<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Global Protect Authentication Questions in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-authentication-questions/m-p/1235530#M6963</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm going to setup Global Protect in our environment but have some questions before I configure it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp; Can both a client certificate &amp;amp; SAML be used in conjunction for authentication?&amp;nbsp; If not, would an internal RADIUS server make the most sense for secondary authentication?&amp;nbsp; I want to use the client certificate to control device-based access so that the cert is only distributed by visiting the portal via the LAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp; I noticed the GP Portal can be used for SCEP distribution.&amp;nbsp; I don't currently have an internal PKI setup.&amp;nbsp; Would it make the most sense to install the PKI/CA role on a Domain Controller (All Windows environment) and use the SCEP role from the GP portal for distribution or just issue it directly from the Domain Controller to authenticated users?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3.&amp;nbsp; Should I use a dedicated public IP for external access to the GP portal or will the general outside interface IP suffice?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance!!&lt;/P&gt;</description>
    <pubDate>Wed, 06 Aug 2025 14:16:25 GMT</pubDate>
    <dc:creator>justinmoose</dc:creator>
    <dc:date>2025-08-06T14:16:25Z</dc:date>
    <item>
      <title>Global Protect Authentication Questions</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-authentication-questions/m-p/1235530#M6963</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm going to setup Global Protect in our environment but have some questions before I configure it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp; Can both a client certificate &amp;amp; SAML be used in conjunction for authentication?&amp;nbsp; If not, would an internal RADIUS server make the most sense for secondary authentication?&amp;nbsp; I want to use the client certificate to control device-based access so that the cert is only distributed by visiting the portal via the LAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp; I noticed the GP Portal can be used for SCEP distribution.&amp;nbsp; I don't currently have an internal PKI setup.&amp;nbsp; Would it make the most sense to install the PKI/CA role on a Domain Controller (All Windows environment) and use the SCEP role from the GP portal for distribution or just issue it directly from the Domain Controller to authenticated users?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3.&amp;nbsp; Should I use a dedicated public IP for external access to the GP portal or will the general outside interface IP suffice?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance!!&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 14:16:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-authentication-questions/m-p/1235530#M6963</guid>
      <dc:creator>justinmoose</dc:creator>
      <dc:date>2025-08-06T14:16:25Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Authentication Questions</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-authentication-questions/m-p/1235744#M6969</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/207214"&gt;@justinmoose&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Enforcing a client cert &amp;amp; using SAML together is nothing out of the ordinary. When a user connects to a portal/gw, the GP client presents the cert during TLS handshake, If the cert is valid, then GP redirects the user to your SAML IdP for auth.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Since all of your GP endpoints are Windows and assuming domain-joined, using ADCS + GPO makes sense. This way certs are issued automatically as soon as a machine is joined to the domain and there is no user action/signing into the portal required.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you later have a bunch of BYOD or non-domain devices, you could leverage GP's SCEP to authenticate those non-domain devices and then GP could broker a SCEP request to your internal CA to issue client certs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. I recommend using a dedicated public IP for GP whenever possible to avoid port conflicts, simplify troubleshooting, and allow cleaner security policy separation. If your environment is small and doesn’t host other public services, using the existing untrust IP is fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 03:24:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-authentication-questions/m-p/1235744#M6969</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-08-11T03:24:31Z</dc:date>
    </item>
  </channel>
</rss>

