<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect with AzureAD authentication in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/579939#M5108</link>
    <description>&lt;P&gt;As an update to my previous reply, a couple weeks ago Microsoft did announce support for additional capabilities with Conditional Access.&amp;nbsp; This includes&lt;/P&gt;
&lt;P&gt;&amp;gt; &lt;STRONG&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;now you can require reauthentication for any resource protected by Conditional Access&lt;/SPAN&gt;&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Using this Conditional Access capability should satisfy the requirement "I need always enter my credentials".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/prompt-users-for-reauthentication-on-sensitive-apps-and-high/ba-p/4062703" target="_blank"&gt;https://techcommunity.microsoft.com/t5/microsoft-entra-blog/prompt-users-for-reauthentication-on-sensitive-apps-and-high/ba-p/4062703&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2024 17:29:40 GMT</pubDate>
    <dc:creator>alowther_chatham</dc:creator>
    <dc:date>2024-03-11T17:29:40Z</dc:date>
    <item>
      <title>Global Protect with AzureAD authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/573607#M4850</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently, we have ou GP configured to use our local Active Directory for authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is easy to configure GP to use AzureAD authentication and to use Microsoft MFA ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 09:00:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/573607#M4850</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2024-01-19T09:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with AzureAD authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/573614#M4851</link>
      <description>&lt;P&gt;yes!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in azure you can create an enterprise application, look for "palo alto networks - globalprotect"&lt;/P&gt;
&lt;P&gt;go through the steps to enable SSO&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the only caveat is that you need to craft your identifier and reply url to contain :443&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="ext-saml-section-header"&gt;&lt;SPAN class="msportalfx-text-header" data-bind="text: headerText"&gt;Basic SAML Configuration&lt;/SPAN&gt;
&lt;DIV class="ext-saml-edit-toolbar fxc-base fxc-toolbar azc-toolbar" tabindex="0" data-bind="pcControl: editToolbar" data-formelement="pcControl: editToolbar"&gt;
&lt;DIV id="469d8e3b-fcb8-45e2-977b-f8e1c867b135" class="azc-toolbarButton-overflowPopup fxs-dropmenu-content msportalfx-shadow-level2 fxs-portal-bg-txt-br fxc-groupPopup-hidden" role="menu"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV data-bind="foreach: list"&gt;
&lt;DIV class="ext-saml-row" data-bind="sanitizedCss: { 'ext-saml-row-divider': $data.withDivider }"&gt;
&lt;DIV class="msportalfx-text-regular ext-saml-label" data-bind="text: label"&gt;Identifier (Entity ID)&lt;/DIV&gt;
&lt;DIV class="ext-saml-displayedValues" data-bind="text: value, sanitizedCss: { 'ext-saml-noValuesRequired': $data.missing, 'ext-saml-noValuesNotRequired': !$data.required &amp;amp;&amp;amp; $data.missing }, sanitizedAttr: { 'aria-label': value }" aria-label="https://pangurus.ddns.net:443/SAML20/SP"&gt;&lt;A href="https://mydomain:443/SAML20/SP" target="_blank"&gt;https://mydomain:443/SAML20/SP&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="ext-saml-row" data-bind="sanitizedCss: { 'ext-saml-row-divider': $data.withDivider }"&gt;
&lt;DIV class="msportalfx-text-regular ext-saml-label" data-bind="text: label"&gt;Reply URL (Assertion Consumer Service URL)&lt;/DIV&gt;
&lt;DIV class="ext-saml-displayedValues" data-bind="text: value, sanitizedCss: { 'ext-saml-noValuesRequired': $data.missing, 'ext-saml-noValuesNotRequired': !$data.required &amp;amp;&amp;amp; $data.missing }, sanitizedAttr: { 'aria-label': value }" aria-label="https://pangurus.ddns.net:443/SAML20/SP/ACS"&gt;&lt;A href="https://mydomain:443/SAML20/SP/ACS" target="_blank"&gt;https://mydomain:443/SAML20/SP/ACS&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="ext-saml-row" data-bind="sanitizedCss: { 'ext-saml-row-divider': $data.withDivider }"&gt;
&lt;DIV class="msportalfx-text-regular ext-saml-label" data-bind="text: label"&gt;Sign on URL&lt;/DIV&gt;
&lt;DIV class="ext-saml-displayedValues" data-bind="text: value, sanitizedCss: { 'ext-saml-noValuesRequired': $data.missing, 'ext-saml-noValuesNotRequired': !$data.required &amp;amp;&amp;amp; $data.missing }, sanitizedAttr: { 'aria-label': value }" aria-label="https://pangurus.ddns.net"&gt;&lt;A href="https://mydomain" target="_blank"&gt;https://mydomain&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="ext-saml-row" data-bind="sanitizedCss: { 'ext-saml-row-divider': $data.withDivider }"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;export the federation metadata xml and import that into the palo as a SAML server profile&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 10:13:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/573614#M4851</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-01-19T10:13:33Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with AzureAD authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/573615#M4852</link>
      <description>&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How I can configure GP to force user to enter AzureAD crendentials and not automatically authenticated on GP when I start the GP application ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 10:18:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/573615#M4852</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2024-01-19T10:18:29Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with AzureAD authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/573626#M4853</link>
      <description>&lt;P&gt;I configured the SAML and it's seem to be working but, when I used internal LDAP to authenticate on GP client, I need always enter my credentials but when I switch to the SAML auth, when I start the GP client, I'm directly connected without to enter credentials...&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 12:54:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/573626#M4853</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2024-01-19T12:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with AzureAD authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/574831#M4904</link>
      <description>&lt;P&gt;I have dug into this before and my conclusion is that you can not force reauthentication when using AzureAD SAML with GlobalProtect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the user has already signed in to AzureAD then Single-Sign-On principles will take effect.&amp;nbsp; Authentication will be completed using a cookie in the browser in a simple case.&amp;nbsp; If it is a Windows device that is AzureAD Joined or Hybrid AzureAD Joined then the Primary Refresh Token (PRT) will be used.&amp;nbsp; There are more potential methods depending on OS and settings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You might be able to use Sign-In-Frequency (SIF) in AzureAD Conditional Access, but if the device is joined to AzureAD then it probably won't work how you expect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AzureAD does support a parameter called ForceAuthN which states&lt;/P&gt;
&lt;P&gt;&amp;gt; If true, it means that the user will be forced to re-authenticate, even if they have a valid session with Microsoft Entra ID&lt;/P&gt;
&lt;P&gt;However, I do not see any way to tell PaloAlto to use this parameter.&amp;nbsp; I've been considering making a feature request to PaloAlto to allow this parameter to be set.&amp;nbsp; I've found threads where people use it with Checkpoint and Meraki VPNs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have some saved links that may help you&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/why-are-my-users-not-prompted-for-mfa-as-expected/ba-p/1449032" target="_blank"&gt;https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/why-are-my-users-not-prompted-for-mfa-as-expected/ba-p/1449032&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.reddit.com/r/paloaltonetworks/comments/11lhhe5/global_protect_samlsso_doesnt_force_users_to/" target="_blank"&gt;https://www.reddit.com/r/paloaltonetworks/comments/11lhhe5/global_protect_samlsso_doesnt_force_users_to/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.reddit.com/r/AZURE/comments/xrupux/conditional_access_require_mfa_every_single_time/" target="_blank"&gt;https://www.reddit.com/r/AZURE/comments/xrupux/conditional_access_require_mfa_every_single_time/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity-platform/single-sign-on-saml-protocol#authnrequest" target="_blank"&gt;https://learn.microsoft.com/en-us/entra/identity-platform/single-sign-on-saml-protocol#authnrequest&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Remote-Access-VPN/Azure-SAML-Auth-forceAuthn-true/td-p/181467" target="_blank"&gt;https://community.checkpoint.com/t5/Remote-Access-VPN/Azure-SAML-Auth-forceAuthn-true/td-p/181467&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.meraki.com/t5/Security-SD-WAN/AnyConnect-w-SAML-amp-Azure-AD-Authentication-not-prompted-for/m-p/154548" target="_blank"&gt;https://community.meraki.com/t5/Security-SD-WAN/AnyConnect-w-SAML-amp-Azure-AD-Authentication-not-prompted-for/m-p/154548&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 23:20:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/574831#M4904</guid>
      <dc:creator>alowther_chatham</dc:creator>
      <dc:date>2024-01-29T23:20:40Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with AzureAD authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/579939#M5108</link>
      <description>&lt;P&gt;As an update to my previous reply, a couple weeks ago Microsoft did announce support for additional capabilities with Conditional Access.&amp;nbsp; This includes&lt;/P&gt;
&lt;P&gt;&amp;gt; &lt;STRONG&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;now you can require reauthentication for any resource protected by Conditional Access&lt;/SPAN&gt;&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Using this Conditional Access capability should satisfy the requirement "I need always enter my credentials".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/prompt-users-for-reauthentication-on-sensitive-apps-and-high/ba-p/4062703" target="_blank"&gt;https://techcommunity.microsoft.com/t5/microsoft-entra-blog/prompt-users-for-reauthentication-on-sensitive-apps-and-high/ba-p/4062703&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2024 17:29:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/579939#M5108</guid>
      <dc:creator>alowther_chatham</dc:creator>
      <dc:date>2024-03-11T17:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with AzureAD authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/1236753#M6988</link>
      <description>&lt;P&gt;We ran into this same issue with GlobalProtect VPN not supporting the ability to configure ForceAuthn=true for SAML requests in PAN-OS. After working with Palo support, they confirmed that there is no documented workaround at the PAN-OS firewall level for this issue and is a known limitation for environments using Azure SAML SSO with GlobalProtect VPN on devices that are joined to various Azure Entra ID domains.&amp;nbsp;If you're impacted by this or would like to see support for the ability to configure ForceAuthn=true, could you kindly vote for NSFR-I-25544 through your Sales Engineer or by submitting a support ticket?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 03:11:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-azuread-authentication/m-p/1236753#M6988</guid>
      <dc:creator>lnelso06</dc:creator>
      <dc:date>2025-08-27T03:11:06Z</dc:date>
    </item>
  </channel>
</rss>

