<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cannot Access Global Protect Portal in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/cannot-access-global-protect-portal/m-p/1244080#M6535</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 data-start="789" data-end="848"&gt;Most common &lt;STRONG data-start="804" data-end="824"&gt;confirmed causes&lt;/STRONG&gt; for this exact behavior&lt;/H2&gt;
&lt;H3 data-start="850" data-end="906"&gt;1. &lt;STRONG data-start="857" data-end="906"&gt;Assertion Consumer Service (ACS) URL mismatch&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-start="907" data-end="971"&gt;&lt;STRONG data-start="907" data-end="931"&gt;This is the #1 cause&lt;/STRONG&gt; of this error with GlobalProtect + Duo.&lt;/P&gt;
&lt;P data-start="973" data-end="979"&gt;Facts:&lt;/P&gt;
&lt;UL data-start="980" data-end="1208"&gt;
&lt;LI data-start="980" data-end="1044"&gt;
&lt;P data-start="982" data-end="1044"&gt;Duo SSO &lt;STRONG data-start="990" data-end="1012"&gt;strictly validates&lt;/STRONG&gt; the ACS URL in the SAML request&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1045" data-end="1107"&gt;
&lt;P data-start="1047" data-end="1107"&gt;GlobalProtect &lt;STRONG data-start="1061" data-end="1107"&gt;portal and gateway have different ACS URLs&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1108" data-end="1208"&gt;
&lt;P data-start="1110" data-end="1208"&gt;If the ACS URL configured in Duo does not exactly match what PAN-OS sends, Duo rejects the request&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="1210" data-end="1260"&gt;For GlobalProtect &lt;STRONG data-start="1228" data-end="1238"&gt;Portal&lt;/STRONG&gt;, the ACS URL must be:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl corner-superellipse/1.1 relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="@w-xl/main:top-9 sticky top-[calc(--spacing(9)+var(--header-height))]"&gt;
&lt;DIV class="absolute end-0 bottom-0 flex h-9 items-center pe-2"&gt;
&lt;DIV class="bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre!"&gt;&lt;SPAN&gt;https:&lt;SPAN class="hljs-regexp"&gt;//&lt;/SPAN&gt;&amp;lt;portal-fqdn&amp;gt;&lt;SPAN class="hljs-regexp"&gt;/SAML20/&lt;/SPAN&gt;SP/ACS
&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;PRE class="overflow-visible! px-0!" data-start="1262" data-end="1305"&gt;&amp;nbsp;&lt;/PRE&gt;
&lt;P data-start="1307" data-end="1354"&gt;This must match &lt;STRONG data-start="1323" data-end="1350"&gt;character-for-character&lt;/STRONG&gt; in:&lt;/P&gt;
&lt;UL data-start="1355" data-end="1462"&gt;
&lt;LI data-start="1355" data-end="1405"&gt;
&lt;P data-start="1357" data-end="1405"&gt;Duo SSO Application → Service Provider → ACS URL&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1406" data-end="1462"&gt;
&lt;P data-start="1408" data-end="1462"&gt;PAN-OS Authentication Profile → SAML Identity Provider&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="1464" data-end="1576"&gt;Palo Alto explicitly documents that &lt;STRONG data-start="1500" data-end="1573"&gt;any mismatch causes authentication failure before assertion is issued&lt;/STRONG&gt;.&lt;/P&gt;
&lt;HR data-start="1579" data-end="1582" /&gt;
&lt;H3 data-start="1584" data-end="1622"&gt;2. &lt;STRONG data-start="1591" data-end="1622"&gt;Entity ID (Issuer) mismatch&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-start="1623" data-end="1669"&gt;Duo validates the &lt;STRONG data-start="1641" data-end="1668"&gt;SAML Issuer / Entity ID&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P data-start="1671" data-end="1689"&gt;For GlobalProtect:&lt;/P&gt;
&lt;UL data-start="1690" data-end="1812"&gt;
&lt;LI data-start="1690" data-end="1757"&gt;
&lt;P data-start="1692" data-end="1757"&gt;The &lt;STRONG data-start="1696" data-end="1709"&gt;Entity ID&lt;/STRONG&gt; is defined in PAN-OS under the SAML IdP profile&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1758" data-end="1812"&gt;
&lt;P data-start="1760" data-end="1812"&gt;Duo must be configured with the &lt;STRONG data-start="1792" data-end="1812"&gt;exact same value&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="1814" data-end="1895"&gt;If the Entity ID differs (even by trailing slash), Duo will show this error page.&lt;/P&gt;
&lt;P data-start="1897" data-end="1963"&gt;This is confirmed in Duo SSO SAML troubleshooting documentation.&lt;/P&gt;
&lt;HR data-start="1966" data-end="1969" /&gt;
&lt;H3 data-start="1971" data-end="2025"&gt;3. &lt;STRONG data-start="1978" data-end="2025"&gt;Incorrect certificate used for SAML signing&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-start="2026" data-end="2045"&gt;Confirmed behavior:&lt;/P&gt;
&lt;UL data-start="2046" data-end="2243"&gt;
&lt;LI data-start="2046" data-end="2085"&gt;
&lt;P data-start="2048" data-end="2085"&gt;GlobalProtect &lt;STRONG data-start="2062" data-end="2085"&gt;signs SAML requests&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2086" data-end="2156"&gt;
&lt;P data-start="2088" data-end="2156"&gt;Duo &lt;STRONG data-start="2092" data-end="2156"&gt;requires the signing certificate uploaded in the Duo SSO app&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2157" data-end="2243"&gt;
&lt;P data-start="2159" data-end="2243"&gt;If PAN-OS uses a different certificate than the one Duo has, the request is rejected&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="2245" data-end="2260"&gt;Common mistake:&lt;/P&gt;
&lt;UL data-start="2261" data-end="2407"&gt;
&lt;LI data-start="2261" data-end="2351"&gt;
&lt;P data-start="2263" data-end="2351"&gt;Admin uploads the &lt;STRONG data-start="2281" data-end="2307"&gt;portal SSL certificate&lt;/STRONG&gt; instead of the &lt;STRONG data-start="2323" data-end="2351"&gt;SAML signing certificate&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2352" data-end="2407"&gt;
&lt;P data-start="2354" data-end="2407"&gt;Or rotates the cert on PAN-OS but does not update Duo&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="2409" data-end="2515"&gt;Palo Alto documentation explicitly states the SAML signing certificate must match the IdP configuration.&lt;/P&gt;
&lt;HR data-start="2518" data-end="2521" /&gt;
&lt;H3 data-start="2523" data-end="2567"&gt;4. &lt;STRONG data-start="2530" data-end="2567"&gt;Username / NameID format mismatch&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-start="2568" data-end="2585"&gt;Duo SSO requires:&lt;/P&gt;
&lt;UL data-start="2586" data-end="2673"&gt;
&lt;LI data-start="2586" data-end="2606"&gt;
&lt;P data-start="2588" data-end="2606"&gt;A valid &lt;STRONG data-start="2596" data-end="2606"&gt;NameID&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2607" data-end="2673"&gt;
&lt;P data-start="2609" data-end="2673"&gt;In a format it expects (usually &lt;CODE data-start="2641" data-end="2655"&gt;emailAddress&lt;/CODE&gt; or &lt;CODE data-start="2659" data-end="2672"&gt;unspecified&lt;/CODE&gt;)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="2675" data-end="2691"&gt;If PAN-OS sends:&lt;/P&gt;
&lt;UL data-start="2692" data-end="2745"&gt;
&lt;LI data-start="2692" data-end="2711"&gt;
&lt;P data-start="2694" data-end="2711"&gt;&lt;CODE data-start="2694" data-end="2711"&gt;DOMAIN\username&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2712" data-end="2745"&gt;
&lt;P data-start="2714" data-end="2745"&gt;while Duo expects &lt;CODE data-start="2732" data-end="2745"&gt;user@domain&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="2747" data-end="2799"&gt;Duo will fail the transaction and display this page.&lt;/P&gt;
&lt;P data-start="2801" data-end="2855"&gt;Duo documents this exact failure mode for SAML apps.&lt;/P&gt;</description>
    <pubDate>Wed, 17 Dec 2025 20:27:21 GMT</pubDate>
    <dc:creator>S.Cantwell</dc:creator>
    <dc:date>2025-12-17T20:27:21Z</dc:date>
    <item>
      <title>Cannot Access Global Protect Portal</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/cannot-access-global-protect-portal/m-p/1243508#M6504</link>
      <description>&lt;P&gt;Good Morning ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am currently working on implementing Global Protect with&amp;nbsp; Duo SSO integration&amp;nbsp; for user authentication . Although all&amp;nbsp; the following configuration elements appear to be in place I am getting the following error message when attempting to access the portal . Can you please advise what may be going wrong her e?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="HThiam_0-1765312272753.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70076i98651B156615BDDB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="HThiam_0-1765312272753.png" alt="HThiam_0-1765312272753.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 20:31:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/cannot-access-global-protect-portal/m-p/1243508#M6504</guid>
      <dc:creator>H.Thiam</dc:creator>
      <dc:date>2025-12-09T20:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Access Global Protect Portal</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/cannot-access-global-protect-portal/m-p/1244080#M6535</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 data-start="789" data-end="848"&gt;Most common &lt;STRONG data-start="804" data-end="824"&gt;confirmed causes&lt;/STRONG&gt; for this exact behavior&lt;/H2&gt;
&lt;H3 data-start="850" data-end="906"&gt;1. &lt;STRONG data-start="857" data-end="906"&gt;Assertion Consumer Service (ACS) URL mismatch&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-start="907" data-end="971"&gt;&lt;STRONG data-start="907" data-end="931"&gt;This is the #1 cause&lt;/STRONG&gt; of this error with GlobalProtect + Duo.&lt;/P&gt;
&lt;P data-start="973" data-end="979"&gt;Facts:&lt;/P&gt;
&lt;UL data-start="980" data-end="1208"&gt;
&lt;LI data-start="980" data-end="1044"&gt;
&lt;P data-start="982" data-end="1044"&gt;Duo SSO &lt;STRONG data-start="990" data-end="1012"&gt;strictly validates&lt;/STRONG&gt; the ACS URL in the SAML request&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1045" data-end="1107"&gt;
&lt;P data-start="1047" data-end="1107"&gt;GlobalProtect &lt;STRONG data-start="1061" data-end="1107"&gt;portal and gateway have different ACS URLs&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1108" data-end="1208"&gt;
&lt;P data-start="1110" data-end="1208"&gt;If the ACS URL configured in Duo does not exactly match what PAN-OS sends, Duo rejects the request&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="1210" data-end="1260"&gt;For GlobalProtect &lt;STRONG data-start="1228" data-end="1238"&gt;Portal&lt;/STRONG&gt;, the ACS URL must be:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl corner-superellipse/1.1 relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="@w-xl/main:top-9 sticky top-[calc(--spacing(9)+var(--header-height))]"&gt;
&lt;DIV class="absolute end-0 bottom-0 flex h-9 items-center pe-2"&gt;
&lt;DIV class="bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre!"&gt;&lt;SPAN&gt;https:&lt;SPAN class="hljs-regexp"&gt;//&lt;/SPAN&gt;&amp;lt;portal-fqdn&amp;gt;&lt;SPAN class="hljs-regexp"&gt;/SAML20/&lt;/SPAN&gt;SP/ACS
&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;PRE class="overflow-visible! px-0!" data-start="1262" data-end="1305"&gt;&amp;nbsp;&lt;/PRE&gt;
&lt;P data-start="1307" data-end="1354"&gt;This must match &lt;STRONG data-start="1323" data-end="1350"&gt;character-for-character&lt;/STRONG&gt; in:&lt;/P&gt;
&lt;UL data-start="1355" data-end="1462"&gt;
&lt;LI data-start="1355" data-end="1405"&gt;
&lt;P data-start="1357" data-end="1405"&gt;Duo SSO Application → Service Provider → ACS URL&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1406" data-end="1462"&gt;
&lt;P data-start="1408" data-end="1462"&gt;PAN-OS Authentication Profile → SAML Identity Provider&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="1464" data-end="1576"&gt;Palo Alto explicitly documents that &lt;STRONG data-start="1500" data-end="1573"&gt;any mismatch causes authentication failure before assertion is issued&lt;/STRONG&gt;.&lt;/P&gt;
&lt;HR data-start="1579" data-end="1582" /&gt;
&lt;H3 data-start="1584" data-end="1622"&gt;2. &lt;STRONG data-start="1591" data-end="1622"&gt;Entity ID (Issuer) mismatch&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-start="1623" data-end="1669"&gt;Duo validates the &lt;STRONG data-start="1641" data-end="1668"&gt;SAML Issuer / Entity ID&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P data-start="1671" data-end="1689"&gt;For GlobalProtect:&lt;/P&gt;
&lt;UL data-start="1690" data-end="1812"&gt;
&lt;LI data-start="1690" data-end="1757"&gt;
&lt;P data-start="1692" data-end="1757"&gt;The &lt;STRONG data-start="1696" data-end="1709"&gt;Entity ID&lt;/STRONG&gt; is defined in PAN-OS under the SAML IdP profile&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1758" data-end="1812"&gt;
&lt;P data-start="1760" data-end="1812"&gt;Duo must be configured with the &lt;STRONG data-start="1792" data-end="1812"&gt;exact same value&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="1814" data-end="1895"&gt;If the Entity ID differs (even by trailing slash), Duo will show this error page.&lt;/P&gt;
&lt;P data-start="1897" data-end="1963"&gt;This is confirmed in Duo SSO SAML troubleshooting documentation.&lt;/P&gt;
&lt;HR data-start="1966" data-end="1969" /&gt;
&lt;H3 data-start="1971" data-end="2025"&gt;3. &lt;STRONG data-start="1978" data-end="2025"&gt;Incorrect certificate used for SAML signing&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-start="2026" data-end="2045"&gt;Confirmed behavior:&lt;/P&gt;
&lt;UL data-start="2046" data-end="2243"&gt;
&lt;LI data-start="2046" data-end="2085"&gt;
&lt;P data-start="2048" data-end="2085"&gt;GlobalProtect &lt;STRONG data-start="2062" data-end="2085"&gt;signs SAML requests&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2086" data-end="2156"&gt;
&lt;P data-start="2088" data-end="2156"&gt;Duo &lt;STRONG data-start="2092" data-end="2156"&gt;requires the signing certificate uploaded in the Duo SSO app&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2157" data-end="2243"&gt;
&lt;P data-start="2159" data-end="2243"&gt;If PAN-OS uses a different certificate than the one Duo has, the request is rejected&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="2245" data-end="2260"&gt;Common mistake:&lt;/P&gt;
&lt;UL data-start="2261" data-end="2407"&gt;
&lt;LI data-start="2261" data-end="2351"&gt;
&lt;P data-start="2263" data-end="2351"&gt;Admin uploads the &lt;STRONG data-start="2281" data-end="2307"&gt;portal SSL certificate&lt;/STRONG&gt; instead of the &lt;STRONG data-start="2323" data-end="2351"&gt;SAML signing certificate&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2352" data-end="2407"&gt;
&lt;P data-start="2354" data-end="2407"&gt;Or rotates the cert on PAN-OS but does not update Duo&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="2409" data-end="2515"&gt;Palo Alto documentation explicitly states the SAML signing certificate must match the IdP configuration.&lt;/P&gt;
&lt;HR data-start="2518" data-end="2521" /&gt;
&lt;H3 data-start="2523" data-end="2567"&gt;4. &lt;STRONG data-start="2530" data-end="2567"&gt;Username / NameID format mismatch&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-start="2568" data-end="2585"&gt;Duo SSO requires:&lt;/P&gt;
&lt;UL data-start="2586" data-end="2673"&gt;
&lt;LI data-start="2586" data-end="2606"&gt;
&lt;P data-start="2588" data-end="2606"&gt;A valid &lt;STRONG data-start="2596" data-end="2606"&gt;NameID&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2607" data-end="2673"&gt;
&lt;P data-start="2609" data-end="2673"&gt;In a format it expects (usually &lt;CODE data-start="2641" data-end="2655"&gt;emailAddress&lt;/CODE&gt; or &lt;CODE data-start="2659" data-end="2672"&gt;unspecified&lt;/CODE&gt;)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="2675" data-end="2691"&gt;If PAN-OS sends:&lt;/P&gt;
&lt;UL data-start="2692" data-end="2745"&gt;
&lt;LI data-start="2692" data-end="2711"&gt;
&lt;P data-start="2694" data-end="2711"&gt;&lt;CODE data-start="2694" data-end="2711"&gt;DOMAIN\username&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2712" data-end="2745"&gt;
&lt;P data-start="2714" data-end="2745"&gt;while Duo expects &lt;CODE data-start="2732" data-end="2745"&gt;user@domain&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="2747" data-end="2799"&gt;Duo will fail the transaction and display this page.&lt;/P&gt;
&lt;P data-start="2801" data-end="2855"&gt;Duo documents this exact failure mode for SAML apps.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Dec 2025 20:27:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/cannot-access-global-protect-portal/m-p/1244080#M6535</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2025-12-17T20:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Access Global Protect Portal</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/cannot-access-global-protect-portal/m-p/1244085#M6537</link>
      <description>&lt;P&gt;This is now resolved . Redeploying the Global Protect App in&amp;nbsp; Duo application appears to have done the trick. Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Dec 2025 21:22:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/cannot-access-global-protect-portal/m-p/1244085#M6537</guid>
      <dc:creator>H.Thiam</dc:creator>
      <dc:date>2025-12-17T21:22:25Z</dc:date>
    </item>
  </channel>
</rss>

