<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Global protect multiple authentication methods on same portal in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-multiple-authentication-methods-on-same-portal/m-p/1236315#M6975</link>
    <description>&lt;P&gt;We currently use GlobalProtect with LDAP + machine cert authentication on our production firewalls (managed by Strata Cloud Manager).&lt;/P&gt;
&lt;P&gt;We’ve tested SAML auth via Azure AD on a non-production firewall using Cloud Identity Manager and it works fine. Now we’d like to test it on production without forcing it as the default profile (to avoid impacting live users).&lt;/P&gt;
&lt;P&gt;On the production firewall....&lt;/P&gt;
&lt;P&gt;I removed myself from the on prem AD group tied to the current LDAP-based auth profile.&lt;/P&gt;
&lt;P&gt;Added the SAML (SSO with Azure AD) method as a secondary authentication method on both the portal and the gateway.&lt;/P&gt;
&lt;P&gt;Despite this, when testing, I still get authenticated using the LDAP method rather than being redirected to Azure SSO&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="GlobalProtect" id="GlobalProtect"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Aug 2025 11:12:18 GMT</pubDate>
    <dc:creator>ParisVcr</dc:creator>
    <dc:date>2025-08-20T11:12:18Z</dc:date>
    <item>
      <title>Global protect multiple authentication methods on same portal</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-multiple-authentication-methods-on-same-portal/m-p/1236315#M6975</link>
      <description>&lt;P&gt;We currently use GlobalProtect with LDAP + machine cert authentication on our production firewalls (managed by Strata Cloud Manager).&lt;/P&gt;
&lt;P&gt;We’ve tested SAML auth via Azure AD on a non-production firewall using Cloud Identity Manager and it works fine. Now we’d like to test it on production without forcing it as the default profile (to avoid impacting live users).&lt;/P&gt;
&lt;P&gt;On the production firewall....&lt;/P&gt;
&lt;P&gt;I removed myself from the on prem AD group tied to the current LDAP-based auth profile.&lt;/P&gt;
&lt;P&gt;Added the SAML (SSO with Azure AD) method as a secondary authentication method on both the portal and the gateway.&lt;/P&gt;
&lt;P&gt;Despite this, when testing, I still get authenticated using the LDAP method rather than being redirected to Azure SSO&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="GlobalProtect" id="GlobalProtect"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2025 11:12:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-multiple-authentication-methods-on-same-portal/m-p/1236315#M6975</guid>
      <dc:creator>ParisVcr</dc:creator>
      <dc:date>2025-08-20T11:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect multiple authentication methods on same portal</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-multiple-authentication-methods-on-same-portal/m-p/1236378#M6976</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/410578671"&gt;@ParisVcr&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At the moment, SAML&amp;nbsp;cannot be triggered on the same GP portal/gateway that has&lt;SPAN&gt;&amp;nbsp;Local/RADIUS/LDAP/TACACS configured first. Likewise, Local/RADIUS/LDAP/TACACS would not be triggered on a GP portal/gateway that has SAML configured at the top of the client auth.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For SAML to work correctly, it must be the only auth method configured for the portal/gateway (as you tested successfully in non-prod).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2025 21:01:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-multiple-authentication-methods-on-same-portal/m-p/1236378#M6976</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-08-20T21:01:25Z</dc:date>
    </item>
  </channel>
</rss>

