt;I tried SAML against Microsoft 365 in lab. It works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But if you need multi tenant, and at same time avoid having to create one GP gateway per tenant, you still have a problem.&lt;/P&gt;
&lt;P&gt;I did some experiments using&amp;nbsp;&lt;A href="https://login.microsoftonline.com/common/saml2" target="_blank"&gt;https://login.microsoftonline.com/common/saml2&lt;/A&gt;&amp;nbsp;- but still without finding a working setup for multi tenant.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 11:49:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/561261#M4496</guid>
      <dc:creator>EStangeland</dc:creator>
      <dc:date>2023-10-11T11:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/580451#M5129</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;I have in my infrastructure a double authentication factor for global protect users.&lt;BR /&gt;For them I used Cisco Duo, the connection and integration is really easy.&lt;BR /&gt;With this I can control the double factor through an external RAdius server.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 22:42:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/580451#M5129</guid>
      <dc:creator>JoseJarrin</dc:creator>
      <dc:date>2024-03-14T22:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/580682#M5142</link>
      <description>&lt;P&gt;I have a mostly working PoC with RADIUS: freeradius 3.2 (3.0 also works) on Linux with google-authenticator via PAM that uses non-Linux-Users in a centralized directory.&lt;/P&gt;
&lt;P&gt;- Stuff that works: 2FA as such via RADIUS&lt;/P&gt;
&lt;P&gt;&amp;nbsp; + Login with username and password against AD LDAPS&lt;/P&gt;
&lt;P&gt;&amp;nbsp; + Separate Challenge Screen afterwards for google-authenticator&lt;/P&gt;
&lt;P&gt;- Stuff that needs to work before the PoC is acceptable for production:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; + How do I get the LDAP groups for UserID with RADIUS-Authentication? [not yet researched]&lt;/P&gt;
&lt;P&gt;&amp;nbsp; + Validate that Users are members of the Global-Protect-VPN-Group in LDAP, fail authentication otherwise - without hardcoding the LDAP group check in the RADIUS configuration [not yet researched. Workaround: Hardcode in the RADIUS config file]&lt;/P&gt;
&lt;P&gt;&amp;nbsp; + How do I manage to run the RADIUS-Service as HA (google-authenticator uses one file per user that contains state, i.e. they are written to with each attempted access). No DB support. [Untested solution idea]&lt;/P&gt;
&lt;P&gt;&amp;nbsp; + How do I implement this with EAP-GTC on freeradius/PA? [current implementation is using PAP and as PA does not support RADSEC, I need something that satisfies BSI (Germany) security requirements - which classical RADIUS PAP security doesn't.]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And before anyone asks: Once this works I'll post a solution here for review/feedback/possible improvements &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Mar 2024 21:02:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/580682#M5142</guid>
      <dc:creator>Joerg_Mayer</dc:creator>
      <dc:date>2024-03-17T21:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: Configure TOTP (Google Authenticator) for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/580707#M5143</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="css-1m8t0fv"&gt;&lt;SPAN class="css-rh820s"&gt;Hi,&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="css-1m8t0fv"&gt;&lt;SPAN class="css-0"&gt;I&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="css-0"&gt;have&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="css-1m8t0fv"&gt;&lt;SPAN class="css-rh820s"&gt;two&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="css-0"&gt;authentication&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="css-rh820s"&gt;factors&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="css-1m8t0fv"&gt;&lt;SPAN class="css-1ber87j"&gt;for&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="css-1m8t0fv"&gt;&lt;SPAN class="css-1ber87j"&gt;global&amp;nbsp;&lt;A href="https://www.purvatranquility.in/" target="_self"&gt;Purva Tranquillity&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="css-1m8t0fv"&gt;&lt;SPAN class="css-1ber87j"&gt;protect&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="css-1m8t0fv"&gt;&lt;SPAN class="css-1ber87j"&gt;users&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="css-1m8t0fv"&gt;&lt;SPAN class="css-15iwe0d"&gt;in&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="css-15iwe0d"&gt;my&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="css-1m8t0fv"&gt;&lt;SPAN class="css-15iwe0d"&gt;infrastructure.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 04:53:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/configure-totp-google-authenticator-for-globalprotect/m-p/580707#M5143</guid>
      <dc:creator>mirzaalora</dc:creator>
      <dc:date>2024-03-18T04:53:33Z</dc:date>
    </item>
  </channel>
</rss>

