<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Redirecting from 3rd party auth provider back to GlobalProtect Clientless VPN application in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/redirecting-from-3rd-party-auth-provider-back-to-globalprotect/m-p/1235165#M6938</link>
    <description>&lt;P&gt;Thanks for everyone's insights on this in advance.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;We are trying to expose an internally available web application (a self-hosted Git repository) through our GlobalProtect Clientless VPN. The challenge I'm trying to solve is setting the callback URL from our external authentication provider (Auth0) to redirect back to the portal address of the application, rather than the internal network address.&lt;BR /&gt;&lt;BR /&gt;Since the application is being reverse proxied through the Clientless VPN, it isn't aware that it's being accessed through a Clientless VPN. After it reaches out to the auth provider, the redirect goes back to the internally hosted domain, which isn't publicly accessible.&lt;BR /&gt;&lt;BR /&gt;Reviewing the docs at &lt;A href="https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-clientless-vpn/configure-clientless-vpn" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-clientless-vpn/configure-clientless-vpn&lt;/A&gt; led me to believe that perhaps I'm approaching this differently than I should be. Not seeing anything in there about modifying HTTP headers, it's leading me to think that either there's another way to do this directly within Panorama, or the recommendation is to use an intermediary proxy between the Clientless VPN and our application to set the appropriate headers, allowing the authentication callback to complete.&lt;BR /&gt;&lt;BR /&gt;Additionally, in our portal configuration advanced settings, we've configured our auth provider's tenant URL to be on the rewrite exclude domain list. That part is working as expected. &lt;BR /&gt;&lt;BR /&gt;Our VPN gateways are licensed with the necessary subscriptions, including Advanced URL Filtering and GlobalProtect Gateway. Our Panorama instance is running on PAN-OS 11.1.x.&lt;BR /&gt;&lt;BR /&gt;If anyone has guidance that I can follow to configure this correctly, your time and input would be greatly appreciated. Thank you.&lt;/P&gt;</description>
    <pubDate>Thu, 31 Jul 2025 22:49:52 GMT</pubDate>
    <dc:creator>tulioc</dc:creator>
    <dc:date>2025-07-31T22:49:52Z</dc:date>
    <item>
      <title>Redirecting from 3rd party auth provider back to GlobalProtect Clientless VPN application</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/redirecting-from-3rd-party-auth-provider-back-to-globalprotect/m-p/1235165#M6938</link>
      <description>&lt;P&gt;Thanks for everyone's insights on this in advance.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;We are trying to expose an internally available web application (a self-hosted Git repository) through our GlobalProtect Clientless VPN. The challenge I'm trying to solve is setting the callback URL from our external authentication provider (Auth0) to redirect back to the portal address of the application, rather than the internal network address.&lt;BR /&gt;&lt;BR /&gt;Since the application is being reverse proxied through the Clientless VPN, it isn't aware that it's being accessed through a Clientless VPN. After it reaches out to the auth provider, the redirect goes back to the internally hosted domain, which isn't publicly accessible.&lt;BR /&gt;&lt;BR /&gt;Reviewing the docs at &lt;A href="https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-clientless-vpn/configure-clientless-vpn" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-clientless-vpn/configure-clientless-vpn&lt;/A&gt; led me to believe that perhaps I'm approaching this differently than I should be. Not seeing anything in there about modifying HTTP headers, it's leading me to think that either there's another way to do this directly within Panorama, or the recommendation is to use an intermediary proxy between the Clientless VPN and our application to set the appropriate headers, allowing the authentication callback to complete.&lt;BR /&gt;&lt;BR /&gt;Additionally, in our portal configuration advanced settings, we've configured our auth provider's tenant URL to be on the rewrite exclude domain list. That part is working as expected. &lt;BR /&gt;&lt;BR /&gt;Our VPN gateways are licensed with the necessary subscriptions, including Advanced URL Filtering and GlobalProtect Gateway. Our Panorama instance is running on PAN-OS 11.1.x.&lt;BR /&gt;&lt;BR /&gt;If anyone has guidance that I can follow to configure this correctly, your time and input would be greatly appreciated. Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jul 2025 22:49:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/redirecting-from-3rd-party-auth-provider-back-to-globalprotect/m-p/1235165#M6938</guid>
      <dc:creator>tulioc</dc:creator>
      <dc:date>2025-07-31T22:49:52Z</dc:date>
    </item>
  </channel>
</rss>

