<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect On-Demand using authentication profile and user certificate from PKI on gateway in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/382779#M855</link>
    <description>&lt;P&gt;Just so that I provide closure to this discussion. I managed to get this rolled out and fix the issues that I was having.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is what I learned during my deployment and troubleshooting:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;When using user certificate along with an authentication profile; you can leave the username field to "none" on the certificate profile.&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;"Required client certificate not found" was the error that got me stuck. I was using the certificate profile to verify the certificate-status:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-01-28 15_14_52-Clipboard.png" style="width: 798px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29728iB0842D18F2CD7C58/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2021-01-28 15_14_52-Clipboard.png" alt="2021-01-28 15_14_52-Clipboard.png" /&gt;&lt;/span&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;After long hours of detailed investigation I discovered that this was due to CRL verification failures. I hadn't validated the firewalls reachability to query the CRL that it was reading off the presented certificates. This lead to the discovery that the firewalls were configured with external DNS servers and that CRL verification attempts were being made against an internal FQDN. I updated the DNS servers on the firewall to lookup against internal DNS servers and everything is working like a charm!&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;Hope someone else finds this useful when they run into a similar fit!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Jan 2021 23:27:18 GMT</pubDate>
    <dc:creator>DelvinC</dc:creator>
    <dc:date>2021-01-28T23:27:18Z</dc:date>
    <item>
      <title>GlobalProtect On-Demand using authentication profile and user certificate from PKI on gateway</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/381675#M826</link>
      <description>&lt;P&gt;I'm trying to setup a&amp;nbsp;GlobalProtect On-Demand environment.&lt;/P&gt;&lt;P&gt;The portal uses an LDAP server profile for authentication and has been validated to be working fine.&lt;/P&gt;&lt;P&gt;I intend to configure the gateway to use a combination of RADIUS and certificate profile to authenticate. I've confirmed that authentication works without the certificate profile.&lt;/P&gt;&lt;P&gt;My understanding is that certificate based authentication for the "on-demand" mode works only if the certificates are user certificates (i.e. installed in the user store).&lt;/P&gt;&lt;P&gt;I've a PKI infrastructure in the environment that is pushing out certificates to the users. I do not intend to go down the SCEP configuration for this deployment.&lt;/P&gt;&lt;P&gt;So far I've not been successful to get certificate profile.&lt;/P&gt;&lt;P&gt;I'm greeted by the "Required client certificate not found" error.&lt;/P&gt;&lt;P&gt;I've tried to play with different options on the certificate profile like subject, subject alt-name, principal name, email, etc.&lt;/P&gt;&lt;P&gt;FYI... I have the PKI root CA and intermediate CAs already included in my certificate profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wanted to know if anyone has this successfully working in this fashion using "On-demand" mode.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;What certificate fields or options did you use?&lt;/LI&gt;&lt;LI&gt;What certificate profile options did you leverage?&lt;/LI&gt;&lt;LI&gt;Any interesting scenarios you ran in your deployment?&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Fri, 22 Jan 2021 19:24:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/381675#M826</guid>
      <dc:creator>DelvinC</dc:creator>
      <dc:date>2021-01-22T19:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect On-Demand using authentication profile and user certificate from PKI on gateway</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/381713#M827</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42079"&gt;@DelvinC&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are using the Prelogon and then on demand&amp;nbsp; for GP.&lt;/P&gt;
&lt;P&gt;We are using Machine cert for Client Authentication using prelogon and then on demand.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We do have our Internal PKI server.&lt;/P&gt;
&lt;P&gt;We have imported the Intermediate cert from the PC to the PA.&lt;/P&gt;
&lt;P&gt;PA already has Root CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;gt;Our cert profile has Root and Intermediate certs.&lt;/P&gt;
&lt;P&gt;2&amp;gt;For Cert for VPN it has CN field.&lt;/P&gt;
&lt;P&gt;3&amp;gt;You need to make sure cert which you have on PC make sure import its Root and Intermediate to the PA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 21:37:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/381713#M827</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2021-01-22T21:37:28Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect On-Demand using authentication profile and user certificate from PKI on gateway</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/381727#M828</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&amp;nbsp; Thanks for your response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've had success in the past deploying machine certificates for authentication. But, this time I'm specifically trying to get user certificate authentication to work with just the on-demand mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;During my research, I came across the &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEYCA0" target="_self"&gt;PAN KB article (Basic GlobalProtect Configuration with Pre-logon)&lt;/A&gt;&amp;nbsp; that hints that this is possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DelvinC_0-1611352025876.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29641i7EBBF8C38DFE0D1C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="DelvinC_0-1611352025876.png" alt="DelvinC_0-1611352025876.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 21:47:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/381727#M828</guid>
      <dc:creator>DelvinC</dc:creator>
      <dc:date>2021-01-22T21:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect On-Demand using authentication profile and user certificate from PKI on gateway</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/381736#M829</link>
      <description>&lt;P&gt;Yes as per that link it is possible.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 22:31:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/381736#M829</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2021-01-22T22:31:15Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect On-Demand using authentication profile and user certificate from PKI on gateway</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/382779#M855</link>
      <description>&lt;P&gt;Just so that I provide closure to this discussion. I managed to get this rolled out and fix the issues that I was having.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is what I learned during my deployment and troubleshooting:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;When using user certificate along with an authentication profile; you can leave the username field to "none" on the certificate profile.&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;"Required client certificate not found" was the error that got me stuck. I was using the certificate profile to verify the certificate-status:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-01-28 15_14_52-Clipboard.png" style="width: 798px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29728iB0842D18F2CD7C58/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2021-01-28 15_14_52-Clipboard.png" alt="2021-01-28 15_14_52-Clipboard.png" /&gt;&lt;/span&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;After long hours of detailed investigation I discovered that this was due to CRL verification failures. I hadn't validated the firewalls reachability to query the CRL that it was reading off the presented certificates. This lead to the discovery that the firewalls were configured with external DNS servers and that CRL verification attempts were being made against an internal FQDN. I updated the DNS servers on the firewall to lookup against internal DNS servers and everything is working like a charm!&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;Hope someone else finds this useful when they run into a similar fit!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2021 23:27:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/382779#M855</guid>
      <dc:creator>DelvinC</dc:creator>
      <dc:date>2021-01-28T23:27:18Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect On-Demand using authentication profile and user certificate from PKI on gateway</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/383122#M860</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42079"&gt;@DelvinC&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for updating the Community.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Sun, 31 Jan 2021 06:35:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/383122#M860</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2021-01-31T06:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect On-Demand using authentication profile and user certificate from PKI on gateway</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/597697#M5816</link>
      <description>&lt;P&gt;thank you, very useful to know&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 16:57:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-on-demand-using-authentication-profile-and-user/m-p/597697#M5816</guid>
      <dc:creator>n.willemkotze</dc:creator>
      <dc:date>2024-09-12T16:57:15Z</dc:date>
    </item>
  </channel>
</rss>

