<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Default Browser setting lost after auto-update in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/default-browser-setting-lost-after-auto-update/m-p/1002823#M6340</link>
    <description>&lt;P&gt;Hi everyone,&lt;BR /&gt;&lt;BR /&gt;I recently migrated our implementation over to using SAML for our on-demand VPN users, and due to issues with our IDP/auth method and the embedded browser on Windows (namely that we use many smart cards for auth, and the embedded browser/edge view seems to constantly "remember" the wrong cert, which users cannot easily clear), I have the portal configured to use the system default browser for SAML authentication, as well as deploying clients with the the msi flag/plist value to set this on-install. This has been working as-expected so far.&lt;BR /&gt;&lt;BR /&gt;Last night I initiated the first minimum-version update (from 6.2.3 to 6.2.6) since the SAML transition, then came in this morning to a pile of tickets due to many users getting the auto-update and getting reverted back to using the embedded browser and failing to authenticate with their smart cards (issue I mentioned above). Is there any way to have this setting be preserved when the client is updated by the VPN head-end firewall automatically?&lt;/P&gt;</description>
    <pubDate>Fri, 10 Jan 2025 19:17:05 GMT</pubDate>
    <dc:creator>brandonellis</dc:creator>
    <dc:date>2025-01-10T19:17:05Z</dc:date>
    <item>
      <title>Default Browser setting lost after auto-update</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/default-browser-setting-lost-after-auto-update/m-p/1002823#M6340</link>
      <description>&lt;P&gt;Hi everyone,&lt;BR /&gt;&lt;BR /&gt;I recently migrated our implementation over to using SAML for our on-demand VPN users, and due to issues with our IDP/auth method and the embedded browser on Windows (namely that we use many smart cards for auth, and the embedded browser/edge view seems to constantly "remember" the wrong cert, which users cannot easily clear), I have the portal configured to use the system default browser for SAML authentication, as well as deploying clients with the the msi flag/plist value to set this on-install. This has been working as-expected so far.&lt;BR /&gt;&lt;BR /&gt;Last night I initiated the first minimum-version update (from 6.2.3 to 6.2.6) since the SAML transition, then came in this morning to a pile of tickets due to many users getting the auto-update and getting reverted back to using the embedded browser and failing to authenticate with their smart cards (issue I mentioned above). Is there any way to have this setting be preserved when the client is updated by the VPN head-end firewall automatically?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 19:17:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/default-browser-setting-lost-after-auto-update/m-p/1002823#M6340</guid>
      <dc:creator>brandonellis</dc:creator>
      <dc:date>2025-01-10T19:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: Default Browser setting lost after auto-update</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/default-browser-setting-lost-after-auto-update/m-p/1002835#M6341</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77216"&gt;@brandonellis&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Two things to check:&lt;/P&gt;
&lt;P&gt;1) Do you have the use-default-browser option enabled for client-auth in your Portal/Gateway configuration?&lt;/P&gt;
&lt;P&gt;2) Do you have the 'Use Default Browser for SAML Authentication' enabled in your agent app configuration?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It &lt;EM&gt;sounds &lt;/EM&gt;like you don't have the actual app config set to utilize the default browser as part of your client configuration. That would explain why it worked until you pushed out an update where what you set during the install will be overwritten by what's defined in the app configuration. &lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 19:38:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/default-browser-setting-lost-after-auto-update/m-p/1002835#M6341</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-01-10T19:38:48Z</dc:date>
    </item>
  </channel>
</rss>

