<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Globalprotect pre-logon VPN and Azure AD Hybrid join in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-pre-logon-vpn-and-azure-ad-hybrid-join/m-p/375116#M712</link>
    <description>&lt;P&gt;How did you push the device cert using Intune? I'm trying to do the same thing, have pre-logon VPN working with Global Protect for existing computers by using a device certificate that is generated from our domain controller and pushed out via group policy. Not sure&amp;nbsp; how to get the certificate onto the device during autopilot since it seems like Global Protect only accepts the cert if it is issued to the hostname of the device trying to use it, so I can't push a generic trusted cert using Intune.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 18 Dec 2020 02:59:14 GMT</pubDate>
    <dc:creator>bregnier</dc:creator>
    <dc:date>2020-12-18T02:59:14Z</dc:date>
    <item>
      <title>Globalprotect pre-logon VPN and Azure AD Hybrid join</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-pre-logon-vpn-and-azure-ad-hybrid-join/m-p/350851#M428</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;We are looking at using GP for the purposes of joining offsite computers to our domain via a process called offsite Azure Hybrid AD join. More details:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://oofhours.com/2020/05/23/digging-into-hybrid-azure-ad-join/" target="_blank"&gt;https://oofhours.com/2020/05/23/digging-into-hybrid-azure-ad-join/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://oofhours.com/2020/06/23/windows-autopilot-user-driven-hybrid-azure-ad-join-which-vpn-clients-work" target="_blank"&gt;https://oofhours.com/2020/06/23/windows-autopilot-user-driven-hybrid-azure-ad-join-which-vpn-clients-work&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The basic premise is that the GP establishes a connection before login and then the user simply logs in, as if they were on the LAN.&lt;/P&gt;&lt;P&gt;I have set this up and it works well, but there is one problem that probably scuppers the whole thing: in order to work, the computer needs BOTH a computer certificate and a user cerficicate. This is a problem because the VPN needs to connect BEFORE the user logs in, so there will be no user certificate available. I spoke to Palo support and they told me this is by design and pre-logon needs both certificates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This seems strange to me...surely this can work with only computer certificates?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Settings&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Portal:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Certificate profile containing internal PKI root and subordinate&lt;/LI&gt;&lt;LI&gt;Authentication profile: points at an internal Radius server&lt;/LI&gt;&lt;LI&gt;Cookies enabled for authentication override&lt;/LI&gt;&lt;LI&gt;Config selection criteria: "any" user/user group&lt;/LI&gt;&lt;LI&gt;Single external gateway&lt;/LI&gt;&lt;LI&gt;Connect method: Pre-logon (always on)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Gateway:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Certificate profile containing internal PKI root and subordinate&lt;/LI&gt;&lt;LI&gt;Authentication profile: points at an internal Radius server&lt;/LI&gt;&lt;LI&gt;Cookies enabled for authentication override&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;If anyone can offer any advise as to how to get this to work with only computer certificates that would be great.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks, Brian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2020 13:13:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-pre-logon-vpn-and-azure-ad-hybrid-join/m-p/350851#M428</guid>
      <dc:creator>BrianNFC</dc:creator>
      <dc:date>2020-09-21T13:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect pre-logon VPN and Azure AD Hybrid join</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-pre-logon-vpn-and-azure-ad-hybrid-join/m-p/351860#M443</link>
      <description>&lt;P&gt;It actually looks like this configuration is correct. I reset my test laptop back to factory defaults and now it just works with only the machine certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Thu, 24 Sep 2020 16:50:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-pre-logon-vpn-and-azure-ad-hybrid-join/m-p/351860#M443</guid>
      <dc:creator>BrianNFC</dc:creator>
      <dc:date>2020-09-24T16:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect pre-logon VPN and Azure AD Hybrid join</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-pre-logon-vpn-and-azure-ad-hybrid-join/m-p/375116#M712</link>
      <description>&lt;P&gt;How did you push the device cert using Intune? I'm trying to do the same thing, have pre-logon VPN working with Global Protect for existing computers by using a device certificate that is generated from our domain controller and pushed out via group policy. Not sure&amp;nbsp; how to get the certificate onto the device during autopilot since it seems like Global Protect only accepts the cert if it is issued to the hostname of the device trying to use it, so I can't push a generic trusted cert using Intune.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 02:59:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-pre-logon-vpn-and-azure-ad-hybrid-join/m-p/375116#M712</guid>
      <dc:creator>bregnier</dc:creator>
      <dc:date>2020-12-18T02:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect pre-logon VPN and Azure AD Hybrid join</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-pre-logon-vpn-and-azure-ad-hybrid-join/m-p/375146#M714</link>
      <description>&lt;P&gt;Hi there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We had a consultant do this bit for us. But I don't think it is very difficult and it is quite well documented.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need an NDES server and you also need to install the Intune certificate connector on that server.&lt;/P&gt;&lt;P&gt;You need to create an appropriate certificate template on your internal CA server. You have to give "enrol" rights to the NDES server account.&lt;/P&gt;&lt;P&gt;Then you will need a certificate profile in Intune for handing certificates to Autopilot machines.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See more at these links:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://oofhours.com/2020/04/05/intune-certificates-something-everyone-should-set-up/" target="_blank"&gt;https://oofhours.com/2020/04/05/intune-certificates-something-everyone-should-set-up/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/mem/intune/protect/certificates-scep-configure" target="_blank"&gt;https://docs.microsoft.com/en-us/mem/intune/protect/certificates-scep-configure&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 08:54:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-pre-logon-vpn-and-azure-ad-hybrid-join/m-p/375146#M714</guid>
      <dc:creator>BrianNFC</dc:creator>
      <dc:date>2020-12-18T08:54:48Z</dc:date>
    </item>
  </channel>
</rss>

